Analysis
-
max time kernel
160s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06-01-2024 14:54
Static task
static1
Behavioral task
behavioral1
Sample
4683903d41b7091586fb2cf1737dc916.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4683903d41b7091586fb2cf1737dc916.exe
Resource
win10v2004-20231222-en
General
-
Target
4683903d41b7091586fb2cf1737dc916.exe
-
Size
1.4MB
-
MD5
4683903d41b7091586fb2cf1737dc916
-
SHA1
a622afe5c6596f9ffd72d6ce838e704833b9c3dc
-
SHA256
995253676a48f849d9f6c5c8e23a612a4aed9fbb3526e9b15894e9397e25fb69
-
SHA512
ef148eaf6fefb97302bee9fd82aadeeb0e42c616eadae02a3da6dbffecde11d1a41959d38c014e40846d26c64c3820c626bf4df34522db110dfce87ef2c654e0
-
SSDEEP
24576:oUzUqL1Ez1PWJEYd3lul0+OzaAscp+CPdLN81JOJ6ban+k:oUwqL1Ez1PKEYd3lMCrlLN8L65nV
Malware Config
Extracted
warzonerat
185.222.57.92:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 6 IoCs
resource yara_rule behavioral1/memory/2960-2-0x00000000003A0000-0x00000000004A0000-memory.dmp warzonerat behavioral1/memory/2960-3-0x0000000000AF0000-0x0000000000C44000-memory.dmp warzonerat behavioral1/memory/2960-16-0x0000000000AF0000-0x0000000000C44000-memory.dmp warzonerat behavioral1/memory/2908-19-0x0000000000990000-0x0000000000AE4000-memory.dmp warzonerat behavioral1/memory/2908-20-0x0000000000410000-0x0000000000510000-memory.dmp warzonerat behavioral1/memory/2908-34-0x0000000000410000-0x0000000000510000-memory.dmp warzonerat -
Executes dropped EXE 1 IoCs
pid Process 2908 images.exe -
Loads dropped DLL 1 IoCs
pid Process 2960 4683903d41b7091586fb2cf1737dc916.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" 4683903d41b7091586fb2cf1737dc916.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2908 2960 4683903d41b7091586fb2cf1737dc916.exe 30 PID 2960 wrote to memory of 2908 2960 4683903d41b7091586fb2cf1737dc916.exe 30 PID 2960 wrote to memory of 2908 2960 4683903d41b7091586fb2cf1737dc916.exe 30 PID 2960 wrote to memory of 2908 2960 4683903d41b7091586fb2cf1737dc916.exe 30 PID 2908 wrote to memory of 2736 2908 images.exe 31 PID 2908 wrote to memory of 2736 2908 images.exe 31 PID 2908 wrote to memory of 2736 2908 images.exe 31 PID 2908 wrote to memory of 2736 2908 images.exe 31 PID 2908 wrote to memory of 2736 2908 images.exe 31 PID 2908 wrote to memory of 2736 2908 images.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4683903d41b7091586fb2cf1737dc916.exe"C:\Users\Admin\AppData\Local\Temp\4683903d41b7091586fb2cf1737dc916.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:2736
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
832KB
MD5892cb3f84374085afce11d3c6b248460
SHA17b2563ed43e6880303844c9aaa96ca6175709477
SHA256d396106cc9b79efc366b66443353f945f7816e413bee81310c3ebbb85b66bf6d
SHA5121f0ab8a133e247839a360f9519fc17e8cf7c70aae3832fc41b89874fc2a64598f232354f3594ab3a14da57a284e0f1c1c47add8a82e6b19e7ca0ba36beb6462a
-
Filesize
404KB
MD5216e59e81c8369cf60730b0f4b94512e
SHA14ad7bec2f113dd29e160115e6e04018d22f08eeb
SHA256d930d176035867308d37578480f8937f01a169fc0206fd4a96655dc59156bdb5
SHA512b1df16622073d6299997295a5f0986532515a12231610e0e46240f87e145b1119cc65f6eacfa993902feae839e78128b2f2a7ac51ee724aa0494302f82da9e7c
-
Filesize
768KB
MD5355b735d00bb2a5e8f05ef0191814b64
SHA17a25308d6652bca32ea063dcc56c0797bad75559
SHA25618e01bdb3d9bb37e996b84a74b53a9400094e973834ba79255de7bcde3890fc4
SHA512235fb57d0b86ef36cf093fff25496a4b85beb3f1bcf1c3a99fc0490006c29a5f598347ccee4253121f0fbbbb47e7453be1d082b0979f87ee1a1819f7885c7b38