Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-02-2024 13:44

General

  • Target

    a67e7e5c5271fda729143052d48dd615.exe

  • Size

    236KB

  • MD5

    a67e7e5c5271fda729143052d48dd615

  • SHA1

    bb1f7cd0043595bf26c7f2fc1473c12fbd66fc28

  • SHA256

    4e9666f55da5bbfbcddfb9b6066d4c1eca7a3092e0456999b6e3408c2e3edfbc

  • SHA512

    35a4fc62e1b763d38f86655384879f50b2025885ce3bb038b026b6ae599946046112cbeca71f818cc44b74755037a54960bd30b53cf3a944e105bcd4bda83b9d

  • SSDEEP

    3072:AyWUYAlmXkJr4Dul8kZyLA93qlUD2mvwV6bFcHSRoodGv8Z36CxVYwwBJ785v7W6:AksBi17NCFYp3rtHmqbK65/

Malware Config

Extracted

Family

warzonerat

C2

185.140.53.41:2104

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • ReZer0 packer 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Warzone RAT payload 4 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a67e7e5c5271fda729143052d48dd615.exe
    "C:\Users\Admin\AppData\Local\Temp\a67e7e5c5271fda729143052d48dd615.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Windows security modification
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3508
    • C:\Users\Admin\AppData\Local\Temp\a67e7e5c5271fda729143052d48dd615.exe
      "C:\Users\Admin\AppData\Local\Temp\a67e7e5c5271fda729143052d48dd615.exe"
      2⤵
        PID:3168
      • C:\Users\Admin\AppData\Local\Temp\a67e7e5c5271fda729143052d48dd615.exe
        "C:\Users\Admin\AppData\Local\Temp\a67e7e5c5271fda729143052d48dd615.exe"
        2⤵
          PID:3460
        • C:\Users\Admin\AppData\Local\Temp\a67e7e5c5271fda729143052d48dd615.exe
          "C:\Users\Admin\AppData\Local\Temp\a67e7e5c5271fda729143052d48dd615.exe"
          2⤵
            PID:3780
          • C:\Users\Admin\AppData\Local\Temp\a67e7e5c5271fda729143052d48dd615.exe
            "C:\Users\Admin\AppData\Local\Temp\a67e7e5c5271fda729143052d48dd615.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4000
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell Add-MpPreference -ExclusionPath C:\
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4564
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe"
              3⤵
                PID:1628

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Persistence

          Create or Modify System Process

          1
          T1543

          Windows Service

          1
          T1543.003

          Privilege Escalation

          Create or Modify System Process

          1
          T1543

          Windows Service

          1
          T1543.003

          Defense Evasion

          Modify Registry

          2
          T1112

          Impair Defenses

          2
          T1562

          Disable or Modify Tools

          2
          T1562.001

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
            Filesize

            2KB

            MD5

            968cb9309758126772781b83adb8a28f

            SHA1

            8da30e71accf186b2ba11da1797cf67f8f78b47c

            SHA256

            92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

            SHA512

            4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            18KB

            MD5

            46e10a0c6d8bfb06509acbac074905dc

            SHA1

            4d433359864b6d2d5d7a35756e62f90a31c0ca25

            SHA256

            ddff7079f00b98a988cb499d75a42e0e4acc36e2d48b1ec94d5725a87ac32596

            SHA512

            7e7f1580e80b1bc2fe35e9a38ec329e55b59d849f3f4853fe2746094854b3f6111b4d508512a3d36c5f92d1d5b481f3007bfde1977a45ac45f6581b767a819cd

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ii1mj1gp.5qm.ps1
            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • memory/1628-78-0x0000000000D90000-0x0000000000D91000-memory.dmp
            Filesize

            4KB

          • memory/1704-0-0x0000000074AB0000-0x0000000075260000-memory.dmp
            Filesize

            7.7MB

          • memory/1704-1-0x0000000000460000-0x00000000004A2000-memory.dmp
            Filesize

            264KB

          • memory/1704-2-0x00000000053A0000-0x0000000005944000-memory.dmp
            Filesize

            5.6MB

          • memory/1704-3-0x0000000004E90000-0x0000000004F22000-memory.dmp
            Filesize

            584KB

          • memory/1704-4-0x0000000005030000-0x00000000050CC000-memory.dmp
            Filesize

            624KB

          • memory/1704-5-0x0000000005020000-0x0000000005030000-memory.dmp
            Filesize

            64KB

          • memory/1704-6-0x00000000050F0000-0x00000000050FA000-memory.dmp
            Filesize

            40KB

          • memory/1704-7-0x0000000005100000-0x0000000005108000-memory.dmp
            Filesize

            32KB

          • memory/1704-8-0x0000000005220000-0x0000000005262000-memory.dmp
            Filesize

            264KB

          • memory/1704-9-0x0000000005B50000-0x0000000005B78000-memory.dmp
            Filesize

            160KB

          • memory/1704-61-0x0000000074AB0000-0x0000000075260000-memory.dmp
            Filesize

