Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 03:22

General

  • Target

    specification.exe

  • Size

    590KB

  • MD5

    233dcdb19d4c91002d34dee5330c4f24

  • SHA1

    4fd9d1490768c8f40cf0bde5b730857db6f52b22

  • SHA256

    a3980c5f653e99fe53dc88f60a9ca1b4954b8cee932085ea57b1f46b9c7ab4c1

  • SHA512

    5307d1b87843aabebf5ffa2ff0663ff772e885ba5555c1bf9f1ee09917061b9dea8f0599c76320d26dd3846544185dbb1d81f6f84e3209c7c76f9a7365393ef2

  • SSDEEP

    12288:L6u2iNT0oLtt5af0mL0sxnD06JjYbsQq6eJ4UHFCV0e9:Lr1agpaMX2sbOhJ4UlCV0e

Malware Config

Extracted

Family

warzonerat

C2

85.195.105.96:4040

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\specification.exe
    "C:\Users\Admin\AppData\Local\Temp\specification.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4420
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\yZRjJoNRi.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1604
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yZRjJoNRi" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9078.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1928
    • C:\Users\Admin\AppData\Local\Temp\specification.exe
      "C:\Users\Admin\AppData\Local\Temp\specification.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell Add-MpPreference -ExclusionPath C:\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1304
      • C:\Users\Admin\Documents\BIN.exe
        "C:\Users\Admin\Documents\BIN.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4100
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yZRjJoNRi" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE465.tmp"
          4⤵
          • Creates scheduled task(s)
          PID:4804
        • C:\Users\Admin\Documents\BIN.exe
          "C:\Users\Admin\Documents\BIN.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1732
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell Add-MpPreference -ExclusionPath C:\
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1056
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe"
            5⤵
              PID:4304
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\yZRjJoNRi.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:452

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      968cb9309758126772781b83adb8a28f

      SHA1

      8da30e71accf186b2ba11da1797cf67f8f78b47c

      SHA256

      92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

      SHA512

      4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      b3c3b7d439b166d47a6d3c06bf56db05

      SHA1

      999ef523748316bb29fb4488bac8640c2187c17a

      SHA256

      8ebb89c7492bcafbf45cebd63e7d1bd46deab487b6f3a842613f7d6fa4a602e8

      SHA512

      8eac1724721a683a660b727021a6f22738b8021566d54a7bacabc14d3a957f6ca0021d5098075ce0f4a0a0255349c62f9484efb622f24a8efacdbf9616339fd1

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      11KB

      MD5

      e01965f24cb440606255f839d91cac96

      SHA1

      9b65682e41327e3377ac0a505ab8995aee7b0a8e

      SHA256

      282948b6bae81ec3c3aa12a45c83ec80814b202ee43d01dfe302ff7f2cc35dd3

      SHA512

      298dcb6c5654901a61acb46cca4bcaadf02e0c5d8ef85881e27ec860b4b5b11ca5c470c7e21f3bb8d70ac35d53a3adf798cb9f2e437c1cd55a2cd3bb47c21998

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      592B

      MD5

      c207b369235b926ad7375a29bbb8e098

      SHA1

      e338a54301aaf5658cb98426be3250ec12b14a9c

      SHA256

      bcd259efb98de00c4c40ddb6a753c9a4a1eac871e44ccc7bed91c3b5d730f2f0

      SHA512

      edde872609fe097ac38de638fcd070ad248b5a74f5c60ebd53434563917c665fbbec027dd750e6debba84c1f398adc1950d44696419bef0b47e617f72e9da8c1

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tum1hq5g.cd0.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\tmp9078.tmp

      Filesize

      1KB

      MD5

      cc1f37961be069a1c50a423850240bf9

      SHA1

      cdd6c94a64303577eb0acb8cbe3476bb4beee8d4

      SHA256

      4019c44507702d20a3b863c17abfe14a2668ccb8b91701d204fff009114e6d2c

      SHA512

      e7c9d42701f576f5d017b2a5307154611b58435b015759d0e6961844deeb694b0bf237d97e7b7b465df1308c4cdef6b3f34899d19a5891199ade904bb487cd2f

    • C:\Users\Admin\Documents\BIN.exe

      Filesize

      176KB

      MD5

      4b604ab9020c8ee0f3dac37678751646

      SHA1

      6fb4a48f44e8858ae7263256e6633d45b65a1638

      SHA256

      ab7348139324e2ffe7b0d984feefef818dd7ebf91d201ee2ac51e5bf665dce56

      SHA512

      44883d71ac9f4d9d7dc4332bc03796e03ebb8f4ffa5b63876d05decd650ae758b5c80af13c11c6daa6c5b71403960d562a3ecf7424a40427f193dfbc771bca0a

