Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 03:22
Static task
static1
Behavioral task
behavioral1
Sample
specification.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
specification.exe
Resource
win10v2004-20231215-en
General
-
Target
specification.exe
-
Size
590KB
-
MD5
233dcdb19d4c91002d34dee5330c4f24
-
SHA1
4fd9d1490768c8f40cf0bde5b730857db6f52b22
-
SHA256
a3980c5f653e99fe53dc88f60a9ca1b4954b8cee932085ea57b1f46b9c7ab4c1
-
SHA512
5307d1b87843aabebf5ffa2ff0663ff772e885ba5555c1bf9f1ee09917061b9dea8f0599c76320d26dd3846544185dbb1d81f6f84e3209c7c76f9a7365393ef2
-
SSDEEP
12288:L6u2iNT0oLtt5af0mL0sxnD06JjYbsQq6eJ4UHFCV0e9:Lr1agpaMX2sbOhJ4UlCV0e
Malware Config
Extracted
warzonerat
85.195.105.96:4040
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 6 IoCs
resource yara_rule behavioral2/memory/2192-20-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/2192-25-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/2192-28-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/2192-103-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/1732-128-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/1732-126-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation specification.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation BIN.exe -
Executes dropped EXE 2 IoCs
pid Process 4100 BIN.exe 1732 BIN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\Users\\Admin\\Documents\\BIN.exe" specification.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4420 set thread context of 2192 4420 specification.exe 101 PID 4100 set thread context of 1732 4100 BIN.exe 110 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1928 schtasks.exe 4804 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1604 powershell.exe 1604 powershell.exe 1304 powershell.exe 1304 powershell.exe 1304 powershell.exe 452 powershell.exe 452 powershell.exe 452 powershell.exe 1056 powershell.exe 1056 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1604 powershell.exe Token: SeDebugPrivilege 1304 powershell.exe Token: SeDebugPrivilege 452 powershell.exe Token: SeDebugPrivilege 1056 powershell.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4420 wrote to memory of 1604 4420 specification.exe 97 PID 4420 wrote to memory of 1604 4420 specification.exe 97 PID 4420 wrote to memory of 1604 4420 specification.exe 97 PID 4420 wrote to memory of 1928 4420 specification.exe 99 PID 4420 wrote to memory of 1928 4420 specification.exe 99 PID 4420 wrote to memory of 1928 4420 specification.exe 99 PID 4420 wrote to memory of 2192 4420 specification.exe 101 PID 4420 wrote to memory of 2192 4420 specification.exe 101 PID 4420 wrote to memory of 2192 4420 specification.exe 101 PID 4420 wrote to memory of 2192 4420 specification.exe 101 PID 4420 wrote to memory of 2192 4420 specification.exe 101 PID 4420 wrote to memory of 2192 4420 specification.exe 101 PID 4420 wrote to memory of 2192 4420 specification.exe 101 PID 4420 wrote to memory of 2192 4420 specification.exe 101 PID 4420 wrote to memory of 2192 4420 specification.exe 101 PID 4420 wrote to memory of 2192 4420 specification.exe 101 PID 4420 wrote to memory of 2192 4420 specification.exe 101 PID 2192 wrote to memory of 1304 2192 specification.exe 102 PID 2192 wrote to memory of 1304 2192 specification.exe 102 PID 2192 wrote to memory of 1304 2192 specification.exe 102 PID 2192 wrote to memory of 4100 2192 specification.exe 104 PID 2192 wrote to memory of 4100 2192 specification.exe 104 PID 2192 wrote to memory of 4100 2192 specification.exe 104 PID 4100 wrote to memory of 452 4100 BIN.exe 111 PID 4100 wrote to memory of 452 4100 BIN.exe 111 PID 4100 wrote to memory of 452 4100 BIN.exe 111 PID 4100 wrote to memory of 4804 4100 BIN.exe 107 PID 4100 wrote to memory of 4804 4100 BIN.exe 107 PID 4100 wrote to memory of 4804 4100 BIN.exe 107 PID 4100 wrote to memory of 1732 4100 BIN.exe 110 PID 4100 wrote to memory of 1732 4100 BIN.exe 110 PID 4100 wrote to memory of 1732 4100 BIN.exe 110 PID 4100 wrote to memory of 1732 4100 BIN.exe 110 PID 4100 wrote to memory of 1732 4100 BIN.exe 110 PID 4100 wrote to memory of 1732 4100 BIN.exe 