Analysis

  • max time kernel
    145s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 05:55

General

  • Target

    c0040f766e00d637175af639b045ab46.exe

  • Size

    860KB

  • MD5

    c0040f766e00d637175af639b045ab46

  • SHA1

    847a316a9783175bd453f2566493bcf9144d0367

  • SHA256

    be5ef0b2a1d70b1131de82932bba6f0008e0dfe58ddfcbcc796f773c7a9b3284

  • SHA512

    fdefed2ea551a95e4ddcb5649181327c840e559462bbb3421be18961d45b69377f9cbc0d47e0a49dbea9de120bf8f72e3f2a48bce8a1141bd45c2bd9a8698a7d

  • SSDEEP

    24576:/YW8kw+fCycXfYK0aH1EyAGcC9mIzUewRTCs:QW8kXqyWfYSHfS

Malware Config

Extracted

Family

warzonerat

C2

84.38.133.199:5200

Signatures

  • Detects BazaLoader malware 4 IoCs

    BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0040f766e00d637175af639b045ab46.exe
    "C:\Users\Admin\AppData\Local\Temp\c0040f766e00d637175af639b045ab46.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Users\Admin\AppData\Local\Temp\c0040f766e00d637175af639b045ab46.exe
      "C:\Users\Admin\AppData\Local\Temp\c0040f766e00d637175af639b045ab46.exe"
      2⤵
        PID:220
      • C:\Users\Admin\AppData\Local\Temp\c0040f766e00d637175af639b045ab46.exe
        "C:\Users\Admin\AppData\Local\Temp\c0040f766e00d637175af639b045ab46.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1888
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell Add-MpPreference -ExclusionPath C:\
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2120
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe"
          3⤵
            PID:3276
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4140 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:1616

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_anc1bhc2.t3f.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/1112-10-0x00000000750C0000-0x0000000075671000-memory.dmp

          Filesize

          5.7MB

        • memory/1112-1-0x00000000750C0000-0x0000000075671000-memory.dmp

          Filesize

          5.7MB

        • memory/1112-2-0x0000000000FE0000-0x0000000000FF0000-memory.dmp

          Filesize

          64KB

        • memory/1112-3-0x00000000750C0000-0x0000000075671000-memory.dmp

          Filesize

          5.7MB

        • memory/1112-4-0x0000000000FE0000-0x0000000000FF0000-memory.dmp

          Filesize

          64KB

        • memory/1112-5-0x0000000000FE0000-0x0000000000FF0000-memory.dmp

          Filesize

          64KB

        • memory/1112-0-0x00000000750C0000-0x0000000075671000-memory.dmp

          Filesize

          5.7MB

        • memory/1888-11-0x0000000000400000-0x000000000055E000-memory.dmp

          Filesize

          1.4MB

        • memory/1888-6-0x0000000000400000-0x000000000055E000-memory.dmp

          Filesize

          1.4MB

        • memory/1888-35-0x0000000000400000-0x000000000055E000-memory.dmp

          Filesize

          1.4MB

        • memory/1888-9-0x0000000000400000-0x000000000055E000-memory.dmp

          Filesize

          1.4MB

        • memory/2120-34-0x0000000004680000-0x0000000004690000-memory.dmp

          Filesize

          64KB

        • memory/2120-36-0x0000000006BB0000-0x0000000006BE2000-memory.dmp

          Filesize

          200KB

        • memory/2120-17-0x0000000004680000-0x0000000004690000-memory.dmp

          Filesize

          64KB

        • memory/2120-18-0x0000000004CC0000-0x00000000052E8000-memory.dmp

          Filesize

          6.2MB

        • memory/2120-19-0x00000000052F0000-0x0000000005312000-memory.dmp

          Filesize

          136KB

        • memory/2120-20-0x0000000005510000-0x0000000005576000-memory.dmp

          Filesize

          408KB

        • memory/2120-15-0x0000000004680000-0x0000000004690000-memory.dmp

          Filesize

          64KB

        • memory/2120-22-0x00000000055F0000-0x0000000005656000-memory.dmp

          Filesize

          408KB

        • memory/2120-31-0x0000000005760000-0x0000000005AB4000-memory.dmp

          Filesize

          3.3MB

        • memory/2120-32-0x0000000005C00000-0x0000000005C1E000-memory.dmp

          Filesize

          120KB

        • memory/2120-33-0x0000000005C50000-0x0000000005C9C000-memory.dmp

          Filesize

          304KB

        • memory/2120-14-0x00000000747C0000-0x0000000074F70000-memory.dmp

          Filesize

          7.7MB

        • memory/2120-60-0x00000000747C0000-0x0000000074F70000-memory.dmp

          Filesize

          7.7MB

        • memory/2120-16-0x0000000004640000-0x0000000004676000-memory.dmp

          Filesize

          216KB

        • memory/2120-37-0x0000000070B60000-0x0000000070BAC000-memory.dmp

          Filesize

          304KB

        • memory/2120-47-0x0000000006B70000-0x0000000006B8E000-memory.dmp

          Filesize

          120KB

        • memory/2120-48-0x0000000006DF0000-0x0000000006E93000-memory.dmp

          Filesize

          652KB

        • memory/2120-49-0x0000000007570000-0x0000000007BEA000-memory.dmp

          Filesize

          6.5MB

        • memory/2120-50-0x0000000006F30000-0x0000000006F4A000-memory.dmp

          Filesize

          104KB

        • memory/2120-51-0x0000000006FA0000-0x0000000006FAA000-memory.dmp

          Filesize

          40KB

        • memory/2120-52-0x00000000071B0000-0x0000000007246000-memory.dmp

          Filesize

          600KB

        • memory/2120-53-0x0000000007130000-0x0000000007141000-memory.dmp

          Filesize

          68KB

        • memory/2120-54-0x0000000007160000-0x000000000716E000-memory.dmp

          Filesize

          56KB

        • memory/2120-55-0x0000000007170000-0x0000000007184000-memory.dmp

          Filesize

          80KB

        • memory/2120-56-0x0000000007270000-0x000000000728A000-memory.dmp

          Filesize

          104KB

        • memory/2120-57-0x0000000007250000-0x0000000007258000-memory.dmp

          Filesize

          32KB

        • memory/3276-12-0x00000000013A0000-0x00000000013A1000-memory.dmp

          Filesize

          4KB