Analysis
-
max time kernel
116s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
9b245deb2687e8eb0a0b688c3c2111c0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9b245deb2687e8eb0a0b688c3c2111c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
9b245deb2687e8eb0a0b688c3c2111c0N.exe
-
Size
3.9MB
-
MD5
9b245deb2687e8eb0a0b688c3c2111c0
-
SHA1
d52b5b6ce38165926c93fe00fc919f9d03d4a2d2
-
SHA256
e1f4da5c15bd74cdba49f2f5fd8e048d71dcaefcb578afd71c40a6ebc92e1940
-
SHA512
c925efddb9d95930172e43ae1fe415adb1f0aeafa2aec9cf1d20e0e82fbd8cdaf28187473d4e3581eea88baa29b87f37303290d793641d32ed20fe67c4a39444
-
SSDEEP
98304:WsxoMikOEyJMoKigwvaoVsxoMikOEyJMoKigwvao3sxoMikOEyJMoKigwvaot:WsXRIMri/vpsXRIMri/vjsXRIMri/v
Malware Config
Extracted
warzonerat
victorybelng.ddns.net:13900
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 11 IoCs
resource yara_rule behavioral1/memory/2768-25-0x0000000000400000-0x00000000004E3000-memory.dmp warzonerat behavioral1/memory/2768-26-0x0000000000400000-0x00000000004E3000-memory.dmp warzonerat behavioral1/memory/2768-27-0x0000000000400000-0x00000000004E3000-memory.dmp warzonerat behavioral1/memory/2768-24-0x0000000000400000-0x00000000004E3000-memory.dmp warzonerat behavioral1/files/0x0034000000019338-33.dat warzonerat behavioral1/memory/2768-54-0x0000000000400000-0x00000000004E3000-memory.dmp warzonerat behavioral1/memory/2096-75-0x0000000000400000-0x00000000004E3000-memory.dmp warzonerat behavioral1/memory/2096-174-0x0000000000400000-0x00000000004E3000-memory.dmp warzonerat behavioral1/memory/2096-175-0x0000000000400000-0x00000000004E3000-memory.dmp warzonerat behavioral1/memory/2096-178-0x0000000000400000-0x00000000004E3000-memory.dmp warzonerat behavioral1/memory/2096-208-0x0000000000400000-0x00000000004E3000-memory.dmp warzonerat -
resource behavioral1/files/0x000600000001a453-135.dat -
Executes dropped EXE 4 IoCs
pid Process 2688 ._cache_9b245deb2687e8eb0a0b688c3c2111c0N.exe 2696 Synaptics.exe 2096 Synaptics.exe 3056 ._cache_Synaptics.exe -
Loads dropped DLL 6 IoCs
pid Process 2768 9b245deb2687e8eb0a0b688c3c2111c0N.exe 2768 9b245deb2687e8eb0a0b688c3c2111c0N.exe 2768 9b245deb2687e8eb0a0b688c3c2111c0N.exe 2096 Synaptics.exe 2096 Synaptics.exe 2096 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 9b245deb2687e8eb0a0b688c3c2111c0N.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 600 set thread context of 2768 600 9b245deb2687e8eb0a0b688c3c2111c0N.exe 30 PID 2696 set thread context of 2096 2696 Synaptics.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b245deb2687e8eb0a0b688c3c2111c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b245deb2687e8eb0a0b688c3c2111c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_9b245deb2687e8eb0a0b688c3c2111c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2224 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2224 EXCEL.EXE -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 600 wrote to memory of 2768 600 9b245deb2687e8eb0a0b688c3c2111c0N.exe 30 PID 600 wrote to memory of 2768 600 9b245deb2687e8eb0a0b688c3c2111c0N.exe 30 PID 600 wrote to memory of 2768 600 9b245deb2687e8eb0a0b688c3c2111c0N.exe 30 PID 600 wrote to memory of 2768 600 9b245deb2687e8eb0a0b688c3c2111c0N.exe 30 PID 600 wrote to memory of 2768 600 9b245deb2687e8eb0a0b688c3c2111c0N.exe 30 PID 600 wrote to memory of 2768 600 9b245deb2687e8eb0a0b688c3c2111c0N.exe 30 PID 600 wrote to memory of 2768 600 9b245deb2687e8eb0a0b688c3c2111c0N.exe 30 PID 600 wrote to memory of 2768 600 9b245deb2687e8eb0a0b688c3c2111c0N.exe 30 PID 600 wrote to memory of 2768 600 9b245deb2687e8eb0a0b688c3c2111c0N.exe 30 PID 600 wrote to memory of 2768 600 9b245deb2687e8eb0a0b688c3c2111c0N.exe 30 PID 600 wrote to memory of 2768 600 9b245deb2687e8eb0a0b688c3c2111c0N.exe 30 PID 600 wrote to memory of 2768 600 9b245deb2687e8eb0a0b688c3c2111c0N.exe 30 PID 2768 wrote to memory of 2688 2768 9b245deb2687e8eb0a0b688c3c2111c0N.exe 31 PID 2768 wrote to memory of 2688 2768 9b245deb2687e8eb0a0b688c3c2111c0N.exe 31 PID 2768 wrote to memory of 2688 2768 9b245deb2687e8eb0a0b688c3c2111c0N.exe 31 PID 2768 wrote to memory of 2688 2768 