Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 17:40
Static task
static1
Behavioral task
behavioral1
Sample
c67c1797ac06edcba5d78083ba87b357.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c67c1797ac06edcba5d78083ba87b357.exe
Resource
win10v2004-20240226-en
General
-
Target
c67c1797ac06edcba5d78083ba87b357.exe
-
Size
236KB
-
MD5
c67c1797ac06edcba5d78083ba87b357
-
SHA1
a37cd82dd4def1b73dc06c3a9f8210b884f64d46
-
SHA256
0c64978cf7ffc6b2ceaa4992de7ae4a05575babd79bcfecb57cc74ac3848ddde
-
SHA512
7d89c10193ea753e6a4206b0df15d0897b57a56ae53137d715efec724d754a38dd68eeb0ff11d9b9fd12afa54c51425252a541f5bd97a129304491ff33db5fd9
-
SSDEEP
3072:rWUYAlmXkJr4Dul8kZyLA93qlUD2mvwV6bFcHSRoodGv8Z36CxVYwwBJ785v7W8+:zsBi17NCFYp3rtHmqbK65Y
Malware Config
Extracted
warzonerat
185.140.53.41:2104
Signatures
-
Processes:
c67c1797ac06edcba5d78083ba87b357.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c67c1797ac06edcba5d78083ba87b357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c67c1797ac06edcba5d78083ba87b357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c67c1797ac06edcba5d78083ba87b357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c67c1797ac06edcba5d78083ba87b357.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral2/memory/1732-9-0x0000000005D80000-0x0000000005DA8000-memory.dmp rezer0 -
Warzone RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4640-58-0x0000000000400000-0x0000000000551000-memory.dmp warzonerat behavioral2/memory/4640-60-0x0000000000400000-0x0000000000551000-memory.dmp warzonerat behavioral2/memory/4640-62-0x0000000000400000-0x0000000000551000-memory.dmp warzonerat behavioral2/memory/4640-99-0x0000000000400000-0x0000000000551000-memory.dmp warzonerat -
Processes:
c67c1797ac06edcba5d78083ba87b357.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c67c1797ac06edcba5d78083ba87b357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c67c1797ac06edcba5d78083ba87b357.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c67c1797ac06edcba5d78083ba87b357.exedescription pid process target process PID 1732 set thread context of 4640 1732 c67c1797ac06edcba5d78083ba87b357.exe c67c1797ac06edcba5d78083ba87b357.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exec67c1797ac06edcba5d78083ba87b357.exepowershell.exepid process 1388 powershell.exe 1388 powershell.exe 1732 c67c1797ac06edcba5d78083ba87b357.exe 2836 powershell.exe 2836 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exec67c1797ac06edcba5d78083ba87b357.exepowershell.exedescription pid process Token: SeDebugPrivilege 1388 powershell.exe Token: SeDebugPrivilege 1732 c67c1797ac06edcba5d78083ba87b357.exe Token: SeDebugPrivilege 2836 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
c67c1797ac06edcba5d78083ba87b357.exec67c1797ac06edcba5d78083ba87b357.exedescription pid process target process PID 1732 wrote to memory of 1388 1732 c67c1797ac06edcba5d78083ba87b357.exe powershell.exe PID 1732 wrote to memory of 1388 1732 c67c1797ac06edcba5d78083ba87b357.exe powershell.exe PID 1732 wrote to memory of 1388 1732 c67c1797ac06edcba5d78083ba87b357.exe powershell.exe PID 1732 wrote to memory of 4640 1732 c67c1797ac06edcba5d78083ba87b357.exe c67c1797ac06edcba5d78083ba87b357.exe PID 1732 wrote to memory of 4640 1732 c67c1797ac06edcba5d78083ba87b357.exe c67c1797ac06edcba5d78083ba87b357.exe PID 1732 wrote to memory of 4640 1732 c67c1797ac06edcba5d78083ba87b357.exe