Analysis

  • max time kernel
    139s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-02-2024 22:44

General

  • Target

    afa887c1eb5644f68522d1a298942459.exe

  • Size

    236KB

  • MD5

    afa887c1eb5644f68522d1a298942459

  • SHA1

    4d0feb5610502cb7f33a5d7e6e93922d6b26a1b2

  • SHA256

    2fd08e554d205eff9cc16a27e59b94abad98311738a109b8efe3523291833c3c

  • SHA512

    f746e91bc6981e6f53f95f032e901ddbad7edcbde004f189d350552d6f558310a0227535b8c086b5f0f88107a8e721aedf12c35764a9dcc41f9831fa642f4c23

  • SSDEEP

    3072:PWUYAlmXkJr4Dul8kZyLA93qlUD2mvwV6bFcHSRoodGv8Z36CxVYwwBJ785v7W8g:vsBi17NCFYp3rtHmqbK65K

Malware Config

Extracted

Family

warzonerat

C2

185.140.53.41:2104

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • ReZer0 packer 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Warzone RAT payload 4 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afa887c1eb5644f68522d1a298942459.exe
    "C:\Users\Admin\AppData\Local\Temp\afa887c1eb5644f68522d1a298942459.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Windows security modification
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1908
    • C:\Users\Admin\AppData\Local\Temp\afa887c1eb5644f68522d1a298942459.exe
      "C:\Users\Admin\AppData\Local\Temp\afa887c1eb5644f68522d1a298942459.exe"
      2⤵
        PID:4592
      • C:\Users\Admin\AppData\Local\Temp\afa887c1eb5644f68522d1a298942459.exe
        "C:\Users\Admin\AppData\Local\Temp\afa887c1eb5644f68522d1a298942459.exe"
        2⤵
          PID:2536
        • C:\Users\Admin\AppData\Local\Temp\afa887c1eb5644f68522d1a298942459.exe
          "C:\Users\Admin\AppData\Local\Temp\afa887c1eb5644f68522d1a298942459.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1876
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell Add-MpPreference -ExclusionPath C:\
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3600
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe"
            3⤵
              PID:3352

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Persistence

        Create or Modify System Process

        1
        T1543

        Windows Service

        1
        T1543.003

        Privilege Escalation

        Create or Modify System Process

        1
        T1543

        Windows Service

        1
        T1543.003

        Defense Evasion

        Modify Registry

        2
        T1112

        Impair Defenses

        2
        T1562

        Disable or Modify Tools

        2
        T1562.001

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
          Filesize

          2KB

          MD5

          968cb9309758126772781b83adb8a28f

          SHA1

          8da30e71accf186b2ba11da1797cf67f8f78b47c

          SHA256

          92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

          SHA512

          4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          Filesize

          18KB

          MD5

          957a58a5c84d7441e6bccb3b897a1b84

          SHA1

          55dfe7c6608016c7d78b6ec478ff9f0bbea5de4e

          SHA256

          d7eaa9fda55e84dedcb910ccf597c8fcd8277b214915145da7edcf22ad3f09b9

          SHA512

          8eb93ee0fdb4625f2ed4fa9f331143e9f94d09874e7b281c420f2db31cd3e2feddf189ea8346513b87e40f63c7c25e8765126db47c26110dd2d8fd52e28cfa4c

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gwexpaai.2sn.ps1
          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/1492-4-0x00000000052A0000-0x000000000533C000-memory.dmp
          Filesize

          624KB

        • memory/1492-0-0x0000000000710000-0x0000000000752000-memory.dmp
          Filesize

          264KB

        • memory/1492-5-0x00000000050F0000-0x0000000005100000-memory.dmp
          Filesize

          64KB

        • memory/1492-6-0x0000000005210000-0x000000000521A000-memory.dmp
          Filesize

          40KB

        • memory/1492-7-0x0000000005220000-0x0000000005228000-memory.dmp
          Filesize

          32KB

        • memory/1492-8-0x0000000005240000-0x0000000005282000-memory.dmp
          Filesize

          264KB

        • memory/1492-9-0x00000000054F0000-0x0000000005518000-memory.dmp
          Filesize

          160KB

        • memory/1492-3-0x0000000005130000-0x00000000051C2000-memory.dmp
          Filesize

          584KB

        • memory/1492-2-0x00000000057B0000-0x0000000005D54000-memory.dmp
          Filesize

          5.6MB

        • memory/1492-1-0x0000000075000000-0x00000000757B0000-memory.dmp
          Filesize

          7.7MB

        • memory/1492-61-0x0000000075000000-0x00000000757B0000-memory.dmp
          Filesize

          7.7MB

        • memory/1876-99-0x0000000000400000-0x0000000000551000-memory.dmp
          Filesize

          1.3MB

        • memory/1876-62-0x0000000000400000-0x0000000000551000-memory.dmp
          Filesize

          1.3MB

        • memory/1876-60-0x0000000000400000-0x0000000000551000-memory.dmp
          Filesize

