Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 01:09

General

  • Target

    5e4fa07bf0f249c715efac189ccd912b2c47f3117db72d2a96f9cc87080a910e.exe

  • Size

    1.0MB

  • MD5

    5ff5712069f1f56f5f7ce88bca97ba2e

  • SHA1

    2e4fcebc6f2cf1f4d7662f84aaf73ff189629cdb

  • SHA256

    5e4fa07bf0f249c715efac189ccd912b2c47f3117db72d2a96f9cc87080a910e

  • SHA512

    b5a97229f302664931e893d9123ee7fcf1be80832e0160de107a36b1ae697231ad548a48333412e47247f899138c5a091e7d3616d683ba389469bfb493878a25

  • SSDEEP

    24576:y6nVMk+HIj90cmvFMN8O663kAjMEF/Jfwocd5xShmmpGfPFa:xVz7tWqK63YSJf/Qx8dpGc

Malware Config

Extracted

Family

warzonerat

C2

htajsjdh3738828e8dhdjjccbnc.duckdns.org:5574

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e4fa07bf0f249c715efac189ccd912b2c47f3117db72d2a96f9cc87080a910e.exe
    "C:\Users\Admin\AppData\Local\Temp\5e4fa07bf0f249c715efac189ccd912b2c47f3117db72d2a96f9cc87080a910e.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\tsxf.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ipconfig /release
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:908
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /release
          4⤵
          • System Location Discovery: System Language Discovery
          • Gathers network information
          PID:1956
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c rsqfhqt.dat brcbr.xls
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:536
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rsqfhqt.dat
          rsqfhqt.dat brcbr.xls
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2472
          • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
            "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2872
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ipconfig /renew
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2392
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /renew
          4⤵
          • System Location Discovery: System Language Discovery
          • Gathers network information
          PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ahqnrubmog.ppt

    Filesize

    537B

    MD5

    b8c8d6c2be3edcd2727cda09596ac66b

    SHA1

    3ece6832715d6b906bfeed531193133a1be9a6e0

    SHA256

    96534ec24633ec9d2606f7123e939a4c9440e8640eb5b18e2170277e5ac04b2b

    SHA512

    d820774c51cfb13af11f45ee3e423ceeabad8a62a89092ea4102338992c41d4418e5c48d001e6a39a3c24c468e969cc15c22d46fe4bcde532f6364eb6a95f438

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\axhopma.mp2

    Filesize

    532B

    MD5

    5b45b12ea6f107709879675791b2f75f

    SHA1

    78b5558a4fb2715368fa077dc20eb090357c8a68

    SHA256

    591b4d1f2a29cbde192ec40336ac3c762f62172e4bc4e88d3a5e4f3e40f432ce

    SHA512

    f928c5d8ae2a9351a979eb82680fa706ca2bb3dea8aa52e14443ce878f947a30740d2552903648fe512417578af0b3f36145431eff7d3c019e09ef54edf2961a

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bdmmw.ppt

    Filesize

    519B

    MD5

    47930131f3318f5078b6f15d2feed616

    SHA1

    106e085377419f8a20392c46b2ec129bb6446eb9

    SHA256

    1fc4f7da7307cea290a2be3cb178cf6ddbd7d0ca74acfe1efca4df7733eae014

    SHA512

    5504f6a2483cfbccfee56bf1ade0b9ea52066ceeaf6be98e0c872c3d7f07c5054ebc089a429b4786f72808fc462944e8ced4156329bde10b75f4bdb1e410ffd7

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bxlaw.mp2

    Filesize

    552B

    MD5

    20ce82485f5cf010d03b9616d5d2f8a8

    SHA1

    2c9ca41bcde5c88f4e7e0a092262661ff8dfeccb

    SHA256

    a0977da691525816a86686f47e7cea3e65f2d32a2a488d7c86795cdbf576aeae

    SHA512

    e0db57f46693049e9170394848020d6d1ebd9f90feb6468a9c55c54deeeabb0cdb12789e96c392bea2bb6641dbf66d16464507ec92a33f0d4e588b2433a69370

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dnjuqbpvb.3gp

    Filesize

    626B

    MD5

    c9d85f08dc17da5d4d909994c9cf5843

    SHA1

    a7d5841a0e5b585e5eceba30a255b3cfeb57b4af

    SHA256

    0d148126911b7fd78de49401acdbbb8f06e50b4905e6c42709c91d3ca0c3526f

    SHA512

    67f21a9a8b4a3f4fc190f92d0e0f96fffd1b4b73b95511dbffb6016adf443cc650784723257600f85a9fb0f4bbe702757fa3c1ef7d0baa17dda18c2fb7630c5c

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\fjcva.exe

    Filesize

    527B

    MD5

    049c80d59283d089aa3c86efe814f86d

    SHA1

    5272439d5d6b594760b5bd75e2a59dbbbd5753d0

    SHA256

    8b787e2c01be8e5d4f2c6c4386f12f737940921e30f671c793e966caa821ab11

    SHA512

    d02fa8cbc5faccdd67dd38830a0205e6dd2bda9952f414efdfce1093f77a3a80590e8b73bb50e21a2babd826bf108722c708a0e84fb366daf26edc3d74bd5d07

