Analysis
-
max time kernel
326s -
max time network
330s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 09:13
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240226-en
General
-
Target
sample.html
-
Size
88KB
-
MD5
fa1f40ef09d084500e63cec86333d59c
-
SHA1
cfcb60bb7ddb345bdcb6505b0eedca58f7e93518
-
SHA256
cdea3f40ff14e31e8afc0810ea6dfea48d79f5d30dbf2b66673aa89546f40cdb
-
SHA512
e23475b0d98d736ad84555c6c475d239bee6e6619ead4350b94c1ef60ad02b264d95a5cc48221519984972477ec6be984ea1f9e8f7e2571e2712a2a4620c83cc
-
SSDEEP
1536:ybQBKbTtHnD3A0vuhGyUfjsfzf04PAPlPkpyXIQkvukuyOct:qHnD3AeuUyUfgfzfNPAPlPkpyXINGY
Malware Config
Extracted
warzonerat
168.61.222.215:5400
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral2/memory/2160-149-0x0000000005C80000-0x0000000005CA8000-memory.dmp rezer0 -
Warzone RAT payload 8 IoCs
Processes:
resource yara_rule behavioral2/memory/6088-155-0x0000000000400000-0x0000000000553000-memory.dmp warzonerat behavioral2/memory/6088-158-0x0000000000400000-0x0000000000553000-memory.dmp warzonerat behavioral2/memory/6088-159-0x0000000000400000-0x0000000000553000-memory.dmp warzonerat behavioral2/memory/6088-170-0x0000000000400000-0x0000000000553000-memory.dmp warzonerat behavioral2/memory/5612-171-0x0000000000400000-0x0000000000553000-memory.dmp warzonerat behavioral2/memory/5612-172-0x0000000000400000-0x0000000000553000-memory.dmp warzonerat behavioral2/memory/1992-181-0x0000000000400000-0x0000000000553000-memory.dmp warzonerat behavioral2/memory/1992-182-0x0000000000400000-0x0000000000553000-memory.dmp warzonerat -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 307 raw.githubusercontent.com 308 raw.githubusercontent.com 306 raw.githubusercontent.com -
Suspicious use of SetThreadContext 3 IoCs
Processes:
WarzoneRAT.exeWarzoneRAT.exeWarzoneRAT.exedescription pid process target process PID 2160 set thread context of 6088 2160 WarzoneRAT.exe MSBuild.exe PID 776 set thread context of 5612 776 WarzoneRAT.exe MSBuild.exe PID 1304 set thread context of 1992 1304 WarzoneRAT.exe MSBuild.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exetaskmgr.exefirefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 4832 schtasks.exe 5464 schtasks.exe 3844 schtasks.exe -
Modifies registry class 2 IoCs
Processes:
firefox.exemsedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3808065738-1666277613-1125846146-1000\{C65ADDF6-C8DF-475D-BBAE-F694F8385E43} msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
WarzoneRAT.exeWarzoneRAT.exeWarzoneRAT.exetaskmgr.exepid process 2160 WarzoneRAT.exe 2160 WarzoneRAT.exe 2160 WarzoneRAT.exe 2160 WarzoneRAT.exe 776 WarzoneRAT.exe 776 WarzoneRAT.exe 776 WarzoneRAT.exe 776 WarzoneRAT.exe 776 WarzoneRAT.exe 776 WarzoneRAT.exe 1304 WarzoneRAT.exe 1304 WarzoneRAT.exe 1304 WarzoneRAT.exe 1304 WarzoneRAT.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 2800 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
firefox.exeWarzoneRAT.exeWarzoneRAT.exeWarzoneRAT.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 2288 firefox.exe Token: SeDebugPrivilege 2288 firefox.exe Token: SeDebugPrivilege 2160 WarzoneRAT.exe Token: SeDebugPrivilege 776 WarzoneRAT.exe Token: SeDebugPrivilege 1304 WarzoneRAT.exe Token: SeDebugPrivilege 2800 taskmgr.exe Token: SeSystemProfilePrivilege 2800 taskmgr.exe Token: SeCreateGlobalPrivilege 2800 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
firefox.exetaskmgr.exepid process 2288 firefox.exe 2288 firefox.exe 2288 firefox.exe 2288 firefox.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
firefox.exetaskmgr.exepid process 2288 firefox.exe 2288 firefox.exe 2288 firefox.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe 2800 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 2288 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
