Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/08/2024, 16:45
Static task
static1
Behavioral task
behavioral1
Sample
undercover.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
undercover.exe
Resource
win10v2004-20240802-en
General
-
Target
undercover.exe
-
Size
642KB
-
MD5
c7dde9741228fbc2c317bae1ef4c8231
-
SHA1
26deeac180d6bf406bd004a718cbc86b1586c494
-
SHA256
d1d0a4c2a7489201006748a364e5cc6dca7b0721dbce83c54566c555bc56ca68
-
SHA512
05508db7f290282c91d461b7284c1856ee9ad2e042dc57f9203f79374492ba69c457985177d9e11195758680b6c211261fa7df2662c380edb1bb0b3678e1139e
-
SSDEEP
12288:y0WWObW5cBj7O56jp7t8c6B5wAmjPDynKr7fP7E3caoAqI+lRW:l4JugjEc6B5wT6KrL7E3hVElR
Malware Config
Extracted
warzonerat
93.123.118.3:65535
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral2/memory/2928-12-0x0000000000400000-0x000000000055C000-memory.dmp warzonerat behavioral2/memory/2928-15-0x0000000000400000-0x000000000055C000-memory.dmp warzonerat behavioral2/memory/2928-16-0x0000000000400000-0x000000000055C000-memory.dmp warzonerat behavioral2/memory/2928-63-0x0000000000400000-0x000000000055C000-memory.dmp warzonerat -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3200 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation undercover.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3836 set thread context of 2928 3836 undercover.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language undercover.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language undercover.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3200 powershell.exe 3200 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3200 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3836 wrote to memory of 3200 3836 undercover.exe 98 PID 3836 wrote to memory of 3200 3836 undercover.exe 98 PID 3836 wrote to memory of 3200 3836 undercover.exe 98 PID 3836 wrote to memory of 2928 3836 undercover.exe 100 PID 3836 wrote to memory of 2928 3836 undercover.exe 100 PID 3836 wrote to memory of 2928 3836 undercover.exe 100 PID 3836 wrote to memory of 2928 3836 undercover.exe 100 PID 3836 wrote to memory of 2928 3836 undercover.exe 100 PID 3836 wrote to memory of 2928 3836 undercover.exe 100 PID 3836 wrote to memory of 2928 3836 undercover.exe 100 PID 3836 wrote to memory of 2928 3836 undercover.exe 100 PID 3836 wrote to memory of 2928 3836 undercover.exe 100 PID 3836 wrote to memory of 2928 3836 undercover.exe 100 PID 3836 wrote to memory of 2928 3836 undercover.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\undercover.exe"C:\Users\Admin\AppData\Local\Temp\undercover.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\undercover.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
-
C:\Users\Admin\AppData\Local\Temp\undercover.exe"C:\Users\Admin\AppData\Local\Temp\undercover.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82