Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
5e4fa07bf0f249c715efac189ccd912b2c47f3117db72d2a96f9cc87080a910e.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5e4fa07bf0f249c715efac189ccd912b2c47f3117db72d2a96f9cc87080a910e.exe
Resource
win10v2004-20240802-en
General
-
Target
5e4fa07bf0f249c715efac189ccd912b2c47f3117db72d2a96f9cc87080a910e.exe
-
Size
1.0MB
-
MD5
5ff5712069f1f56f5f7ce88bca97ba2e
-
SHA1
2e4fcebc6f2cf1f4d7662f84aaf73ff189629cdb
-
SHA256
5e4fa07bf0f249c715efac189ccd912b2c47f3117db72d2a96f9cc87080a910e
-
SHA512
b5a97229f302664931e893d9123ee7fcf1be80832e0160de107a36b1ae697231ad548a48333412e47247f899138c5a091e7d3616d683ba389469bfb493878a25
-
SSDEEP
24576:y6nVMk+HIj90cmvFMN8O663kAjMEF/Jfwocd5xShmmpGfPFa:xVz7tWqK63YSJf/Qx8dpGc
Malware Config
Extracted
warzonerat
htajsjdh3738828e8dhdjjccbnc.duckdns.org:5574
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 2 IoCs
resource yara_rule behavioral2/memory/3584-138-0x0000000000950000-0x0000000001950000-memory.dmp warzonerat behavioral2/memory/3584-140-0x0000000000950000-0x0000000001950000-memory.dmp warzonerat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 5e4fa07bf0f249c715efac189ccd912b2c47f3117db72d2a96f9cc87080a910e.exe -
Executes dropped EXE 2 IoCs
pid Process 2852 rsqfhqt.dat 3584 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "c:\\akpr\\RSQFHQ~1.EXE c:\\akpr\\brcbr.xls" rsqfhqt.dat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2852 set thread context of 3584 2852 rsqfhqt.dat 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rsqfhqt.dat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e4fa07bf0f249c715efac189ccd912b2c47f3117db72d2a96f9cc87080a910e.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 1500 ipconfig.exe 748 ipconfig.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings 5e4fa07bf0f249c715efac189ccd912b2c47f3117db72d2a96f9cc87080a910e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat 2852 rsqfhqt.dat -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1788 wrote to memory of 224 1788 5e4fa07bf0f249c715efac189ccd912b2c47f3117db72d2a96f9cc87080a910e.exe 87 PID 1788 wrote to memory of 224 1788 5e4fa07bf0f249c715efac189ccd912b2c47f3117db72d2a96f9cc87080a910e.exe 87 PID 1788 wrote to memory of 224 1788 5e4fa07bf0f249c715efac189ccd912b2c47f3117db72d2a96f9cc87080a910e.exe 87 PID 224 wrote to memory of 4504 224 WScript.exe 88 PID 224 wrote to memory of 4504 224 WScript.exe 88 PID 224 wrote to memory of 4504 224 WScript.exe 88 PID 224 wrote to memory of 3528 224 WScript.exe 90 PID 224 wrote to memory of 3528 224 WScript.exe 90 PID 224 wrote to memory of 3528 224 WScript.exe 90 PID 4504 wrote to memory of 1500 4504 cmd.exe 92 PID 4504 wrote to memory of 1500 4504 cmd.exe 92 