Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2024, 14:36

General

  • Target

    779e73dc0603df50f7d5295882052f7f.exe

  • Size

    480KB

  • MD5

    779e73dc0603df50f7d5295882052f7f

  • SHA1

    6f66792a4943cef093c84e1dac544ff4f56d0902

  • SHA256

    9a3b1e34525e6be453d851893c35f1adadfe92b88b42d6c40f57273c80125eed

  • SHA512

    d6e046c4e6048102c0ff8ea2e9333271a1fbadf845f00ccf4eaa31e90fafaa02abfc7f55ab3be659de31166c48959432448285ba1fe97674a7d89b7fad3d11b3

  • SSDEEP

    12288:WXoEXo7Bz06wf6CYQhLDy49HRm63wnpTnjJgd3h8EPbgXC/pO2KJBxxd6VIUp:WnVBrO49wy4

Malware Config

Extracted

Family

warzonerat

C2

donafriend.ddns.net:5200

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 7 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\779e73dc0603df50f7d5295882052f7f.exe
    "C:\Users\Admin\AppData\Local\Temp\779e73dc0603df50f7d5295882052f7f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4564
    • C:\Users\Admin\AppData\Local\Temp\779e73dc0603df50f7d5295882052f7f.exe
      "C:\Users\Admin\AppData\Local\Temp\779e73dc0603df50f7d5295882052f7f.exe"
      2⤵
        PID:3384
      • C:\Users\Admin\AppData\Local\Temp\779e73dc0603df50f7d5295882052f7f.exe
        "C:\Users\Admin\AppData\Local\Temp\779e73dc0603df50f7d5295882052f7f.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:820
        • C:\ProgramData\images.exe
          "C:\ProgramData\images.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1152
          • C:\ProgramData\images.exe
            "C:\ProgramData\images.exe"
            4⤵
            • Executes dropped EXE
            PID:3280

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\images.exe

      Filesize

      480KB

      MD5

      779e73dc0603df50f7d5295882052f7f

      SHA1

      6f66792a4943cef093c84e1dac544ff4f56d0902

      SHA256

      9a3b1e34525e6be453d851893c35f1adadfe92b88b42d6c40f57273c80125eed

      SHA512

      d6e046c4e6048102c0ff8ea2e9333271a1fbadf845f00ccf4eaa31e90fafaa02abfc7f55ab3be659de31166c48959432448285ba1fe97674a7d89b7fad3d11b3

    • memory/820-12-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/820-22-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/820-17-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/820-15-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/1152-23-0x00000000748E0000-0x0000000075090000-memory.dmp

      Filesize

      7.7MB

    • memory/1152-24-0x0000000007210000-0x0000000007220000-memory.dmp

      Filesize

      64KB

    • memory/1152-33-0x00000000748E0000-0x0000000075090000-memory.dmp

      Filesize

      7.7MB

    • memory/1152-26-0x0000000007210000-0x0000000007220000-memory.dmp

      Filesize

      64KB

    • memory/1152-25-0x00000000748E0000-0x0000000075090000-memory.dmp

      Filesize

      7.7MB

    • memory/3280-34-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/3280-32-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/3280-31-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/4564-11-0x0000000002EF0000-0x0000000002F0E000-memory.dmp

      Filesize

      120KB

    • memory/4564-16-0x0000000075010000-0x00000000757C0000-memory.dmp

      Filesize

      7.7MB

    • memory/4564-3-0x0000000007B70000-0x0000000007C02000-memory.dmp

      Filesize

      584KB

    • memory/4564-2-0x0000000008080000-0x0000000008624000-memory.dmp

      Filesize

      5.6MB

    • memory/4564-1-0x0000000075010000-0x00000000757C0000-memory.dmp

      Filesize

      7.7MB

    • memory/4564-0-0x0000000000C40000-0x0000000000CBE000-memory.dmp

      Filesize

      504KB

    • memory/4564-4-0x0000000007D50000-0x0000000007D60000-memory.dmp

      Filesize

      64KB

    • memory/4564-5-0x0000000007C30000-0x0000000007C3A000-memory.dmp

      Filesize

      40KB

    • memory/4564-6-0x0000000007D30000-0x0000000007D4C000-memory.dmp

      Filesize

      112KB

    • memory/4564-10-0x00000000092D0000-0x0000000009324000-memory.dmp

      Filesize

      336KB

    • memory/4564-9-0x0000000007D50000-0x0000000007D60000-memory.dmp

      Filesize

      64KB

    • memory/4564-8-0x0000000075010000-0x00000000757C0000-memory.dmp

      Filesize

      7.7MB

    • memory/4564-7-0x0000000008DD0000-0x0000000008E6C000-memory.dmp

      Filesize

      624KB