Analysis
-
max time kernel
120s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 14:31
Static task
static1
Behavioral task
behavioral1
Sample
SPECIFICATION.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
SPECIFICATION.exe
Resource
win10v2004-20240226-en
General
-
Target
SPECIFICATION.exe
-
Size
577KB
-
MD5
a9862010588f43a61bd317483b93947b
-
SHA1
31987c99822c71a38cebc13d8d3261833313a77c
-
SHA256
74ab97b09af8d1277126ff92b065ce8f08c3dc28f17745e78c0d8fcf0e8b5447
-
SHA512
1ac4380dfb2c8cea6a4071c56d6cbf21a17cb79c791fe264dbe65b5f72749dd159918810d0ab00cbb84b8531e464f2c697d8d00fc34b7044228096a5d7dd06b1
-
SSDEEP
12288:er3Qp5I9xWZvHgYAXGWKkv5oT4sIrT9t4GH:ejOySRA2nsRNH
Malware Config
Extracted
warzonerat
51.77.167.59:5951
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 9 IoCs
resource yara_rule behavioral1/memory/2132-26-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/2132-29-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/2132-31-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/2132-27-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/2132-34-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/2132-40-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/2132-41-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/2132-43-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/2132-46-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat -
Executes dropped EXE 1 IoCs
pid Process 892 svchost.exe -
Loads dropped DLL 6 IoCs
pid Process 2564 cmd.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" SPECIFICATION.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 892 set thread context of 2132 892 svchost.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2688 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2380 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 2040 SPECIFICATION.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2040 SPECIFICATION.exe Token: SeDebugPrivilege 892 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2132 wmplayer.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2520 2040 SPECIFICATION.exe 28 PID 2040 wrote to memory of 2520 2040 SPECIFICATION.exe 28 PID 2040 wrote to memory of 2520 2040 SPECIFICATION.exe 28 PID 2040 wrote to memory of 2564 2040 SPECIFICATION.exe 30 PID 2040 wrote to memory of 2564 2040 SPECIFICATION.exe 30 PID 2040 wrote to memory of 2564 2040 SPECIFICATION.exe 30 PID 2564 wrote to memory of 2380 2564 cmd.exe 32 PID 2564 wrote to memory of 2380 2564 cmd.exe 32 PID 2564 wrote to memory of 2380 2564 cmd.exe 32 PID 2520 wrote to memory of 2688 2520 cmd.exe 33 PID 2520 wrote to memory of 2688 2520 cmd.exe 33 PID 2520 wrote to memory of 2688 2520 cmd.exe 33 PID 2564 wrote to memory of 892 2564 cmd.exe 34 PID 2564 wrote to memory of 892 2564 cmd.exe 34 PID 2564 wrote to memory of 892 2564 cmd.exe 34 PID 892 wrote to memory of 2132 892 svchost.exe 35 PID 892 wrote to memory of 2132 892 svchost.exe 35 PID 892 wrote to memory of 2132 892 svchost.exe 35 PID 892 wrote to memory of 2132 892 svchost.exe 35 PID 892 wrote to memory of 2132 892 svchost.exe 35 PID 892 wrote to memory of 2132 892 svchost.exe 35 PID 892 wrote to memory of 2132 892 svchost.exe 35 PID 892 wrote to memory of 2132 892 svchost.exe 35 PID 892 wrote to memory of 2132 892 svchost.exe 35 PID 892 wrote to memory of 2132 892 svchost.exe 35 PID 892 wrote to memory of 2132 892 svchost.exe 35 PID 892 wrote to memory of 2132 892 svchost.exe 35 PID 892 wrote to memory of 2540 892 svchost.exe 36 PID 892 wrote to memory of 2540 892 svchost.exe 36 PID 892 wrote to memory of 2540 892 svchost.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SPECIFICATION.exe"C:\Users\Admin\AppData\Local\Temp\SPECIFICATION.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:2688
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp1333.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2380
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:2132
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 892 -s 7204⤵
- Loads dropped DLL
PID:2540
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD583d5a25ca9f9c11a2a23264bd5672bdf
SHA13d3d2897d555dbf3198547709a84bca63f264ea2
SHA256c4cc687140e0c59a06c2ca66f16cd8f2193198d624757fcd094958ea8a10406d
SHA512a08cca5d0051d30dd4811d325d8021af92b52b3acbd5129bb69c9d4be7163ff1a18ba8f1471fe5acf7266f77c25a20c3bf2f040537718be47e6e3af3dc882f1f
-
Filesize
577KB
MD5a9862010588f43a61bd317483b93947b
SHA131987c99822c71a38cebc13d8d3261833313a77c
SHA25674ab97b09af8d1277126ff92b065ce8f08c3dc28f17745e78c0d8fcf0e8b5447
SHA5121ac4380dfb2c8cea6a4071c56d6cbf21a17cb79c791fe264dbe65b5f72749dd159918810d0ab00cbb84b8531e464f2c697d8d00fc34b7044228096a5d7dd06b1