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\jbfpoqaml.exe

    Filesize

    530B

    MD5

    116b4e71f8966f3c4af8d4352a076b51

    SHA1

    0df16e87ded9c60828b84e30ee1e0d5b5d2b0d60

    SHA256

    1708c337d8d1ac3c37d76ce97d19d45bf54356affa4f3222af4bd36677be13e3

    SHA512

    115ce8f45a3ec89f7aa484b0b60242ff61c3038eeaa488a987456696a304a12975935bfe9454adfe7735aac90f54cd327bddb4f4d24ec841c217a642f97eaacd

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\lljuvfg.jpg

    Filesize

    669B

    MD5

    6e346ad8d8d85f498b8de75252445096

    SHA1

    d43e467ef6a7f39a598bf5c685cab67e9fcf90ae

    SHA256

    3f5efe79a10df0e35737c77508a0006c84f04e15018c051b95f03f330fe99d32

    SHA512

    5a829c8cce3b75b4d063f778e373f14bc3e66d3d6678407fb7f2caa83236681f7459d2ca9b0087f015c92271c48def01fa76629da5471027db3be754e4c7c55c

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\mdqbkte.ppt

    Filesize

    558B

    MD5

    806e14b19d830e4aa201bcd39c5ed762

    SHA1

    2169b408be9bf87bc2ec7043dd55c6d9f26d5f05

    SHA256

    02c78ad7a58957d0cd18c7d315b4fe9ddcf28a82fdd05e98c204f250cbc0b2c8

    SHA512

    37737194222a028461a4004b94ce86c134d5bb4a9dbb997e101eeb9267ff1576df5aae2669047cc97773622df74a6efd0cee2513f3475be150ac5d588ad13c95

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\okdbpad.bmp

    Filesize

    35KB

    MD5

    d2614e4b5b860a2c176a686c4dbd582e

    SHA1

    f3c0c1f3dd8c348d4e0e673997b08b21b2fa0552

    SHA256

    1ca4c244bfae54d46636880e81e252ab869c45711ac9e98592846200b27587b5

    SHA512

    eee74b99ccb26eb0f6053310c25bb072aed8c1df99075b744a1de43fb1f7c5df49f01ec4270f21c7a77b8033393c08b33f0df2247239fd9013aee62c7374f1c2

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\okdbpad.bmp

    Filesize

    35KB

    MD5

    025126d2698d163013cee4ca927fd530

    SHA1

    0bb9d2f21235f72d8877a3933b76e97eac810fa5

    SHA256

    7f08e11668d0b6d173165320e48b0e3287779a45076a30b2ed27b3c2089c3b36

    SHA512

    2227104a20d478ce086ebe4d2682aa85da7cee114edd8a42037150da88cc3416bd4c6f976fc95db9b37f3fc9ff801a22113d0d1781621c44bf8af7e99d13183a

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\onjtpkahix.ukt

    Filesize

    239KB

    MD5

    8ad5ae8b27c5047c005099cadc65cd4f

    SHA1

    a19a72cd9d77a3230e8d1acbc28fbc6451eaf82d

    SHA256

    bd094e8177cbbd3272c901571ed539c92d4ba9cdb48f386fca7d6a0a5a73aa0c

    SHA512

    f9e4da85e360c822c4993243beaa5ffba1935e14f0c0d555bac48f9655ba64cbfebfa6f023197537bc97c448a7c057fc34d698f8b3a4933bd991198be06d7d98

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\paqi.bmp

    Filesize

    569B

    MD5

    670155fc8ba1e3dca9b0cfd99d3b990e

    SHA1

    83dddcaaba7bfd94479efc08d55b31d2fb3ed79d

    SHA256

    64312bce8c4e04cec8a74d1f9e4e3ae53b89c228fe05d213f9b51febf1e86372

    SHA512

    ad3cc3377da66e01c2d69965bb14ab2641aca16001a6942648c70fe3a11bc79e2a0ab1c631cbf2514b08590a92a3bf36f182e2191328952a049d86b787279ebe

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\qssah.jpg

    Filesize

    611B

    MD5

    511cbc1664e0ce92f6c98611536f4c9c

    SHA1

    ba52ec5170da7ca4def2b4b5979200c0acbf8feb

    SHA256

    552ce1844148172ef8d30650f253edb0f59d4735b492e91482ce01b3bfc341be

    SHA512

    00e184cd1c6c457e96430d6d40c01cd8b080676f23191bc566185e43164afeecbcf8226159f8e71119701ad358027e264400f93a207260daa16cfeecd0d2f1b0

