Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14-02-2024 05:21

General

  • Target

    3e4da5132877e955fb455e58e300b56033c07a6d2709b386fdc5c43a88e1c499.exe

  • Size

    534KB

  • MD5

    16cd177899279d5d2d27443286ccc41b

  • SHA1

    91c1ee553aa8ac4cd24ef5800c6ac12da7becdee

  • SHA256

    3e4da5132877e955fb455e58e300b56033c07a6d2709b386fdc5c43a88e1c499

  • SHA512

    d1175ab4e807d9950f58b92663cf905413f6c73c5b5c3edf118ae9ae24455e20ed815169b6c279096fd0d7527784713300d66a4a77202b86b1a74c46d08b58c4

  • SSDEEP

    12288:NhxeQ5vzivb4wd+czsvcw0rciBgZzZzw288So7y:Nhxriz4wd+xclubszo

Malware Config

Extracted

Family

warzonerat

C2

makatti.duckdns.org:3787

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 8 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e4da5132877e955fb455e58e300b56033c07a6d2709b386fdc5c43a88e1c499.exe
    "C:\Users\Admin\AppData\Local\Temp\3e4da5132877e955fb455e58e300b56033c07a6d2709b386fdc5c43a88e1c499.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ERLoYztAgGbJ.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2788
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ERLoYztAgGbJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7FCA.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2780
    • C:\Users\Admin\AppData\Local\Temp\3e4da5132877e955fb455e58e300b56033c07a6d2709b386fdc5c43a88e1c499.exe
      "C:\Users\Admin\AppData\Local\Temp\3e4da5132877e955fb455e58e300b56033c07a6d2709b386fdc5c43a88e1c499.exe"
      2⤵
        PID:2588

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp7FCA.tmp

      Filesize

      1KB

      MD5

      b359699c58fffb2f9b2290ba47a091cf

      SHA1

      056c409bb8746aff177b3960c6ca9e12a5f4fa8e

      SHA256

      8b0dac3080721e82b6c565df297bcfe10cdc187b44f500621ab3260123b5e90f

      SHA512

      e1b4ad8637f0e3fef18f7429faf495d9ef63982ecfddbc62ab48e681d5f1b816f546f6777b7b3f3c1d9b74f8a4afd2df6c673b95a0965672ac8363e314c8c290

    • memory/2588-25-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/2588-18-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/2588-19-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/2588-29-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/2588-20-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/2588-23-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/2588-14-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/2588-21-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2588-15-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/2588-16-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/2588-17-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/2788-28-0x000000006D690000-0x000000006DC3B000-memory.dmp

      Filesize

      5.7MB

    • memory/2788-30-0x0000000002440000-0x0000000002480000-memory.dmp

      Filesize

      256KB

    • memory/2788-33-0x000000006D690000-0x000000006DC3B000-memory.dmp

      Filesize

      5.7MB

    • memory/2788-31-0x0000000002440000-0x0000000002480000-memory.dmp

      Filesize

      256KB

    • memory/2788-32-0x0000000002440000-0x0000000002480000-memory.dmp

      Filesize

      256KB

    • memory/2788-27-0x000000006D690000-0x000000006DC3B000-memory.dmp

      Filesize

      5.7MB

    • memory/2808-0-0x0000000000800000-0x000000000088C000-memory.dmp

      Filesize

      560KB

    • memory/2808-26-0x0000000074660000-0x0000000074D4E000-memory.dmp

      Filesize

      6.9MB

    • memory/2808-2-0x0000000004940000-0x0000000004980000-memory.dmp

      Filesize

      256KB

    • memory/2808-4-0x0000000000520000-0x000000000052A000-memory.dmp

      Filesize

      40KB

    • memory/2808-3-0x0000000000480000-0x0000000000494000-memory.dmp

      Filesize

      80KB

    • memory/2808-6-0x00000000007A0000-0x0000000000800000-memory.dmp

      Filesize

      384KB

    • memory/2808-1-0x0000000074660000-0x0000000074D4E000-memory.dmp

      Filesize

      6.9MB

    • memory/2808-5-0x0000000000740000-0x000000000074E000-memory.dmp

      Filesize

      56KB