Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 14:54
Static task
static1
Behavioral task
behavioral1
Sample
4683903d41b7091586fb2cf1737dc916.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4683903d41b7091586fb2cf1737dc916.exe
Resource
win10v2004-20231222-en
General
-
Target
4683903d41b7091586fb2cf1737dc916.exe
-
Size
1.4MB
-
MD5
4683903d41b7091586fb2cf1737dc916
-
SHA1
a622afe5c6596f9ffd72d6ce838e704833b9c3dc
-
SHA256
995253676a48f849d9f6c5c8e23a612a4aed9fbb3526e9b15894e9397e25fb69
-
SHA512
ef148eaf6fefb97302bee9fd82aadeeb0e42c616eadae02a3da6dbffecde11d1a41959d38c014e40846d26c64c3820c626bf4df34522db110dfce87ef2c654e0
-
SSDEEP
24576:oUzUqL1Ez1PWJEYd3lul0+OzaAscp+CPdLN81JOJ6ban+k:oUwqL1Ez1PKEYd3lMCrlLN8L65nV
Malware Config
Extracted
warzonerat
185.222.57.92:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 6 IoCs
resource yara_rule behavioral2/memory/4064-2-0x0000000001210000-0x0000000001310000-memory.dmp warzonerat behavioral2/memory/4064-3-0x0000000002DB0000-0x0000000002F04000-memory.dmp warzonerat behavioral2/memory/4064-15-0x0000000002DB0000-0x0000000002F04000-memory.dmp warzonerat behavioral2/memory/3952-18-0x00000000030C0000-0x0000000003214000-memory.dmp warzonerat behavioral2/memory/3952-20-0x0000000001350000-0x0000000001450000-memory.dmp warzonerat behavioral2/memory/3952-29-0x0000000001350000-0x0000000001450000-memory.dmp warzonerat -
Executes dropped EXE 1 IoCs
pid Process 3952 images.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" 4683903d41b7091586fb2cf1737dc916.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4064 wrote to memory of 3952 4064 4683903d41b7091586fb2cf1737dc916.exe 63 PID 4064 wrote to memory of 3952 4064 4683903d41b7091586fb2cf1737dc916.exe 63 PID 4064 wrote to memory of 3952 4064 4683903d41b7091586fb2cf1737dc916.exe 63 PID 3952 wrote to memory of 756 3952 images.exe 96 PID 3952 wrote to memory of 756 3952 images.exe 96 PID 3952 wrote to memory of 756 3952 images.exe 96 PID 3952 wrote to memory of 756 3952 images.exe 96 PID 3952 wrote to memory of 756 3952 images.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\4683903d41b7091586fb2cf1737dc916.exe"C:\Users\Admin\AppData\Local\Temp\4683903d41b7091586fb2cf1737dc916.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD54cbaaf9c7a2042c3e2cebfa664828a8b
SHA14b82705d449ae040b1d44b4cb5e5fe4e45a274aa
SHA256b80029ad52be8a67331ac9f6aaba1b9ac7148ca75adf9f5e76eca6e115dfc52b
SHA512d96304face575054b95ae0c1e90a7c224411c1ea1c7fc623079d6e16f9e2658335dd89c4a3e0917777bec6167189b5c01fd4a50fc82ef4e08fd459208a128824