PID 4504 wrote to memory of 1500 4504 cmd.exe 92 PID 3528 wrote to memory of 2852 3528 cmd.exe 93 PID 3528 wrote to memory of 2852 3528 cmd.exe 93 PID 3528 wrote to memory of 2852 3528 cmd.exe 93 PID 2852 wrote to memory of 3584 2852 rsqfhqt.dat 94 PID 2852 wrote to memory of 3584 2852 rsqfhqt.dat 94 PID 2852 wrote to memory of 3584 2852 rsqfhqt.dat 94 PID 2852 wrote to memory of 3584 2852 rsqfhqt.dat 94 PID 2852 wrote to memory of 3584 2852 rsqfhqt.dat 94 PID 224 wrote to memory of 3564 224 WScript.exe 95 PID 224 wrote to memory of 3564 224 WScript.exe 95 PID 224 wrote to memory of 3564 224 WScript.exe 95 PID 3564 wrote to memory of 748 3564 cmd.exe 97 PID 3564 wrote to memory of 748 3564 cmd.exe 97 PID 3564 wrote to memory of 748 3564 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e4fa07bf0f249c715efac189ccd912b2c47f3117db72d2a96f9cc87080a910e.exe"C:\Users\Admin\AppData\Local\Temp\5e4fa07bf0f249c715efac189ccd912b2c47f3117db72d2a96f9cc87080a910e.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\tsxf.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1500
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rsqfhqt.dat brcbr.xls3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\rsqfhqt.datrsqfhqt.dat brcbr.xls4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3584
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:748
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
537B
MD5b8c8d6c2be3edcd2727cda09596ac66b
SHA13ece6832715d6b906bfeed531193133a1be9a6e0
SHA25696534ec24633ec9d2606f7123e939a4c9440e8640eb5b18e2170277e5ac04b2b
SHA512d820774c51cfb13af11f45ee3e423ceeabad8a62a89092ea4102338992c41d4418e5c48d001e6a39a3c24c468e969cc15c22d46fe4bcde532f6364eb6a95f438
-
Filesize
532B
MD55b45b12ea6f107709879675791b2f75f
SHA178b5558a4fb2715368fa077dc20eb090357c8a68
SHA256591b4d1f2a29cbde192ec40336ac3c762f62172e4bc4e88d3a5e4f3e40f432ce
SHA512f928c5d8ae2a9351a979eb82680fa706ca2bb3dea8aa52e14443ce878f947a30740d2552903648fe512417578af0b3f36145431eff7d3c019e09ef54edf2961a
-
Filesize
519B
MD547930131f3318f5078b6f15d2feed616
SHA1106e085377419f8a20392c46b2ec129bb6446eb9
SHA2561fc4f7da7307cea290a2be3cb178cf6ddbd7d0ca74acfe1efca4df7733eae014
SHA5125504f6a2483cfbccfee56bf1ade0b9ea52066ceeaf6be98e0c872c3d7f07c5054ebc089a429b4786f72808fc462944e8ced4156329bde10b75f4bdb1e410ffd7
-
Filesize
552B
MD520ce82485f5cf010d03b9616d5d2f8a8
SHA12c9ca41bcde5c88f4e7e0a092262661ff8dfeccb
SHA256a0977da691525816a86686f47e7cea3e65f2d32a2a488d7c86795cdbf576aeae
SHA512e0db57f46693049e9170394848020d6d1ebd9f90feb6468a9c55c54deeeabb0cdb12789e96c392bea2bb6641dbf66d16464507ec92a33f0d4e588b2433a69370
-
Filesize
626B
MD5c9d85f08dc17da5d4d909994c9cf5843
SHA1a7d5841a0e5b585e5eceba30a255b3cfeb57b4af
