Analysis
-
max time kernel
136s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-02-2024 13:44
Static task
static1
Behavioral task
behavioral1
Sample
a67e7e5c5271fda729143052d48dd615.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a67e7e5c5271fda729143052d48dd615.exe
Resource
win10v2004-20240221-en
General
-
Target
a67e7e5c5271fda729143052d48dd615.exe
-
Size
236KB
-
MD5
a67e7e5c5271fda729143052d48dd615
-
SHA1
bb1f7cd0043595bf26c7f2fc1473c12fbd66fc28
-
SHA256
4e9666f55da5bbfbcddfb9b6066d4c1eca7a3092e0456999b6e3408c2e3edfbc
-
SHA512
35a4fc62e1b763d38f86655384879f50b2025885ce3bb038b026b6ae599946046112cbeca71f818cc44b74755037a54960bd30b53cf3a944e105bcd4bda83b9d
-
SSDEEP
3072:AyWUYAlmXkJr4Dul8kZyLA93qlUD2mvwV6bFcHSRoodGv8Z36CxVYwwBJ785v7W6:AksBi17NCFYp3rtHmqbK65/
Malware Config
Extracted
warzonerat
185.140.53.41:2104
Signatures
-
Processes:
a67e7e5c5271fda729143052d48dd615.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a67e7e5c5271fda729143052d48dd615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a67e7e5c5271fda729143052d48dd615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a67e7e5c5271fda729143052d48dd615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a67e7e5c5271fda729143052d48dd615.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/2856-5-0x0000000000A90000-0x0000000000AB8000-memory.dmp rezer0 -
Warzone RAT payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/2732-15-0x0000000000400000-0x0000000000551000-memory.dmp warzonerat behavioral1/memory/2732-16-0x0000000000400000-0x0000000000551000-memory.dmp warzonerat behavioral1/memory/2732-17-0x0000000000400000-0x0000000000551000-memory.dmp warzonerat behavioral1/memory/2732-18-0x0000000000400000-0x0000000000551000-memory.dmp warzonerat behavioral1/memory/2732-21-0x0000000000400000-0x0000000000551000-memory.dmp warzonerat behavioral1/memory/2732-23-0x0000000000400000-0x0000000000551000-memory.dmp warzonerat behavioral1/memory/2732-24-0x0000000000400000-0x0000000000551000-memory.dmp warzonerat behavioral1/memory/2732-42-0x0000000000400000-0x0000000000551000-memory.dmp warzonerat -
Processes:
a67e7e5c5271fda729143052d48dd615.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features a67e7e5c5271fda729143052d48dd615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a67e7e5c5271fda729143052d48dd615.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a67e7e5c5271fda729143052d48dd615.exedescription pid process target process PID 2856 set thread context of 2732 2856 a67e7e5c5271fda729143052d48dd615.exe a67e7e5c5271fda729143052d48dd615.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exea67e7e5c5271fda729143052d48dd615.exepowershell.exepid process 1984 powershell.exe 2856 a67e7e5c5271fda729143052d48dd615.exe 2688 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exea67e7e5c5271fda729143052d48dd615.exepowershell.exedescription pid process Token: SeDebugPrivilege 1984 powershell.exe Token: SeDebugPrivilege 2856 a67e7e5c5271fda729143052d48dd615.exe Token: SeDebugPrivilege 2688 powershell.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
a67e7e5c5271fda729143052d48dd615.exea67e7e5c5271fda729143052d48dd615.exedescription pid process target process PID 2856 wrote to memory of 1984 2856 a67e7e5c5271fda729143052d48dd615.exe powershell.exe PID 2856 wrote to memory of 1984 2856 a67e7e5c5271fda729143052d48dd615.exe powershell.exe PID 2856 wrote to memory of 1984 2856 a67e7e5c5271fda729143052d48dd615.exe powershell.exe PID 2856 wrote to memory of 1984 2856 a67e7e5c5271fda729143052d48dd615.exe powershell.exe PID 2856 wrote to memory of 2732 2856 a67e7e5c5271fda729143052d48dd615.exe a67e7e5c5271fda729143052d48dd615.exe PID 2856 wrote to memory of 2732 2856 a67e7e5c5271fda729143052d48dd615.exe a67e7e5c5271fda729143052d48dd615.exe PID 2856 wrote to memory of 2732 2856 a67e7e5c5271fda729143052d48dd615.exe a67e7e5c5271fda729143052d48dd615.exe PID 2856 wrote to memory of 2732 2856 a67e7e5c5271fda729143052d48dd615.exe a67e7e5c5271fda729143052d48dd615.exe PID 2856 wrote to memory of 2732 2856 a67e7e5c5271fda729143052d48dd615.exe a67e7e5c5271fda729143052d48dd615.exe PID 2856 wrote to memory of 2732 2856 a67e7e5c5271fda729143052d48dd615.exe a67e7e5c5271fda729143052d48dd615.exe PID 2856 wrote to memory of 2732 2856 a67e7e5c5271fda729143052d48dd615.exe a67e7e5c5271fda729143052d48dd615.exe PID 2856 wrote to memory of 2732 2856 a67e7e5c5271fda729143052d48dd615.exe