Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 14:22

General

  • Target

    bf0baeedce73785238ace59df3906e68.exe

  • Size

    1.8MB

  • MD5

    bf0baeedce73785238ace59df3906e68

  • SHA1

    a7e1a1611189c200c86ef6fcf174beafe2b783bc

  • SHA256

    ec6d01f6c374e83112445655eb88af26a9ec92ff701673c7c42ff5735777a3d2

  • SHA512

    6e711e45b33c9ebe17e0ed6afad8eaf9db530e64313c17d91dc0457fbda44de3ef8603203ddfe2cece4109d00cbd65e3233ec77c8387ca024fabf9cb4e3e854a

  • SSDEEP

    49152:vhtORUwc166NlRq7vLSUtwtkwvbF6CWroWFeZkP9aiK+d:vhtORUB166NHq7vLZcpDF6CWBFeZkP9t

Malware Config

Extracted

Family

warzonerat

C2

sept5th.ddns.net:2022

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf0baeedce73785238ace59df3906e68.exe
    "C:\Users\Admin\AppData\Local\Temp\bf0baeedce73785238ace59df3906e68.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell Add-MpPreference -ExclusionPath C:\
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2076
    • C:\ProgramData\dgs.exe
      "C:\ProgramData\dgs.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell Add-MpPreference -ExclusionPath C:\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2308
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe"
        3⤵
          PID:3004

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\dgs.exe

      Filesize

      1.8MB

      MD5

      bf0baeedce73785238ace59df3906e68

      SHA1

      a7e1a1611189c200c86ef6fcf174beafe2b783bc

      SHA256

      ec6d01f6c374e83112445655eb88af26a9ec92ff701673c7c42ff5735777a3d2

      SHA512

      6e711e45b33c9ebe17e0ed6afad8eaf9db530e64313c17d91dc0457fbda44de3ef8603203ddfe2cece4109d00cbd65e3233ec77c8387ca024fabf9cb4e3e854a

    • C:\ProgramData\dgs.exe

      Filesize

      881KB

      MD5

      cb3ba87bbd48d3435691ce7ead46a35f

      SHA1

      1a3c6a418f696784850bf5f688b5aa1a50f622be

      SHA256

      df68a08245c5a7dfe13c53ec471ec4dce705f9ba226a75b09fec7318724f3ede

      SHA512

      7dc806d64a05ce1842185af5e3b5842ace2b6bdc3cb1ac8eb4cc6afcd9bfaf6e308479a8d5fd2bb1bf415bdde38726087319f850461cc1ec1ed2691cc4e7947c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      22d8a83f3f815f97dcd11b5f4b936a16

      SHA1

      d3386783e29223c592a027cb82c1a3e353918615

      SHA256

      a31e9a8f679aad86d4a7039996835a710160eae0f5cc4b9b9b3494dbfc5f7c55

      SHA512

      babd376fa7e6513a018eea20ca8340a437a656cb1892acedab51717e126c86625ac5f1abb0e89132a134d6ead06b312b7b6e42d921bfb0c28ca3ba4eb34273ec

    • \ProgramData\dgs.exe

      Filesize

      1.4MB

      MD5

      2bf3aac614089b38ea75325783783c70

      SHA1

      d5ceb52347eefddbe959b9bfe5cdf338a6f84b75

      SHA256

      d4e9824abb14b1ee39d758ba282e1944c806e393f3eee235ff111cd60e31fe5d

      SHA512

      1c291df7d82ca953526b0e7f0aad3f8e1140e755e044f386846dcdc59db7e97923eb00ac5ee7ae038a05d3f47669c7830fdb50dda6c65405ec223ddd3f739291

    • memory/1608-33-0x0000000001E40000-0x0000000001F94000-memory.dmp

      Filesize

      1.3MB

    • memory/1608-16-0x0000000001E40000-0x0000000001F94000-memory.dmp

      Filesize

      1.3MB

    • memory/1608-9-0x0000000000400000-0x00000000005CA000-memory.dmp

      Filesize

      1.8MB

    • memory/2076-31-0x00000000738D0000-0x0000000073E7B000-memory.dmp

      Filesize

      5.7MB

    • memory/2076-13-0x00000000738D0000-0x0000000073E7B000-memory.dmp

      Filesize

      5.7MB

    • memory/2076-14-0x00000000738D0000-0x0000000073E7B000-memory.dmp

      Filesize

      5.7MB

    • memory/2076-15-0x00000000025B0000-0x00000000025F0000-memory.dmp

      Filesize

      256KB

    • memory/2076-28-0x00000000738D0000-0x0000000073E7B000-memory.dmp

      Filesize

      5.7MB

    • memory/2076-29-0x00000000738D0000-0x0000000073E7B000-memory.dmp

      Filesize

      5.7MB

    • memory/2308-30-0x00000000025D0000-0x0000000002610000-memory.dmp

      Filesize

      256KB

    • memory/2308-32-0x00000000738D0000-0x0000000073E7B000-memory.dmp

      Filesize

      5.7MB

    • memory/2308-23-0x00000000738D0000-0x0000000073E7B000-memory.dmp

      Filesize

      5.7MB

    • memory/3004-25-0x0000000000080000-0x0000000000081000-memory.dmp

      Filesize

      4KB

    • memory/3004-24-0x0000000000080000-0x0000000000081000-memory.dmp

      Filesize

      4KB

    • memory/3040-0-0x0000000000400000-0x00000000005CA000-memory.dmp

      Filesize

      1.8MB

    • memory/3040-10-0x0000000001E10000-0x0000000001F64000-memory.dmp

      Filesize

      1.3MB

    • memory/3040-8-0x0000000000400000-0x00000000005CA000-memory.dmp

      Filesize

      1.8MB

    • memory/3040-2-0x0000000001E10000-0x0000000001F64000-memory.dmp

      Filesize

      1.3MB

    • memory/3040-1-0x00000000003C0000-0x00000000003DD000-memory.dmp

      Filesize

      116KB