c67c1797ac06edcba5d78083ba87b357.exe PID 1732 wrote to memory of 4640 1732 c67c1797ac06edcba5d78083ba87b357.exe c67c1797ac06edcba5d78083ba87b357.exe PID 1732 wrote to memory of 4640 1732 c67c1797ac06edcba5d78083ba87b357.exe c67c1797ac06edcba5d78083ba87b357.exe PID 1732 wrote to memory of 4640 1732 c67c1797ac06edcba5d78083ba87b357.exe c67c1797ac06edcba5d78083ba87b357.exe PID 1732 wrote to memory of 4640 1732 c67c1797ac06edcba5d78083ba87b357.exe c67c1797ac06edcba5d78083ba87b357.exe PID 1732 wrote to memory of 4640 1732 c67c1797ac06edcba5d78083ba87b357.exe c67c1797ac06edcba5d78083ba87b357.exe PID 1732 wrote to memory of 4640 1732 c67c1797ac06edcba5d78083ba87b357.exe c67c1797ac06edcba5d78083ba87b357.exe PID 1732 wrote to memory of 4640 1732 c67c1797ac06edcba5d78083ba87b357.exe c67c1797ac06edcba5d78083ba87b357.exe PID 1732 wrote to memory of 4640 1732 c67c1797ac06edcba5d78083ba87b357.exe c67c1797ac06edcba5d78083ba87b357.exe PID 4640 wrote to memory of 2836 4640 c67c1797ac06edcba5d78083ba87b357.exe powershell.exe PID 4640 wrote to memory of 2836 4640 c67c1797ac06edcba5d78083ba87b357.exe powershell.exe PID 4640 wrote to memory of 2836 4640 c67c1797ac06edcba5d78083ba87b357.exe powershell.exe PID 4640 wrote to memory of 1320 4640 c67c1797ac06edcba5d78083ba87b357.exe cmd.exe PID 4640 wrote to memory of 1320 4640 c67c1797ac06edcba5d78083ba87b357.exe cmd.exe PID 4640 wrote to memory of 1320 4640 c67c1797ac06edcba5d78083ba87b357.exe cmd.exe PID 4640 wrote to memory of 1320 4640 c67c1797ac06edcba5d78083ba87b357.exe cmd.exe PID 4640 wrote to memory of 1320 4640 c67c1797ac06edcba5d78083ba87b357.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c67c1797ac06edcba5d78083ba87b357.exe"C:\Users\Admin\AppData\Local\Temp\c67c1797ac06edcba5d78083ba87b357.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security modification
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\c67c1797ac06edcba5d78083ba87b357.exe"C:\Users\Admin\AppData\Local\Temp\c67c1797ac06edcba5d78083ba87b357.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD511d59016c34731bdad369de1f848ca5a
SHA14eedf4c128c5b5d99960ca84ccf80e92b9fd2888
SHA256cd93907a25e5251bd8ead26a3007b04a550c6faf9cafc9e6be139349c7e7c37a
SHA51205e6a7cb98061df01622a034521efa7b3b64a970cf50d09c87f4721747eccfc48accf0229acbeb2b611c06675814aac6a64124c7d29b05a9f04bdd90650e008a
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hzyleryk.qrh.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/1320-93-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/1388-45-0x0000000006F50000-0x0000000006FF3000-memory.dmpFilesize
652KB
-
memory/1388-31-0x0000000006F10000-0x0000000006F42000-memory.dmpFilesize
200KB
-
memory/1388-49-0x0000000007510000-0x00000000075A6000-memory.dmpFilesize
600KB
-
memory/1388-57-0x0000000075270000-0x0000000075A20000-memory.dmpFilesize
7.7MB
-
memory/1388-54-0x00000000075B0000-0x00000000075B8000-memory.dmpFilesize
32KB
-
memory/1388-53-0x00000000075D0000-0x00000000075EA000-memory.dmpFilesize
104KB
-
memory/1388-10-0x0000000002640000-0x0000000002676000-memory.dmpFilesize
216KB
-
memory/1388-12-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/1388-11-0x0000000075270000-0x0000000075A20000-memory.dmpFilesize
7.7MB
-
memory/1388-13-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/1388-14-0x00000000051F0000-0x0000000005818000-memory.dmpFilesize
6.2MB
-
memory/1388-15-0x0000000004FB0000-0x0000000004FD2000-memory.dmpFilesize
