Analysis

  • max time kernel
    160s
  • max time network
    189s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    06-01-2024 14:54

General

  • Target

    4683903d41b7091586fb2cf1737dc916.exe

  • Size

    1.4MB

  • MD5

    4683903d41b7091586fb2cf1737dc916

  • SHA1

    a622afe5c6596f9ffd72d6ce838e704833b9c3dc

  • SHA256

    995253676a48f849d9f6c5c8e23a612a4aed9fbb3526e9b15894e9397e25fb69

  • SHA512

    ef148eaf6fefb97302bee9fd82aadeeb0e42c616eadae02a3da6dbffecde11d1a41959d38c014e40846d26c64c3820c626bf4df34522db110dfce87ef2c654e0

  • SSDEEP

    24576:oUzUqL1Ez1PWJEYd3lul0+OzaAscp+CPdLN81JOJ6ban+k:oUwqL1Ez1PKEYd3lMCrlLN8L65nV

Malware Config

Extracted

Family

warzonerat

C2

185.222.57.92:5200

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4683903d41b7091586fb2cf1737dc916.exe
    "C:\Users\Admin\AppData\Local\Temp\4683903d41b7091586fb2cf1737dc916.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\ProgramData\images.exe
      "C:\ProgramData\images.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe"
        3⤵
          PID:2736

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\images.exe

      Filesize

      832KB

      MD5

      892cb3f84374085afce11d3c6b248460

      SHA1

      7b2563ed43e6880303844c9aaa96ca6175709477

      SHA256

      d396106cc9b79efc366b66443353f945f7816e413bee81310c3ebbb85b66bf6d

      SHA512

      1f0ab8a133e247839a360f9519fc17e8cf7c70aae3832fc41b89874fc2a64598f232354f3594ab3a14da57a284e0f1c1c47add8a82e6b19e7ca0ba36beb6462a

    • C:\ProgramData\images.exe

      Filesize

      404KB

      MD5

      216e59e81c8369cf60730b0f4b94512e

      SHA1

      4ad7bec2f113dd29e160115e6e04018d22f08eeb

      SHA256

      d930d176035867308d37578480f8937f01a169fc0206fd4a96655dc59156bdb5

      SHA512

      b1df16622073d6299997295a5f0986532515a12231610e0e46240f87e145b1119cc65f6eacfa993902feae839e78128b2f2a7ac51ee724aa0494302f82da9e7c

    • \ProgramData\images.exe

      Filesize

      768KB

      MD5

      355b735d00bb2a5e8f05ef0191814b64

      SHA1

      7a25308d6652bca32ea063dcc56c0797bad75559

      SHA256

      18e01bdb3d9bb37e996b84a74b53a9400094e973834ba79255de7bcde3890fc4

      SHA512

      235fb57d0b86ef36cf093fff25496a4b85beb3f1bcf1c3a99fc0490006c29a5f598347ccee4253121f0fbbbb47e7453be1d082b0979f87ee1a1819f7885c7b38

    • memory/2736-29-0x0000000000080000-0x0000000000081000-memory.dmp

      Filesize

      4KB

    • memory/2736-30-0x0000000000080000-0x0000000000081000-memory.dmp

      Filesize

      4KB

    • memory/2908-19-0x0000000000990000-0x0000000000AE4000-memory.dmp

      Filesize

      1.3MB

    • memory/2908-20-0x0000000000410000-0x0000000000510000-memory.dmp

      Filesize

      1024KB

    • memory/2908-34-0x0000000000410000-0x0000000000510000-memory.dmp

      Filesize

      1024KB

    • memory/2960-2-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2960-3-0x0000000000AF0000-0x0000000000C44000-memory.dmp

      Filesize

      1.3MB

    • memory/2960-16-0x0000000000AF0000-0x0000000000C44000-memory.dmp

      Filesize

      1.3MB