firefox.exedescription pid process target process PID 2288 wrote to memory of 1056 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 1056 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3692 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3288 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3288 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3288 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3288 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3288 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3288 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3288 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3288 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3288 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3288 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3288 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3288 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3288 2288 firefox.exe firefox.exe PID 2288 wrote to memory of 3288 2288 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=5276 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:11⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2288.0.1039771488\1820046915" -parentBuildID 20221007134813 -prefsHandle 1880 -prefMapHandle 1872 -prefsLen 20749 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dc8d2524-9fae-40e9-aaef-28f034b84ede} 2288 "\\.\pipe\gecko-crash-server-pipe.2288" 1960 237c32d1458 gpu2⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2288.1.391657204\982473354" -parentBuildID 20221007134813 -prefsHandle 2340 -prefMapHandle 2336 -prefsLen 20785 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7aaaeb1-a1b3-4286-83d0-ddf7c13bd64a} 2288 "\\.\pipe\gecko-crash-server-pipe.2288" 2360 237c2de3558 socket2⤵
- Checks processor information in registry
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2288.2.1152291579\1605822291" -childID 1 -isForBrowser -prefsHandle 3088 -prefMapHandle 3032 -prefsLen 20888 -prefMapSize 233444 -jsInitHandle 1072 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {65c75db8-2391-4dd7-a876-5f9fdca402d1} 2288 "\\.\pipe\gecko-crash-server-pipe.2288" 3076 237c6eb6e58 tab2⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2288.3.71161603\1768374472" -childID 2 -isForBrowser -prefsHandle 1284 -prefMapHandle 1280 -prefsLen 26066 -prefMapSize 233444 -jsInitHandle 1072 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bee72036-b6b4-42cb-8d7f-e370d86a5a40} 2288 "\\.\pipe\gecko-crash-server-pipe.2288" 2508 237af372b58 tab2⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2288.4.344274508\1992361955" -childID 3 -isForBrowser -prefsHandle 3788 -prefMapHandle 3784 -prefsLen 26066 -prefMapSize 233444 -jsInitHandle 1072 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3632c6ce-40e4-4fb7-b1b8-89dbf3404250} 2288 "\\.\pipe\gecko-crash-server-pipe.2288" 3800 237af362858 tab2⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2288.5.1146743481\1457039274" -childID 4 -isForBrowser -prefsHandle 3736 -prefMapHandle 4712 -prefsLen 26206 -prefMapSize 233444 -jsInitHandle 1072 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b032306-efe6-436e-a718-83ee7d78a229} 2288 "\\.\pipe\gecko-crash-server-pipe.2288" 4776 237c8e8ef58 tab2⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2288.6.1172651325\1837583047" -childID 5 -isForBrowser -prefsHandle 5204 -prefMapHandle 5208 -prefsLen 26206 -prefMapSize 233444 -jsInitHandle 1072 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {28703ada-a7d3-49fc-8549-bbb4a41b4802} 2288 "\\.\pipe\gecko-crash-server-pipe.2288" 5196 237c8e8e058 tab2⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2288.7.1039095549\724084421" -childID 6 -isForBrowser -prefsHandle 4816 -prefMapHandle 5184 -prefsLen 26206 -prefMapSize 233444 -jsInitHandle 1072 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ae0fbf9a-455d-43cb-b856-0f6feb7a0ec0} 2288 "\\.