136KB
-
memory/1388-16-0x0000000005050000-0x00000000050B6000-memory.dmpFilesize
408KB
-
memory/1388-17-0x0000000005920000-0x0000000005986000-memory.dmpFilesize
408KB
-
memory/1388-52-0x00000000074D0000-0x00000000074E4000-memory.dmpFilesize
80KB
-
memory/1388-27-0x0000000005990000-0x0000000005CE4000-memory.dmpFilesize
3.3MB
-
memory/1388-28-0x0000000005F60000-0x0000000005F7E000-memory.dmpFilesize
120KB
-
memory/1388-29-0x0000000005FB0000-0x0000000005FFC000-memory.dmpFilesize
304KB
-
memory/1388-30-0x000000007F400000-0x000000007F410000-memory.dmpFilesize
64KB
-
memory/1388-51-0x00000000074C0000-0x00000000074CE000-memory.dmpFilesize
56KB
-
memory/1388-32-0x0000000070C70000-0x0000000070CBC000-memory.dmpFilesize
304KB
-
memory/1388-42-0x0000000006530000-0x000000000654E000-memory.dmpFilesize
120KB
-
memory/1388-47-0x0000000007290000-0x00000000072AA000-memory.dmpFilesize
104KB
-
memory/1388-44-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/1388-50-0x0000000007490000-0x00000000074A1000-memory.dmpFilesize
68KB
-
memory/1388-46-0x00000000078D0000-0x0000000007F4A000-memory.dmpFilesize
6.5MB
-
memory/1388-43-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/1388-48-0x0000000007300000-0x000000000730A000-memory.dmpFilesize
40KB
-
memory/1732-5-0x0000000005270000-0x0000000005280000-memory.dmpFilesize
64KB
-
memory/1732-0-0x00000000006D0000-0x0000000000712000-memory.dmpFilesize
264KB
-
memory/1732-3-0x00000000050F0000-0x0000000005182000-memory.dmpFilesize
584KB
-
memory/1732-4-0x0000000005280000-0x000000000531C000-memory.dmpFilesize
624KB
-
memory/1732-9-0x0000000005D80000-0x0000000005DA8000-memory.dmpFilesize
160KB
-
memory/1732-8-0x0000000005200000-0x0000000005242000-memory.dmpFilesize
264KB
-
memory/1732-7-0x00000000051E0000-0x00000000051E8000-memory.dmpFilesize
32KB
-
memory/1732-1-0x0000000075270000-0x0000000075A20000-memory.dmpFilesize
7.7MB
-
memory/1732-2-0x0000000005770000-0x0000000005D14000-memory.dmpFilesize
5.6MB
-
memory/1732-6-0x00000000051D0000-0x00000000051DA000-memory.dmpFilesize
40KB
-
memory/1732-63-0x0000000075270000-0x0000000075A20000-memory.dmpFilesize
7.7MB
-
memory/2836-96-0x0000000007D40000-0x0000000007D54000-memory.dmpFilesize
80KB
-
memory/2836-95-0x0000000007D00000-0x0000000007D11000-memory.dmpFilesize
68KB
-
memory/2836-65-0x0000000074C70000-0x0000000075420000-memory.dmpFilesize
7.7MB
-
memory/2836-76-0x0000000006140000-0x0000000006494000-memory.dmpFilesize
3.3MB
-
memory/2836-66-0x0000000005290000-0x00000000052A0000-memory.dmpFilesize
64KB
-
memory/2836-78-0x00000000067E0000-0x000000000682C000-memory.dmpFilesize
304KB
-
memory/2836-79-0x000000007F900000-0x000000007F910000-memory.dmpFilesize
64KB
-
memory/2836-80-0x00000000717E0000-0x000000007182C000-memory.dmpFilesize
304KB
-
memory/2836-90-0x0000000007A50000-0x0000000007AF3000-memory.dmpFilesize
652KB
-
memory/2836-91-0x0000000005290000-0x00000000052A0000-memory.dmpFilesize
64KB
-
memory/2836-98-0x0000000074C70000-0x0000000075420000-memory.dmpFilesize
7.7MB
-
memory/2836-92-0x0000000005290000-0x00000000052A0000-memory.dmpFilesize
64KB
-
memory/4640-60-0x0000000000400000-0x0000000000551000-memory.dmpFilesize
1.3MB
-
memory/4640-62-0x0000000000400000-0x0000000000551000-memory.dmpFilesize
1.3MB
-
memory/4640-58-0x0000000000400000-0x0000000000551000-memory.dmpFilesize
1.3MB
-
memory/4640-99-0x0000000000400000-0x0000000000551000-memory.dmpFilesize
1.3MB