Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 04:12
Behavioral task
behavioral1
Sample
ed63cc891f28d284baf85525ce5e833c541429a1d09e999ac4d08ca4080e7f03.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed63cc891f28d284baf85525ce5e833c541429a1d09e999ac4d08ca4080e7f03.exe
Resource
win10v2004-20240508-en
General
-
Target
ed63cc891f28d284baf85525ce5e833c541429a1d09e999ac4d08ca4080e7f03.exe
-
Size
141KB
-
MD5
69f1b1837eec6d3b743e067eb8590959
-
SHA1
886ada51656010297deb513aa0ec73ecbb4e5a31
-
SHA256
ed63cc891f28d284baf85525ce5e833c541429a1d09e999ac4d08ca4080e7f03
-
SHA512
7c5a7bf11960fdf9ddcbdd2a9371f0ac163d3e273be1358b6de608893655c3412d3c26a5db3c93116e693aa679a24fc28fd234cedeaf425a448cbd0ed55a1757
-
SSDEEP
3072:RARHROub6IiZktM+t4B6IZeAzaZyJ6QYzHHxgGT0Iw:RkxbQktMo4BRiyjYz6GTrw
Malware Config
Extracted
warzonerat
94.131.110.60:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
resource yara_rule behavioral2/files/0x000d00000002336a-41.dat INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
resource yara_rule behavioral2/files/0x000d00000002336a-41.dat INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore -
Detects executables embedding command execution via IExecuteCommand COM object 1 IoCs
resource yara_rule behavioral2/files/0x000d00000002336a-41.dat INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM -
Warzone RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000d00000002336a-41.dat warzonerat -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4660 powershell.exe 2840 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 1232 NetFramework64.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4660 powershell.exe 4660 powershell.exe 2840 powershell.exe 2840 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4660 powershell.exe Token: SeDebugPrivilege 2840 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1492 wrote to memory of 4660 1492 ed63cc891f28d284baf85525ce5e833c541429a1d09e999ac4d08ca4080e7f03.exe 86 PID 1492 wrote to memory of 4660 1492 ed63cc891f28d284baf85525ce5e833c541429a1d09e999ac4d08ca4080e7f03.exe 86 PID 1492 wrote to memory of 4660 1492 ed63cc891f28d284baf85525ce5e833c541429a1d09e999ac4d08ca4080e7f03.exe 86 PID 1492 wrote to memory of 1232 1492 ed63cc891f28d284baf85525ce5e833c541429a1d09e999ac4d08ca4080e7f03.exe 93 PID 1492 wrote to memory of 1232 1492 ed63cc891f28d284baf85525ce5e833c541429a1d09e999ac4d08ca4080e7f03.exe 93 PID 1492 wrote to memory of 1232 1492 ed63cc891f28d284baf85525ce5e833c541429a1d09e999ac4d08ca4080e7f03.exe 93 PID 1232 wrote to memory of 2840 1232 NetFramework64.exe 96 PID 1232 wrote to memory of 2840 1232 NetFramework64.exe 96 PID 1232 wrote to memory of 2840 1232 NetFramework64.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed63cc891f28d284baf85525ce5e833c541429a1d09e999ac4d08ca4080e7f03.exe"C:\Users\Admin\AppData\Local\Temp\ed63cc891f28d284baf85525ce5e833c541429a1d09e999ac4d08ca4080e7f03.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4660
-
-
C:\Users\Admin\Documents\NetFramework64.exe"C:\Users\Admin\Documents\NetFramework64.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5d5f265982b8ad5ac2fc26ca35593de75
SHA170d7534b747dbfdae363e36b7407a4dc700ad230
SHA25653ff9e83706dc9e9c15720e7ec8b29a956ff47db8b40818aefcc597a7a6bf95e
SHA512e9b429da49dd923814ef50239d5f178ccc66625458a6082c44326a4cb088066a3e8a964037288cdcbe8f419a242ad6c0a849a76a1a15da0a88e9c2c0e18e0961
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
141KB
MD569f1b1837eec6d3b743e067eb8590959
SHA1886ada51656010297deb513aa0ec73ecbb4e5a31
SHA256ed63cc891f28d284baf85525ce5e833c541429a1d09e999ac4d08ca4080e7f03
SHA5127c5a7bf11960fdf9ddcbdd2a9371f0ac163d3e273be1358b6de608893655c3412d3c26a5db3c93116e693aa679a24fc28fd234cedeaf425a448cbd0ed55a1757