a67e7e5c5271fda729143052d48dd615.exe PID 2856 wrote to memory of 2732 2856 a67e7e5c5271fda729143052d48dd615.exe a67e7e5c5271fda729143052d48dd615.exe PID 2856 wrote to memory of 2732 2856 a67e7e5c5271fda729143052d48dd615.exe a67e7e5c5271fda729143052d48dd615.exe PID 2856 wrote to memory of 2732 2856 a67e7e5c5271fda729143052d48dd615.exe a67e7e5c5271fda729143052d48dd615.exe PID 2856 wrote to memory of 2732 2856 a67e7e5c5271fda729143052d48dd615.exe a67e7e5c5271fda729143052d48dd615.exe PID 2732 wrote to memory of 2688 2732 a67e7e5c5271fda729143052d48dd615.exe powershell.exe PID 2732 wrote to memory of 2688 2732 a67e7e5c5271fda729143052d48dd615.exe powershell.exe PID 2732 wrote to memory of 2688 2732 a67e7e5c5271fda729143052d48dd615.exe powershell.exe PID 2732 wrote to memory of 2688 2732 a67e7e5c5271fda729143052d48dd615.exe powershell.exe PID 2732 wrote to memory of 2760 2732 a67e7e5c5271fda729143052d48dd615.exe cmd.exe PID 2732 wrote to memory of 2760 2732 a67e7e5c5271fda729143052d48dd615.exe cmd.exe PID 2732 wrote to memory of 2760 2732 a67e7e5c5271fda729143052d48dd615.exe cmd.exe PID 2732 wrote to memory of 2760 2732 a67e7e5c5271fda729143052d48dd615.exe cmd.exe PID 2732 wrote to memory of 2760 2732 a67e7e5c5271fda729143052d48dd615.exe cmd.exe PID 2732 wrote to memory of 2760 2732 a67e7e5c5271fda729143052d48dd615.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a67e7e5c5271fda729143052d48dd615.exe"C:\Users\Admin\AppData\Local\Temp\a67e7e5c5271fda729143052d48dd615.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security modification
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\a67e7e5c5271fda729143052d48dd615.exe"C:\Users\Admin\AppData\Local\Temp\a67e7e5c5271fda729143052d48dd615.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD53171917bc5837a8bfaacb6441b40a9eb
SHA178e2300e374d7a81c523d390d0f85f7d04fc5a53
SHA256713795cf118a92411c67e69c22ec3d6a8e4d557c83d9b09a5b1970519308c55d
SHA512b4b6a85846fd6a21742cd8b182e85c0c76fd4db4124254f232da0b33dc4f88a3104ad8c9ecfb55113eb9086fe5c2cca2f2a7482da4147afb6b3955425894c24a
-
memory/1984-9-0x000000006FB30000-0x00000000700DB000-memory.dmpFilesize
5.7MB
-
memory/1984-8-0x000000006FB30000-0x00000000700DB000-memory.dmpFilesize
5.7MB
-
memory/1984-11-0x000000006FB30000-0x00000000700DB000-memory.dmpFilesize
5.7MB
-
memory/1984-10-0x0000000002800000-0x0000000002840000-memory.dmpFilesize
256KB
-
memory/2688-31-0x0000000002F30000-0x0000000002F70000-memory.dmpFilesize
256KB
-
memory/2688-30-0x000000006F7A0000-0x000000006FD4B000-memory.dmpFilesize
5.7MB
-
memory/2688-41-0x000000006F7A0000-0x000000006FD4B000-memory.dmpFilesize
5.7MB
-
memory/2688-33-0x0000000002F30000-0x0000000002F70000-memory.dmpFilesize
256KB
-
memory/2688-32-0x000000006F7A0000-0x000000006FD4B000-memory.dmpFilesize
5.7MB
-
memory/2732-14-0x0000000000400000-0x0000000000551000-memory.dmpFilesize
1.3MB
-
memory/2732-19-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2732-17-0x0000000000400000-0x0000000000551000-memory.dmpFilesize
1.3MB
-
memory/2732-15-0x0000000000400000-0x0000000000551000-memory.dmpFilesize
1.3MB
-
memory/2732-16-0x0000000000400000-0x0000000000551000-memory.dmpFilesize
1.3MB
-
memory/2732-42-0x0000000000400000-0x0000000000551000-memory.dmpFilesize
1.3MB
-
memory/2732-12-0x0000000000400000-0x0000000000551000-memory.dmpFilesize
1.3MB
-
memory/2732-18-0x0000000000400000-0x0000000000551000-memory.dmpFilesize
1.3MB
-
memory/2732-21-0x0000000000400000-0x0000000000551000-memory.dmpFilesize
1.3MB
-
memory/2732-23-0x0000000000400000-0x0000000000551000-memory.dmpFilesize
1.3MB
-
memory/2732-24-0x0000000000400000-0x0000000000551000-memory.dmpFilesize
1.3MB
-
memory/2732-13-0x0000000000400000-0x0000000000551000-memory.dmpFilesize
1.3MB
-
memory/2760-37-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/2760-35-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/2856-1-0x0000000074AB0000-0x000000007519E000-memory.dmpFilesize
6.9MB
-
memory/2856-4-0x00000000004B0000-0x00000000004F2000-memory.dmpFilesize
264KB
-
memory/2856-34-0x0000000074AB0000-0x000000007519E000-memory.dmpFilesize
6.9MB
-
memory/2856-2-0x0000000004720000-0x0000000004760000-memory.dmpFilesize
256KB
-
memory/2856-3-0x0000000000490000-0x0000000000498000-memory.dmpFilesize
32KB
-
memory/2856-0-0x0000000001290000-0x00000000012D2000-memory.dmpFilesize
264KB
-
memory/2856-5-0x0000000000A90000-0x0000000000AB8000-memory.dmpFilesize
160KB