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rogat.icm

    Filesize

    525B

    MD5

    abc90273fe0c7017bd3a6c4261ed19b6

    SHA1

    e93587a0833f3a85289da32c447326f62c716abc

    SHA256

    5b34125b6faf65e0fa600764b66d982f5c32db749a079c1ebe2cbcf9a0e51b2a

    SHA512

    68f01633d0a9c8e6ed9d43821cf12b551c59b419e090b72aa4ffbad63ad44a2e4f121c2f35e1fcb7d90d269fb30036a2fb5cd16015dfcf1487ade639b3541e2c

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rufisqsfag.dat

    Filesize

    587B

    MD5

    02add4c5da79fcb387e49955a09e44c1

    SHA1

    708198f17b366a153b8901975ac35615aed2dd0f

    SHA256

    afb3c2e28d5f9d81ee5dafccbacbfbcb56e0b0fd4f49290eb4d137c4a8c22086

    SHA512

    c7a79636b57550dac6ae225171c8c1c1ed86d9659d6fae8b51021689317d98b46345422ea6944b2e9f565aa50215c6ea96ce37fea43356416ed6d90811426e81

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\tcpsi.3gp

    Filesize

    525B

    MD5

    9ca9f2990bb04a6933b5a83cb75cd400

    SHA1

    57afe18224df3b94ab99a0f044988366765c343c

    SHA256

    69fd950763387e4986e38636b039c5a271edb3d64f463bf17f70d38538318202

    SHA512

    274985e5b6acb444dd949b9e7711c6465bff12feb253d02732c3948472305ccf54118ac7eaabb9a54da159f90b9b9850a73133e9d953a9882c5649a12145d6ed

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\tqsjburk.exe

    Filesize

    596B

    MD5

    1fb90bf45556332bf1fc840223b042c3

    SHA1

    b444a953fe647fd038e4c4bb88fb56c372830b1c

    SHA256

    4fe4c72f9b5c0e15b8999be916e24f3571a448da1dda7e2fb3d287054f3438e4

    SHA512

    e064851fd10fb54ecd11cd0a583fc662f406e7527e6aa0efe28966b19973c8bb0ea91a34abe6edc7931e23386b57be16548b1d52adb35ca3fa9b3ad1c41cdcb5

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\trsja.msc

    Filesize

    564B

    MD5

    c782b7e7c2de2008c49e6a95eb81a01b

    SHA1

    aeed210bd89fce4bc564c6d6a37e93a4c632bd64

    SHA256

    cba2995053c32440838c47a0a64e120c8a24804ee10b247a6833b8a0e7032caf

    SHA512

    bde52b84e50e6c1dfa3594e5180527462c30396ff4cd196cc18889d8ec83f8d02559ec51796f4c05f36449cbdcd370352e12d4cf08fa1bf1be381a4d98ba1e04

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\tsxf.vbe

    Filesize

    85KB

    MD5

    add8b72bf00db071ab452149a1342501

    SHA1

    482e826adffc3f57b60c6e7a2b1c17de60bb23df

    SHA256

    df9153d81ecdd4200a989da8afa6e777b9435bc24b2827f31657b9a711ea705e

    SHA512

    763276eb45bff216c51e724a027831570cd61a3d8ab9cdb5d0f2954187f3b81e9cfb40db58779c17846c23a9449dedf6056fcc004ad2b1d00e587639f67d562a

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\wftwmqjrlp.pdf

    Filesize

    542B

    MD5

    ac726a17bce548600e46fbcc9bab8812

    SHA1

    da41a86df7d402443b627aaa44bb56c88fd6a48b

    SHA256

    799e0a2526ec45c98453a21bc7400ccf0d6f97953e291c548418420417b21553

    SHA512

    35b493c564b93f06f16dd6e039b294b5a9e866acb3f57df539b845e25a095ab4cc855d98b81a1e5855bda2f999847f272efb71cd788bc78a3b74905d6eaaf42c

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xtafquop.mp3

    Filesize

    540B

    MD5

    dc6a2ec0d8d1a3421627f7f4b8becb22

    SHA1

    628ae8ad3839a664e2ce0ac9f4d5c791c5171c5f

    SHA256

    eb886c2ad6afc3b4a462b1d6977da50eba54b59a5b8ab5d6623f34fb34f688c0

    SHA512

    be28cdd58b01973af88e68c9137f1b7c701eaea57e0045b26436018a5f20782033be7e96a935679d8ff39063dff0940bc4850d498eb8e11167eb17d80241491c

  • \Users\Admin\AppData\Local\Temp\RarSFX0\rsqfhqt.dat

    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • \Users\Admin\AppData\Local\Temp\RegSvcs.exe

    Filesize

    44KB

    MD5

    0e06054beb13192588e745ee63a84173

    SHA1

    30b7d4d1277bafd04a83779fd566a1f834a8d113

    SHA256

    c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768

    SHA512

    251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215

  • memory/2872-140-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2872-138-0x00000000002F0000-0x00000000012F0000-memory.dmp

    Filesize

    16.0MB

  • memory/2872-141-0x00000000002F0000-0x00000000012F0000-memory.dmp

    Filesize

    16.0MB

  • memory/2872-143-0x00000000002F0000-0x00000000012F0000-memory.dmp

    Filesize

    16.0MB