110 PID 4100 wrote to memory of 1732 4100 BIN.exe 110 PID 4100 wrote to memory of 1732 4100 BIN.exe 110 PID 4100 wrote to memory of 1732 4100 BIN.exe 110 PID 4100 wrote to memory of 1732 4100 BIN.exe 110 PID 4100 wrote to memory of 1732 4100 BIN.exe 110 PID 1732 wrote to memory of 1056 1732 BIN.exe 113 PID 1732 wrote to memory of 1056 1732 BIN.exe 113 PID 1732 wrote to memory of 1056 1732 BIN.exe 113 PID 1732 wrote to memory of 4304 1732 BIN.exe 115 PID 1732 wrote to memory of 4304 1732 BIN.exe 115 PID 1732 wrote to memory of 4304 1732 BIN.exe 115 PID 1732 wrote to memory of 4304 1732 BIN.exe 115 PID 1732 wrote to memory of 4304 1732 BIN.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\specification.exe"C:\Users\Admin\AppData\Local\Temp\specification.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\yZRjJoNRi.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yZRjJoNRi" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9078.tmp"2⤵
- Creates scheduled task(s)
PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\specification.exe"C:\Users\Admin\AppData\Local\Temp\specification.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
-
C:\Users\Admin\Documents\BIN.exe"C:\Users\Admin\Documents\BIN.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yZRjJoNRi" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE465.tmp"4⤵
- Creates scheduled task(s)
PID:4804
-
-
C:\Users\Admin\Documents\BIN.exe"C:\Users\Admin\Documents\BIN.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵PID:4304
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\yZRjJoNRi.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:452
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5b3c3b7d439b166d47a6d3c06bf56db05
SHA1999ef523748316bb29fb4488bac8640c2187c17a
SHA2568ebb89c7492bcafbf45cebd63e7d1bd46deab487b6f3a842613f7d6fa4a602e8
SHA5128eac1724721a683a660b727021a6f22738b8021566d54a7bacabc14d3a957f6ca0021d5098075ce0f4a0a0255349c62f9484efb622f24a8efacdbf9616339fd1
-
Filesize
11KB
MD5e01965f24cb440606255f839d91cac96
SHA19b65682e41327e3377ac0a505ab8995aee7b0a8e
SHA256282948b6bae81ec3c3aa12a45c83ec80814b202ee43d01dfe302ff7f2cc35dd3
SHA512298dcb6c5654901a61acb46cca4bcaadf02e0c5d8ef85881e27ec860b4b5b11ca5c470c7e21f3bb8d70ac35d53a3adf798cb9f2e437c1cd55a2cd3bb47c21998
-
Filesize
592B
MD5c207b369235b926ad7375a29bbb8e098
SHA1e338a54301aaf5658cb98426be3250ec12b14a9c
SHA256bcd259efb98de00c4c40ddb6a753c9a4a1eac871e44ccc7bed91c3b5d730f2f0
SHA512edde872609fe097ac38de638fcd070ad248b5a74f5c60ebd53434563917c665fbbec027dd750e6debba84c1f398adc1950d44696419bef0b47e617f72e9da8c1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5cc1f37961be069a1c50a423850240bf9
SHA1cdd6c94a64303577eb0acb8cbe3476bb4beee8d4
SHA2564019c44507702d20a3b863c17abfe14a2668ccb8b91701d204fff009114e6d2c
SHA512e7c9d42701f576f5d017b2a5307154611b58435b015759d0e6961844deeb694b0bf237d97e7b7b465df1308c4cdef6b3f34899d19a5891199ade904bb487cd2f
-
Filesize
176KB
MD54b604ab9020c8ee0f3dac37678751646
SHA16fb4a48f44e8858ae7263256e6633d45b65a1638
SHA256ab7348139324e2ffe7b0d984feefef818dd7ebf91d201ee2ac51e5bf665dce56
SHA51244883d71ac9f4d9d7dc4332bc03796e03ebb8f4ffa5b63876d05decd650ae758b5c80af13c11c6daa6c5b71403960d562a3ecf7424a40427f193dfbc771bca0a
-
Filesize
247KB
MD587ce50b1f055c30d59306478cb07922c
SHA16286f83a7910dd04e65f3887c37bf20f78530287
SHA25636774503301916ef31322f47324ab7736567efd97635b484ba8a927475367419
SHA51286dd8fe5a910736d5bc0cc22dd2da8c8f69e867679aaec911797673c04998100605c2ddcbcd41bfa0734a59965e89bfc1f186fc5328811fb382d8dc481c80ec4
-
Filesize
194KB
MD5564b04b026279135c95c704128815c31
SHA171265d09758c6a42711fd9dfca47636ec0dbe7a3
SHA256c97724401c3f8cc3f193b877a126d0a46b1b66123b05200c23e9c2a9bd11f266
SHA512b10819343dbc81482ed04bb542f9e29611d10efe7d3d8206c7dd697d71c4dca1be7702fa4d1d2f2c2dd205ce5183bd0d2cec8b7882c96c6d86902eae7ba2609d
-
Filesize
306KB
MD55862ed8498ba37097e3619ad96119d0a
SHA1ae6551cbad95a2433435e6eb02a60de7678c45ff
SHA256c2894d554da95e8bf2420de6ae5a0529013368b97e3c1ff5bec3991fc57b6c0e
SHA51239ce288684cca9dee81f3b8ac4a57a26d0ce1ce7451e4852ed84f0954239c97057dadcd1e72282b457c1fc3b00ab9085eb5db1afd9c1b5d5d193ec81bd21adff