\pipe\gecko-crash-server-pipe.2288" 5412 237c8e8f258 tab2⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=5392 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5080 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5544 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=5904 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5996 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --mojo-platform-channel-handle=3776 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5444 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --mojo-platform-channel-handle=4780 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --mojo-platform-channel-handle=6424 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --mojo-platform-channel-handle=5728 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6124 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --mojo-platform-channel-handle=6584 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --mojo-platform-channel-handle=5648 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --mojo-platform-channel-handle=5636 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --no-appcompat-clear --mojo-platform-channel-handle=4980 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --mojo-platform-channel-handle=6972 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=5616 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --mojo-platform-channel-handle=5396 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵
-
C:\Users\Admin\Downloads\WarzoneRAT.exe"C:\Users\Admin\Downloads\WarzoneRAT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp604D.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Downloads\WarzoneRAT.exe"C:\Users\Admin\Downloads\WarzoneRAT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB487.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
-
C:\Users\Admin\Downloads\WarzoneRAT.exe"C:\Users\Admin\Downloads\WarzoneRAT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCEA7.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\WarzoneRAT.exe.logFilesize
507B
MD58cf94b5356be60247d331660005941ec
SHA1fdedb361f40f22cb6a086c808fc0056d4e421131
SHA25652a5b2d36f2b72cb02c695cf7ef46444dda73d4ea82a73e0894c805fa9987bc0
SHA512b886dfc8bf03f8627f051fb6e2ac40ae2e7713584695a365728eb2e2c87217830029aa35bd129c642fa03dde3f7a7dd5690b16248676be60a6bb5f497fb23651
-
C:\Users\Admin\AppData\Local\Temp\tmp604D.tmpFilesize
1KB
MD50363e097717dafc465e10b2c2e851e4a
SHA1ab618e2d91ae609cdc2193d167e70c794d9b9118
SHA256d4f7b92cfe95411c7b8a817b8f8f75db2b04e40351edbc3bf1d644f872ac562c
SHA5126018594ccc73d7bf5a59a5172119878e2c0ad5b0ec053c2388c1321ca185f0468ed14c1caa5a9679e519d1f9013735b143bea2187e0c0a92d67241cfd51dee1e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\datareporting\glean\db\data.safe.binFilesize
2KB
MD5720710f11c64ca923fa0950862ff071a
SHA13547a0b76c8d224256957ded0c311dd73916fb86
SHA2565fe9a14e248403061c644661b2cdf402204f470c4b5e267fec808a1873ab8f51
SHA512b5c71546d18207be0da6c15a8d09b0e33f6b9390eb75191efec2d823252071c25354d1d69e4718385f235c04c7c7151665d540364e74bc0586e813aae4ce874f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\datareporting\glean\pending_pings\9a24efd5-6de1-4793-a365-dc28bbac0474Filesize
746B
MD5a324d0e955b8e38b1da74e04266dd7f6
SHA12bf59a972b72fd087643cb7db54cc72f117b5062
SHA256c98f97098c07eaad29ddc01a91b8e7172b170da1cfb9174f71500a2d0029383b
SHA512ec4606e1e035985361e9b2c2fda77d7ad509e18e9c109918474b4a5ec4b167ef6b4e6b4c76f8307066c3ee62c7469f192dcf6cbbd0eeffff06bc0be2db4d9d97
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\datareporting\glean\pending_pings\a033775e-3a34-4f19-b6c2-8170bc9191e9Filesize
10KB
MD527ea4c5b5e508a8489bf83b203bd8914
SHA16ae5a53b2605698d940f5ac23d9c5f87d57f9735
SHA256fe6d60a841111adad2f0a7c7612cf37ca63bc6329458386903773530f173ee71