            7.7MB

          • memory/3508-32-0x00000000704B0000-0x00000000704FC000-memory.dmp
            Filesize

            304KB

          • memory/3508-49-0x00000000073C0000-0x00000000073CE000-memory.dmp
            Filesize

            56KB

          • memory/3508-12-0x00000000048F0000-0x0000000004900000-memory.dmp
            Filesize

            64KB

          • memory/3508-13-0x00000000048F0000-0x0000000004900000-memory.dmp
            Filesize

            64KB

          • memory/3508-14-0x0000000004F70000-0x0000000005598000-memory.dmp
            Filesize

            6.2MB

          • memory/3508-15-0x0000000004DC0000-0x0000000004DE2000-memory.dmp
            Filesize

            136KB

          • memory/3508-16-0x0000000005710000-0x0000000005776000-memory.dmp
            Filesize

            408KB

          • memory/3508-22-0x0000000005830000-0x0000000005896000-memory.dmp
            Filesize

            408KB

          • memory/3508-23-0x00000000058A0000-0x0000000005BF4000-memory.dmp
            Filesize

            3.3MB

          • memory/3508-28-0x0000000005E90000-0x0000000005EAE000-memory.dmp
            Filesize

            120KB

          • memory/3508-29-0x0000000006190000-0x00000000061DC000-memory.dmp
            Filesize

            304KB

          • memory/3508-30-0x00000000048F0000-0x0000000004900000-memory.dmp
            Filesize

            64KB

          • memory/3508-31-0x0000000006460000-0x0000000006492000-memory.dmp
            Filesize

            200KB

          • memory/3508-10-0x0000000004900000-0x0000000004936000-memory.dmp
            Filesize

            216KB

          • memory/3508-42-0x0000000006430000-0x000000000644E000-memory.dmp
            Filesize

            120KB

          • memory/3508-43-0x0000000007060000-0x0000000007103000-memory.dmp
            Filesize

            652KB

          • memory/3508-44-0x00000000077E0000-0x0000000007E5A000-memory.dmp
            Filesize

            6.5MB

          • memory/3508-45-0x0000000007190000-0x00000000071AA000-memory.dmp
            Filesize

            104KB

          • memory/3508-46-0x0000000007200000-0x000000000720A000-memory.dmp
            Filesize

            40KB

          • memory/3508-47-0x0000000007410000-0x00000000074A6000-memory.dmp
            Filesize

            600KB

          • memory/3508-48-0x0000000007390000-0x00000000073A1000-memory.dmp
            Filesize

            68KB

          • memory/3508-11-0x0000000074AB0000-0x0000000075260000-memory.dmp
            Filesize

            7.7MB

          • memory/3508-50-0x00000000073D0000-0x00000000073E4000-memory.dmp
            Filesize

            80KB

          • memory/3508-51-0x00000000074D0000-0x00000000074EA000-memory.dmp
            Filesize

            104KB

          • memory/3508-52-0x00000000074B0000-0x00000000074B8000-memory.dmp
            Filesize

            32KB

          • memory/3508-55-0x0000000074AB0000-0x0000000075260000-memory.dmp
            Filesize

            7.7MB

          • memory/4000-56-0x0000000000400000-0x0000000000551000-memory.dmp
            Filesize

            1.3MB

          • memory/4000-59-0x0000000000400000-0x0000000000551000-memory.dmp
            Filesize

            1.3MB

          • memory/4000-60-0x0000000000400000-0x0000000000551000-memory.dmp
            Filesize

            1.3MB

          • memory/4000-96-0x0000000000400000-0x0000000000551000-memory.dmp
            Filesize

            1.3MB

          • memory/4564-75-0x0000000005B40000-0x0000000005E94000-memory.dmp
            Filesize

            3.3MB

          • memory/4564-65-0x0000000004C60000-0x0000000004C70000-memory.dmp
            Filesize

            64KB

          • memory/4564-64-0x0000000004C60000-0x0000000004C70000-memory.dmp
            Filesize

            64KB

          • memory/4564-77-0x00000000062B0000-0x00000000062FC000-memory.dmp
            Filesize

            304KB

          • memory/4564-80-0x0000000004C60000-0x0000000004C70000-memory.dmp
            Filesize

            64KB

          • memory/4564-81-0x0000000071020000-0x000000007106C000-memory.dmp
            Filesize

            304KB

          • memory/4564-91-0x0000000007450000-0x00000000074F3000-memory.dmp
            Filesize

            652KB

          • memory/4564-92-0x00000000075D0000-0x00000000075E1000-memory.dmp
            Filesize

            68KB

          • memory/4564-93-0x0000000007750000-0x0000000007764000-memory.dmp
            Filesize

            80KB

          • memory/4564-95-0x00000000744B0000-0x0000000074C60000-memory.dmp
            Filesize

            7.7MB

          • memory/4564-63-0x00000000744B0000-0x0000000074C60000-memory.dmp
            Filesize

            7.7MB