Overview
overview
10Static
static
10ALL.ps1
windows7-x64
8ALL.ps1
windows10-2004-x64
8ALL_2542.vbs
windows7-x64
1ALL_2542.vbs
windows10-2004-x64
1ALL_LLLLLL...90.vbs
windows7-x64
1ALL_LLLLLL...90.vbs
windows10-2004-x64
1ALL_jjnb.vbs
windows7-x64
1ALL_jjnb.vbs
windows10-2004-x64
1ALL_kkkkkk...kk.vbs
windows7-x64
1ALL_kkkkkk...kk.vbs
windows10-2004-x64
1ALL_steale...89.vbs
windows7-x64
1ALL_steale...89.vbs
windows10-2004-x64
1Server.ps1
windows7-x64
10Server.ps1
windows10-2004-x64
10Server_1faa.ps1
windows7-x64
1Server_1faa.ps1
windows10-2004-x64
10Server_77251.ps1
windows7-x64
1Server_77251.ps1
windows10-2004-x64
10Server_LLL...78.ps1
windows7-x64
1Server_LLL...78.ps1
windows10-2004-x64
10Server_asnn.ps1
windows7-x64
1Server_asnn.ps1
windows10-2004-x64
10Server_lkmm.ps1
windows7-x64
1Server_lkmm.ps1
windows10-2004-x64
10Server_lol123.ps1
windows7-x64
1Server_lol123.ps1
windows10-2004-x64
10Server_lol_123.ps1
windows7-x64
1Server_lol_123.ps1
windows10-2004-x64
10Server_lol...80.ps1
windows7-x64
1Server_lol...80.ps1
windows10-2004-x64
10Server_ste...67.ps1
windows7-x64
1Server_ste...67.ps1
windows10-2004-x64
1Analysis
-
max time kernel
146s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 19:04
Static task
static1
Behavioral task
behavioral1
Sample
ALL.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ALL.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
ALL_2542.vbs
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
ALL_2542.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
ALL_LLLLLLLLLLLLLLLLLLLOOOOOOOOOOOOOOOLLLLLLLLLLLLLLLL_34567890.vbs
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
ALL_LLLLLLLLLLLLLLLLLLLOOOOOOOOOOOOOOOLLLLLLLLLLLLLLLL_34567890.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
ALL_jjnb.vbs
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
ALL_jjnb.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
ALL_kkkkkkkkkkkkooooooooookkkkkkkkkkkkkkk.vbs
Resource
win7-20240319-en
Behavioral task
behavioral10
Sample
ALL_kkkkkkkkkkkkooooooooookkkkkkkkkkkkkkk.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
ALL_stealer_newww_23435656787989.vbs
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
ALL_stealer_newww_23435656787989.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Server.ps1
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
Server.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
Server_1faa.ps1
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
Server_1faa.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
Server_77251.ps1
Resource
win7-20240319-en
Behavioral task
behavioral18
Sample
Server_77251.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
Server_LLLLLLLLLLLLLOOOOOOOOOOOOOOOLLLLLLLLLLLLLLL_45675435465678.ps1
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Server_LLLLLLLLLLLLLOOOOOOOOOOOOOOOLLLLLLLLLLLLLLL_45675435465678.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
Server_asnn.ps1
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Server_asnn.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Server_lkmm.ps1
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Server_lkmm.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
Server_lol123.ps1
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
Server_lol123.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
Server_lol_123.ps1
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Server_lol_123.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
Server_lolllllllllllllllllll_kkkkkkkkkookkkkkkkkkkk_2345678980.ps1
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Server_lolllllllllllllllllll_kkkkkkkkkookkkkkkkkkkk_2345678980.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
Server_stealer_newwwwwww_345675743567.ps1
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Server_stealer_newwwwwww_345675743567.ps1
Resource
win10v2004-20240226-en
General
-
Target
Server_lolllllllllllllllllll_kkkkkkkkkookkkkkkkkkkk_2345678980.ps1
-
Size
306KB
-
MD5
34446cf1dce57c6bbf4f44aa5d3675fb
-
SHA1
b4efe197fbcbe28beda44ede2ef8516ed951a0c9
-
SHA256
0f93f99cacceffa66e7b39641991bc99b4cbe5aac7b63f4cd21f55147a55971a
-
SHA512
d198f6cf552c4333ac255de119e4bea111d759c030b9da3a52700cc0a91cdcc122c70fe21ce068a137ff5bc40a42b99437c522ac473b2a6c0d45f85f31c03a31
-
SSDEEP
6144:p1V/V9xOh9RfHD60Q/i0RB9cthBjDOaqIQrIcGPnY1muAirbd:p1V/xONW/iHyj
Malware Config
Extracted
warzonerat
103.147.184.73:5719
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral30/memory/2084-14-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral30/memory/2084-18-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral30/memory/2084-20-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral30/memory/2084-21-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1188 set thread context of 2084 1188 powershell.exe 91 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1188 powershell.exe 1188 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1188 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1188 wrote to memory of 2084 1188 powershell.exe 91 PID 1188 wrote to memory of 2084 1188 powershell.exe 91 PID 1188 wrote to memory of 2084 1188 powershell.exe 91 PID 1188 wrote to memory of 2084 1188 powershell.exe 91 PID 1188 wrote to memory of 2084 1188 powershell.exe 91 PID 1188 wrote to memory of 2084 1188 powershell.exe 91 PID 1188 wrote to memory of 2084 1188 powershell.exe 91 PID 1188 wrote to memory of 2084 1188 powershell.exe 91 PID 1188 wrote to memory of 2084 1188 powershell.exe 91 PID 1188 wrote to memory of 2084 1188 powershell.exe 91 PID 1188 wrote to memory of 2084 1188 powershell.exe 91
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Server_lolllllllllllllllllll_kkkkkkkkkookkkkkkkkkkk_2345678980.ps11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵PID:2084
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82