Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
accfe27eb390b4e050cb0fdb3c5033d1.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
accfe27eb390b4e050cb0fdb3c5033d1.exe
Resource
win10v2004-20240226-en
General
-
Target
accfe27eb390b4e050cb0fdb3c5033d1.exe
-
Size
427KB
-
MD5
accfe27eb390b4e050cb0fdb3c5033d1
-
SHA1
97ec772f393f1fb470218766c35ef13607987b6c
-
SHA256
9f2b005f15ac853198688819b7fe501ee0fd091b862909689e77f37d9b0cccd9
-
SHA512
a4a1c36426b88dcfcc92c272e68de3a92fe1124f751cc6815b306d5dfec4c8e6e45f6764bb317149dba19f14959eb808a5c61ee3bf4028cdcf33ce8714508100
-
SSDEEP
12288:ld53TvpHeIl0nh4Yl09G+LslECRD5NViOf:ld53TvpHeIl0nv09G1TzT/
Malware Config
Extracted
warzonerat
178.170.138.163:4554
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral2/memory/1720-3-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/1720-5-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/1720-6-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/1720-7-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4536 set thread context of 1720 4536 accfe27eb390b4e050cb0fdb3c5033d1.exe 89 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4536 accfe27eb390b4e050cb0fdb3c5033d1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4536 wrote to memory of 1720 4536 accfe27eb390b4e050cb0fdb3c5033d1.exe 89 PID 4536 wrote to memory of 1720 4536 accfe27eb390b4e050cb0fdb3c5033d1.exe 89 PID 4536 wrote to memory of 1720 4536 accfe27eb390b4e050cb0fdb3c5033d1.exe 89 PID 4536 wrote to memory of 1720 4536 accfe27eb390b4e050cb0fdb3c5033d1.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\accfe27eb390b4e050cb0fdb3c5033d1.exe"C:\Users\Admin\AppData\Local\Temp\accfe27eb390b4e050cb0fdb3c5033d1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\accfe27eb390b4e050cb0fdb3c5033d1.exe"C:\Users\Admin\AppData\Local\Temp\accfe27eb390b4e050cb0fdb3c5033d1.exe"2⤵PID:1720
-