SHA512c988ab02c7aca21b9814cd0b92403c84f0fbe7dbac96c2d8b9757b206560db90a4d52fa65d592e85b84c91ce3a0687d1dedb76b8b0894ae72e3d4f28d12cb26f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\prefs.jsFilesize
6KB
MD550c04433db2f5d846065a177a17a2148
SHA1995c4d65c436a43d10ba61138479890dd79b2b6f
SHA256ab951e2dfc6d87f61171edebed6bed1066e31fca465bdbb2c95265d23db98d04
SHA51204657be30772c6aa41181d9cb8c2dd5192f5d79867105a4de69bc7098a4289ef93847325c7f45c25fe57378175a620596f40334f149753587e928aeee6d3744e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\prefs.jsFilesize
6KB
MD50b0672ff80314b37f302b84e4e7d571c
SHA102d24a626cdbdd7199d065ba582de3c5c71e92bf
SHA256fc63987a757ae39aa36e161dae753ecf0328c151ee1e5084896b3a61a8be056e
SHA512d10a9e616cd51efa71d1596dcc52bd71dfb0ea5b5c9ea4cd3e6c6e8c33b2169d6d2283d437caec6b358997d1018e666a28a684af297179ba5f00d22df757003d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\sessionstore.jsonlz4Filesize
885B
MD5abcd7b0f474e1a631025e86d3ef88a73
SHA1e5b6e45106b58a5e7e879ec5bf41cba436cd059d
SHA2569d15d266ce66ea2657dd40dae6f17215efaed95b54d524cae0267a70f8d916f4
SHA5126ce7e71086414049dd303ea1d3b4b271ca5e708e6fcf07e4984e07b084333bbb4e2f32a3a19680f02d3e2d23c78c232ec9223018ff072d93fb308c80f084cd09
-
memory/776-169-0x0000000074780000-0x0000000074F30000-memory.dmpFilesize
7.7MB
-
memory/776-163-0x00000000051C0000-0x00000000051D0000-memory.dmpFilesize
64KB
-
memory/776-162-0x0000000074780000-0x0000000074F30000-memory.dmpFilesize
7.7MB
-
memory/1304-180-0x0000000074780000-0x0000000074F30000-memory.dmpFilesize
7.7MB
-
memory/1304-174-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/1304-173-0x0000000074780000-0x0000000074F30000-memory.dmpFilesize
7.7MB
-
memory/1992-182-0x0000000000400000-0x0000000000553000-memory.dmpFilesize
1.3MB
-
memory/1992-181-0x0000000000400000-0x0000000000553000-memory.dmpFilesize
1.3MB
-
memory/2160-144-0x0000000002F00000-0x0000000002F10000-memory.dmpFilesize
64KB
-
memory/2160-148-0x0000000006350000-0x00000000063EC000-memory.dmpFilesize
624KB
-
memory/2160-143-0x0000000000AF0000-0x0000000000B46000-memory.dmpFilesize
344KB
-
memory/2160-149-0x0000000005C80000-0x0000000005CA8000-memory.dmpFilesize
160KB
-
memory/2160-146-0x00000000058F0000-0x0000000005982000-memory.dmpFilesize
584KB
-
memory/2160-147-0x00000000058C0000-0x00000000058C8000-memory.dmpFilesize
32KB
-
memory/2160-160-0x0000000074F00000-0x00000000756B0000-memory.dmpFilesize
7.7MB
-
memory/2160-142-0x0000000074F00000-0x00000000756B0000-memory.dmpFilesize
7.7MB
-
memory/2160-145-0x0000000005D00000-0x00000000062A4000-memory.dmpFilesize
5.6MB
-
memory/2800-192-0x00000175714B0000-0x00000175714B1000-memory.dmpFilesize
4KB
-
memory/2800-185-0x00000175714B0000-0x00000175714B1000-memory.dmpFilesize
4KB
-
memory/2800-194-0x00000175714B0000-0x00000175714B1000-memory.dmpFilesize
4KB
-
memory/2800-183-0x00000175714B0000-0x00000175714B1000-memory.dmpFilesize
4KB
-
memory/2800-195-0x00000175714B0000-0x00000175714B1000-memory.dmpFilesize
4KB
-
memory/2800-190-0x00000175714B0000-0x00000175714B1000-memory.dmpFilesize
4KB
-
memory/2800-193-0x00000175714B0000-0x00000175714B1000-memory.dmpFilesize
4KB
-
memory/2800-184-0x00000175714B0000-0x00000175714B1000-memory.dmpFilesize
4KB
-
memory/2800-189-0x00000175714B0000-0x00000175714B1000-memory.dmpFilesize
4KB
-
memory/2800-191-0x00000175714B0000-0x00000175714B1000-memory.dmpFilesize
4KB
-
memory/5612-172-0x0000000000400000-0x0000000000553000-memory.dmpFilesize
1.3MB
-
memory/5612-171-0x0000000000400000-0x0000000000553000-memory.dmpFilesize
1.3MB
-
memory/6088-159-0x0000000000400000-0x0000000000553000-memory.dmpFilesize
1.3MB
-
memory/6088-170-0x0000000000400000-0x0000000000553000-memory.dmpFilesize
1.3MB
-
memory/6088-158-0x0000000000400000-0x0000000000553000-memory.dmpFilesize
1.3MB
-
memory/6088-155-0x0000000000400000-0x0000000000553000-memory.dmpFilesize
1.3MB