    • C:\Users\Admin\Documents\BIN.exe

      Filesize

      247KB

      MD5

      87ce50b1f055c30d59306478cb07922c

      SHA1

      6286f83a7910dd04e65f3887c37bf20f78530287

      SHA256

      36774503301916ef31322f47324ab7736567efd97635b484ba8a927475367419

      SHA512

      86dd8fe5a910736d5bc0cc22dd2da8c8f69e867679aaec911797673c04998100605c2ddcbcd41bfa0734a59965e89bfc1f186fc5328811fb382d8dc481c80ec4

    • C:\Users\Admin\Documents\BIN.exe

      Filesize

      194KB

      MD5

      564b04b026279135c95c704128815c31

      SHA1

      71265d09758c6a42711fd9dfca47636ec0dbe7a3

      SHA256

      c97724401c3f8cc3f193b877a126d0a46b1b66123b05200c23e9c2a9bd11f266

      SHA512

      b10819343dbc81482ed04bb542f9e29611d10efe7d3d8206c7dd697d71c4dca1be7702fa4d1d2f2c2dd205ce5183bd0d2cec8b7882c96c6d86902eae7ba2609d

    • C:\Users\Admin\Documents\BIN.exe

      Filesize

      306KB

      MD5

      5862ed8498ba37097e3619ad96119d0a

      SHA1

      ae6551cbad95a2433435e6eb02a60de7678c45ff

      SHA256

      c2894d554da95e8bf2420de6ae5a0529013368b97e3c1ff5bec3991fc57b6c0e

      SHA512

      39ce288684cca9dee81f3b8ac4a57a26d0ce1ce7451e4852ed84f0954239c97057dadcd1e72282b457c1fc3b00ab9085eb5db1afd9c1b5d5d193ec81bd21adff

