Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe
Resource
win10v2004-20240802-en
General
-
Target
e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe
-
Size
2.0MB
-
MD5
eabb6cc837e7978ae6b92c4f14856bd2
-
SHA1
b5407903a7b34dd1cfeac9596d6b6137190fefc0
-
SHA256
e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d
-
SHA512
03dd4d2f3d2a13cc02fd2ee90f0ff0b1ad5e2ff67a02f75807328ce7aba8b91846106e24d6c139796c98cf7245a30c1347786e7229a2bbaa5fc3e62f3265c2c6
-
SSDEEP
24576:E4Y7zy/0BmAIElMHz+noppfDCUVhUNiLkwOVy8586SgjxrCHiCG5dtBTH4:YyGJITz/ppfD1mA8DdrCy5XBTY
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe = "0" e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe -
Warzone RAT payload 1 IoCs
resource yara_rule behavioral2/memory/2184-17-0x0000000000400000-0x00000000004E3000-memory.dmp warzonerat -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3524 powershell.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe = "0" e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 400 set thread context of 2184 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4556 2184 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3524 powershell.exe 3524 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3524 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 400 wrote to memory of 3524 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 91 PID 400 wrote to memory of 3524 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 91 PID 400 wrote to memory of 2704 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 92 PID 400 wrote to memory of 2704 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 92 PID 400 wrote to memory of 2704 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 92 PID 400 wrote to memory of 2184 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 94 PID 400 wrote to memory of 2184 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 94 PID 400 wrote to memory of 2184 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 94 PID 400 wrote to memory of 2184 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 94 PID 400 wrote to memory of 2184 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 94 PID 400 wrote to memory of 2184 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 94 PID 400 wrote to memory of 2184 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 94 PID 400 wrote to memory of 2184 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 94 PID 400 wrote to memory of 2184 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 94 PID 400 wrote to memory of 2184 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 94 PID 400 wrote to memory of 2184 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 94 PID 400 wrote to memory of 2184 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 94 PID 400 wrote to memory of 2184 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 94 PID 400 wrote to memory of 920 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 95 PID 400 wrote to memory of 920 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 95 PID 400 wrote to memory of 920 400 e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe 95 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe"C:\Users\Admin\AppData\Local\Temp\e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe"1⤵
- UAC bypass
- Windows security bypass
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Windows security modification
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:400 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\e9615671d02b16f25444360f643b059cfa117f6ce3097d4fd70e581a668cf56d.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3524
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵PID:2704
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"2⤵PID:2184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 203⤵
- Program crash
PID:4556
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"2⤵PID:920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2184 -ip 21841⤵PID:5080
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82