9b245deb2687e8eb0a0b688c3c2111c0N.exe 31 PID 2768 wrote to memory of 2696 2768 9b245deb2687e8eb0a0b688c3c2111c0N.exe 32 PID 2768 wrote to memory of 2696 2768 9b245deb2687e8eb0a0b688c3c2111c0N.exe 32 PID 2768 wrote to memory of 2696 2768 9b245deb2687e8eb0a0b688c3c2111c0N.exe 32 PID 2768 wrote to memory of 2696 2768 9b245deb2687e8eb0a0b688c3c2111c0N.exe 32 PID 2696 wrote to memory of 2096 2696 Synaptics.exe 33 PID 2696 wrote to memory of 2096 2696 Synaptics.exe 33 PID 2696 wrote to memory of 2096 2696 Synaptics.exe 33 PID 2696 wrote to memory of 2096 2696 Synaptics.exe 33 PID 2696 wrote to memory of 2096 2696 Synaptics.exe 33 PID 2696 wrote to memory of 2096 2696 Synaptics.exe 33 PID 2696 wrote to memory of 2096 2696 Synaptics.exe 33 PID 2696 wrote to memory of 2096 2696 Synaptics.exe 33 PID 2696 wrote to memory of 2096 2696 Synaptics.exe 33 PID 2696 wrote to memory of 2096 2696 Synaptics.exe 33 PID 2696 wrote to memory of 2096 2696 Synaptics.exe 33 PID 2696 wrote to memory of 2096 2696 Synaptics.exe 33 PID 2096 wrote to memory of 3056 2096 Synaptics.exe 34 PID 2096 wrote to memory of 3056 2096 Synaptics.exe 34 PID 2096 wrote to memory of 3056 2096 Synaptics.exe 34 PID 2096 wrote to memory of 3056 2096 Synaptics.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b245deb2687e8eb0a0b688c3c2111c0N.exe"C:\Users\Admin\AppData\Local\Temp\9b245deb2687e8eb0a0b688c3c2111c0N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Users\Admin\AppData\Local\Temp\9b245deb2687e8eb0a0b688c3c2111c0N.exe"C:\Users\Admin\AppData\Local\Temp\9b245deb2687e8eb0a0b688c3c2111c0N.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\._cache_9b245deb2687e8eb0a0b688c3c2111c0N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_9b245deb2687e8eb0a0b688c3c2111c0N.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2688
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3056
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD59b245deb2687e8eb0a0b688c3c2111c0
SHA1d52b5b6ce38165926c93fe00fc919f9d03d4a2d2
SHA256e1f4da5c15bd74cdba49f2f5fd8e048d71dcaefcb578afd71c40a6ebc92e1940
SHA512c925efddb9d95930172e43ae1fe415adb1f0aeafa2aec9cf1d20e0e82fbd8cdaf28187473d4e3581eea88baa29b87f37303290d793641d32ed20fe67c4a39444
-
Filesize
23KB
MD5d6b9d7f3689dc505d19b2e4c10cfd639
SHA1ce35e3cad8e62c74fb68145a2358a6e16b7bfff7
SHA256dbb119cbc4876c101ce374f44b81a34697bc896ac8813e0b55230f9490b64e37
SHA5125f86238304e40629669f78a63077c7bb1dd6ad340cbc0e04948f723bf255533cffef9775a88fd657a6b4c28a6cc852243fe6dcec4e320d54893ed5055ae59ff9
-
Filesize
28KB
MD5963bf218fd806a88d5a8b0dd1d75e3f7
SHA14118f22c70796f910399dc8d029d4dc7de458c0a
SHA256caaf13fa09f8b412571988d5a7ffec4221c9aa886e89b36849b4fd7cb65f5c6e
SHA512dc8f93837b26a98fd7dee24492daf1643ef2861db55002447008f59cba06862010f4491b4982f5b2c554ebb4ad03dac8b0bf951ebdb642ea3c191453b630976e
-
Filesize
29KB
MD5bcb7b440f09414fffa659ef698bbcd7f
SHA16ad350a41d8eee51feb2749fa292f9bf2e818f6a
SHA256d4a27414f5cf67ee465f2d05d7e0871b975b116b2cc1b64e9bb78c3727c1a802
SHA5121e4b95c42204d9e8a6f59b9f054422231403c934196dbda69571f0e49aaf8dc36018931bdbae666165833c2b6beb140749b10892f7a118fd4b027e4d7950b05e
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
26KB
MD5665b3f1af8c3d8ff45fb1404b673479f
SHA16861dab0640cc86a87384febb0ae65a9287e0617
SHA25605511b784a50b1d18ab2b2c6b07c1c08925d96c9d6388b285ad7c6c0f45d64c0
SHA512f0db9798f20781036515010906cbf2bc861a31ffda3d21a2bc797c4a4362c7048173f414d8d9adfa37d84d88fc9a62868679f09bb76caf28b2335bc49580549d
-
Filesize
29KB
MD505f3508f1a39142a5467fb0f0269b37c
SHA17352c3259f6916bc353ac9e8f4520279a1084326
SHA256b0f259638a476356299fb3f683dcc0faf9a32e8229fe12c6ca0394497180c518
SHA51291fcdb553d28b9bc0fea694e2c16c44b88c2f6f92f9ef78d79cbf176907c0e3579ee4052d13fda863745eeafe43cf1d1d1c3dedcee97a5d9d8f236a72b76954e
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
Filesize
132KB
MD5b7d1a9faf64911bc6429be983d82668f
SHA109b5f838d19a2e82b86ec751bfe726e3d89b1017
SHA256a1364f6fcb74ff76b1038e6c8871b23c1d5e2e28324bc365af512c04d791003c
SHA512e5965d492bcf7da9a456ac4dc087a7164842d9d6ca6e359f67455341f979731e176db67f8e2734da4d4c141c36e78d26080a6b1cfb99b06b2b6a5f46182c86b1