    • memory/452-108-0x00000000746B0000-0x0000000074E60000-memory.dmp

      Filesize

      7.7MB

    • memory/452-142-0x00000000051C0000-0x00000000051D0000-memory.dmp

      Filesize

      64KB

    • memory/452-111-0x00000000051C0000-0x00000000051D0000-memory.dmp

      Filesize

      64KB

    • memory/452-110-0x00000000051C0000-0x00000000051D0000-memory.dmp

      Filesize

      64KB

    • memory/452-130-0x0000000006A80000-0x0000000006ACC000-memory.dmp

      Filesize

      304KB

    • memory/452-131-0x0000000074F30000-0x0000000074F7C000-memory.dmp

      Filesize

      304KB

    • memory/452-143-0x00000000051C0000-0x00000000051D0000-memory.dmp

      Filesize

      64KB

    • memory/452-141-0x0000000007760000-0x0000000007803000-memory.dmp

      Filesize

      652KB

    • memory/1304-63-0x0000000074730000-0x0000000074EE0000-memory.dmp

      Filesize

      7.7MB

    • memory/1304-83-0x0000000071E70000-0x0000000071EBC000-memory.dmp

      Filesize

      304KB

    • memory/1304-82-0x000000007F620000-0x000000007F630000-memory.dmp

      Filesize

      64KB

    • memory/1304-93-0x0000000002800000-0x0000000002810000-memory.dmp

      Filesize

      64KB

    • memory/1304-94-0x0000000002800000-0x0000000002810000-memory.dmp

      Filesize

      64KB

    • memory/1304-98-0x0000000074730000-0x0000000074EE0000-memory.dmp

      Filesize

      7.7MB

    • memory/1304-64-0x0000000002800000-0x0000000002810000-memory.dmp

      Filesize

      64KB

    • memory/1304-65-0x0000000002800000-0x0000000002810000-memory.dmp

      Filesize

      64KB

    • memory/1604-17-0x0000000074730000-0x0000000074EE0000-memory.dmp

      Filesize

      7.7MB

    • memory/1604-35-0x0000000006220000-0x0000000006286000-memory.dmp

      Filesize

      408KB

    • memory/1604-42-0x00000000068E0000-0x000000000692C000-memory.dmp

      Filesize

      304KB

    • memory/1604-51-0x0000000005540000-0x0000000005550000-memory.dmp

      Filesize

      64KB

    • memory/1604-56-0x0000000006E40000-0x0000000006E5E000-memory.dmp

      Filesize

      120KB

    • memory/1604-57-0x0000000007AA0000-0x0000000007B43000-memory.dmp

      Filesize

      652KB

    • memory/1604-45-0x0000000071E70000-0x0000000071EBC000-memory.dmp

      Filesize

      304KB

    • memory/1604-58-0x0000000008210000-0x000000000888A000-memory.dmp

      Filesize

      6.5MB

    • memory/1604-59-0x0000000007BD0000-0x0000000007BEA000-memory.dmp

      Filesize

      104KB

    • memory/1604-44-0x0000000007A60000-0x0000000007A92000-memory.dmp

      Filesize

      200KB

    • memory/1604-60-0x0000000007C40000-0x0000000007C4A000-memory.dmp

      Filesize

      40KB

    • memory/1604-43-0x000000007F4A0000-0x000000007F4B0000-memory.dmp

      Filesize

      64KB

    • memory/1604-61-0x0000000007E50000-0x0000000007EE6000-memory.dmp

      Filesize

      600KB

    • memory/1604-62-0x0000000007DD0000-0x0000000007DE1000-memory.dmp

      Filesize

      68KB

    • memory/1604-40-0x0000000006390000-0x00000000066E4000-memory.dmp

      Filesize

      3.3MB

    • memory/1604-41-0x0000000006890000-0x00000000068AE000-memory.dmp

      Filesize

      120KB

    • memory/1604-29-0x00000000061B0000-0x0000000006216000-memory.dmp

      Filesize

      408KB

    • memory/1604-75-0x0000000007E00000-0x0000000007E0E000-memory.dmp

      Filesize

      56KB

    • memory/1604-76-0x0000000007E10000-0x0000000007E24000-memory.dmp

      Filesize

      80KB

    • memory/1604-77-0x0000000007F10000-0x0000000007F2A000-memory.dmp

      Filesize

      104KB

    • memory/1604-78-0x0000000007EF0000-0x0000000007EF8000-memory.dmp

      Filesize

      32KB

    • memory/1604-81-0x0000000074730000-0x0000000074EE0000-memory.dmp

      Filesize

      7.7MB

    • memory/1604-27-0x0000000005970000-0x0000000005992000-memory.dmp

      Filesize

      136KB

    • memory/1604-16-0x0000000002F20000-0x0000000002F56000-memory.dmp

      Filesize

      216KB

    • memory/1604-18-0x0000000005540000-0x0000000005550000-memory.dmp

      Filesize

      64KB

    • memory/1604-21-0x0000000005B80000-0x00000000061A8000-memory.dmp

      Filesize

      6.2MB

    • memory/1732-128-0x0000000000400000-0x000000000055A000-memory.dmp

      Filesize

      1.4MB

    • memory/1732-126-0x0000000000400000-0x000000000055A000-memory.dmp

      Filesize

      1.4MB

    • memory/2192-20-0x0000000000400000-0x000000000055A000-memory.dmp

      Filesize

      1.4MB

    • memory/2192-25-0x0000000000400000-0x000000000055A000-memory.dmp

      Filesize

      1.4MB

    • memory/2192-28-0x0000000000400000-0x000000000055A000-memory.dmp

      Filesize

      1.4MB

    • memory/2192-103-0x0000000000400000-0x000000000055A000-memory.dmp

      Filesize

      1.4MB

    • memory/4100-105-0x0000000005D60000-0x00000000060B4000-memory.dmp

      Filesize

      3.3MB

    • memory/4100-106-0x0000000005480000-0x0000000005490000-memory.dmp

      Filesize

      64KB

    • memory/4100-104-0x00000000746B0000-0x0000000074E60000-memory.dmp

      Filesize

      7.7MB

    • memory/4100-122-0x00000000746B0000-0x0000000074E60000-memory.dmp

      Filesize

      7.7MB

    • memory/4100-127-0x00000000746B0000-0x0000000074E60000-memory.dmp

      Filesize

      7.7MB

    • memory/4304-180-0x0000000000970000-0x0000000000971000-memory.dmp

      Filesize

      4KB

    • memory/4420-10-0x0000000007210000-0x0000000007272000-memory.dmp

      Filesize

      392KB

    • memory/4420-6-0x0000000005C60000-0x0000000005C6A000-memory.dmp

      Filesize

      40KB

    • memory/4420-11-0x0000000009890000-0x000000000992C000-memory.dmp

      Filesize

      624KB

    • memory/4420-26-0x0000000074730000-0x0000000074EE0000-memory.dmp

      Filesize

      7.7MB

    • memory/4420-9-0x0000000006F10000-0x0000000006F1A000-memory.dmp

      Filesize

      40KB

    • memory/4420-8-0x0000000006DE0000-0x0000000006DE8000-memory.dmp

      Filesize

      32KB

    • memory/4420-7-0x00000000071F0000-0x0000000007208000-memory.dmp

      Filesize

      96KB

    • memory/4420-22-0x0000000074730000-0x0000000074EE0000-memory.dmp

      Filesize

      7.7MB

    • memory/4420-5-0x0000000005700000-0x0000000005710000-memory.dmp

      Filesize

      64KB

    • memory/4420-4-0x0000000005870000-0x0000000005BC4000-memory.dmp

      Filesize

      3.3MB

    • memory/4420-3-0x00000000057D0000-0x0000000005862000-memory.dmp

      Filesize

      584KB

    • memory/4420-2-0x0000000005CE0000-0x0000000006284000-memory.dmp

      Filesize

      5.6MB

    • memory/4420-0-0x0000000074730000-0x0000000074EE0000-memory.dmp

      Filesize

      7.7MB

    • memory/4420-1-0x0000000000CC0000-0x0000000000D5A000-memory.dmp

      Filesize

      616KB