          1.3MB

        • memory/1876-57-0x0000000000400000-0x0000000000551000-memory.dmp
          Filesize

          1.3MB

        • memory/1908-14-0x0000000004C00000-0x0000000004C10000-memory.dmp
          Filesize

          64KB

        • memory/1908-16-0x0000000005870000-0x00000000058D6000-memory.dmp
          Filesize

          408KB

        • memory/1908-28-0x00000000061B0000-0x00000000061CE000-memory.dmp
          Filesize

          120KB

        • memory/1908-29-0x0000000006260000-0x00000000062AC000-memory.dmp
          Filesize

          304KB

        • memory/1908-30-0x000000007F890000-0x000000007F8A0000-memory.dmp
          Filesize

          64KB

        • memory/1908-31-0x0000000006780000-0x00000000067B2000-memory.dmp
          Filesize

          200KB

        • memory/1908-32-0x0000000070A00000-0x0000000070A4C000-memory.dmp
          Filesize

          304KB

        • memory/1908-43-0x0000000004C00000-0x0000000004C10000-memory.dmp
          Filesize

          64KB

        • memory/1908-42-0x0000000007380000-0x000000000739E000-memory.dmp
          Filesize

          120KB

        • memory/1908-44-0x00000000073A0000-0x0000000007443000-memory.dmp
          Filesize

          652KB

        • memory/1908-45-0x0000000007B20000-0x000000000819A000-memory.dmp
          Filesize

          6.5MB

        • memory/1908-46-0x00000000074E0000-0x00000000074FA000-memory.dmp
          Filesize

          104KB

        • memory/1908-47-0x0000000007550000-0x000000000755A000-memory.dmp
          Filesize

          40KB

        • memory/1908-48-0x0000000007760000-0x00000000077F6000-memory.dmp
          Filesize

          600KB

        • memory/1908-49-0x00000000076E0000-0x00000000076F1000-memory.dmp
          Filesize

          68KB

        • memory/1908-50-0x0000000007710000-0x000000000771E000-memory.dmp
          Filesize

          56KB

        • memory/1908-51-0x0000000007720000-0x0000000007734000-memory.dmp
          Filesize

          80KB

        • memory/1908-52-0x0000000007820000-0x000000000783A000-memory.dmp
          Filesize

          104KB

        • memory/1908-53-0x0000000007800000-0x0000000007808000-memory.dmp
          Filesize

          32KB

        • memory/1908-56-0x0000000075000000-0x00000000757B0000-memory.dmp
          Filesize

          7.7MB

        • memory/1908-17-0x0000000005AD0000-0x0000000005B36000-memory.dmp
          Filesize

          408KB

        • memory/1908-27-0x0000000005C80000-0x0000000005FD4000-memory.dmp
          Filesize

          3.3MB

        • memory/1908-15-0x0000000005070000-0x0000000005092000-memory.dmp
          Filesize

          136KB

        • memory/1908-12-0x0000000004C00000-0x0000000004C10000-memory.dmp
          Filesize

          64KB

        • memory/1908-13-0x0000000005240000-0x0000000005868000-memory.dmp
          Filesize

          6.2MB

        • memory/1908-10-0x0000000004B70000-0x0000000004BA6000-memory.dmp
          Filesize

          216KB

        • memory/1908-11-0x0000000075000000-0x00000000757B0000-memory.dmp
          Filesize

          7.7MB

        • memory/3352-79-0x0000000000B30000-0x0000000000B31000-memory.dmp
          Filesize

          4KB

        • memory/3600-82-0x0000000073B30000-0x0000000073B7C000-memory.dmp
          Filesize

          304KB

        • memory/3600-65-0x0000000004FF0000-0x0000000005000000-memory.dmp
          Filesize

          64KB

        • memory/3600-78-0x0000000006560000-0x00000000065AC000-memory.dmp
          Filesize

          304KB

        • memory/3600-76-0x0000000005EC0000-0x0000000006214000-memory.dmp
          Filesize

          3.3MB

        • memory/3600-81-0x000000007FB40000-0x000000007FB50000-memory.dmp
          Filesize

          64KB

        • memory/3600-66-0x0000000004FF0000-0x0000000005000000-memory.dmp
          Filesize

          64KB

        • memory/3600-92-0x0000000007750000-0x00000000077F3000-memory.dmp
          Filesize

          652KB

        • memory/3600-93-0x0000000004FF0000-0x0000000005000000-memory.dmp
          Filesize

          64KB

        • memory/3600-94-0x0000000004FF0000-0x0000000005000000-memory.dmp
          Filesize

          64KB

        • memory/3600-95-0x0000000007A90000-0x0000000007AA1000-memory.dmp
          Filesize

          68KB

        • memory/3600-96-0x0000000007AC0000-0x0000000007AD4000-memory.dmp
          Filesize

          80KB

        • memory/3600-98-0x0000000074910000-0x00000000750C0000-memory.dmp
          Filesize

          7.7MB

        • memory/3600-64-0x0000000074910000-0x00000000750C0000-memory.dmp
          Filesize

          7.7MB