SHA2560d148126911b7fd78de49401acdbbb8f06e50b4905e6c42709c91d3ca0c3526f
SHA51267f21a9a8b4a3f4fc190f92d0e0f96fffd1b4b73b95511dbffb6016adf443cc650784723257600f85a9fb0f4bbe702757fa3c1ef7d0baa17dda18c2fb7630c5c
-
Filesize
527B
MD5049c80d59283d089aa3c86efe814f86d
SHA15272439d5d6b594760b5bd75e2a59dbbbd5753d0
SHA2568b787e2c01be8e5d4f2c6c4386f12f737940921e30f671c793e966caa821ab11
SHA512d02fa8cbc5faccdd67dd38830a0205e6dd2bda9952f414efdfce1093f77a3a80590e8b73bb50e21a2babd826bf108722c708a0e84fb366daf26edc3d74bd5d07
-
Filesize
530B
MD5116b4e71f8966f3c4af8d4352a076b51
SHA10df16e87ded9c60828b84e30ee1e0d5b5d2b0d60
SHA2561708c337d8d1ac3c37d76ce97d19d45bf54356affa4f3222af4bd36677be13e3
SHA512115ce8f45a3ec89f7aa484b0b60242ff61c3038eeaa488a987456696a304a12975935bfe9454adfe7735aac90f54cd327bddb4f4d24ec841c217a642f97eaacd
-
Filesize
669B
MD56e346ad8d8d85f498b8de75252445096
SHA1d43e467ef6a7f39a598bf5c685cab67e9fcf90ae
SHA2563f5efe79a10df0e35737c77508a0006c84f04e15018c051b95f03f330fe99d32
SHA5125a829c8cce3b75b4d063f778e373f14bc3e66d3d6678407fb7f2caa83236681f7459d2ca9b0087f015c92271c48def01fa76629da5471027db3be754e4c7c55c
-
Filesize
558B
MD5806e14b19d830e4aa201bcd39c5ed762
SHA12169b408be9bf87bc2ec7043dd55c6d9f26d5f05
SHA25602c78ad7a58957d0cd18c7d315b4fe9ddcf28a82fdd05e98c204f250cbc0b2c8
SHA51237737194222a028461a4004b94ce86c134d5bb4a9dbb997e101eeb9267ff1576df5aae2669047cc97773622df74a6efd0cee2513f3475be150ac5d588ad13c95
-
Filesize
35KB
MD5d2614e4b5b860a2c176a686c4dbd582e
SHA1f3c0c1f3dd8c348d4e0e673997b08b21b2fa0552
SHA2561ca4c244bfae54d46636880e81e252ab869c45711ac9e98592846200b27587b5
SHA512eee74b99ccb26eb0f6053310c25bb072aed8c1df99075b744a1de43fb1f7c5df49f01ec4270f21c7a77b8033393c08b33f0df2247239fd9013aee62c7374f1c2
-
Filesize
35KB
MD5025126d2698d163013cee4ca927fd530
SHA10bb9d2f21235f72d8877a3933b76e97eac810fa5
SHA2567f08e11668d0b6d173165320e48b0e3287779a45076a30b2ed27b3c2089c3b36
SHA5122227104a20d478ce086ebe4d2682aa85da7cee114edd8a42037150da88cc3416bd4c6f976fc95db9b37f3fc9ff801a22113d0d1781621c44bf8af7e99d13183a
-
Filesize
239KB
MD58ad5ae8b27c5047c005099cadc65cd4f
SHA1a19a72cd9d77a3230e8d1acbc28fbc6451eaf82d
SHA256bd094e8177cbbd3272c901571ed539c92d4ba9cdb48f386fca7d6a0a5a73aa0c
SHA512f9e4da85e360c822c4993243beaa5ffba1935e14f0c0d555bac48f9655ba64cbfebfa6f023197537bc97c448a7c057fc34d698f8b3a4933bd991198be06d7d98
-
Filesize
569B
MD5670155fc8ba1e3dca9b0cfd99d3b990e
SHA183dddcaaba7bfd94479efc08d55b31d2fb3ed79d
SHA25664312bce8c4e04cec8a74d1f9e4e3ae53b89c228fe05d213f9b51febf1e86372
SHA512ad3cc3377da66e01c2d69965bb14ab2641aca16001a6942648c70fe3a11bc79e2a0ab1c631cbf2514b08590a92a3bf36f182e2191328952a049d86b787279ebe
-
Filesize
611B
MD5511cbc1664e0ce92f6c98611536f4c9c
SHA1ba52ec5170da7ca4def2b4b5979200c0acbf8feb
SHA256552ce1844148172ef8d30650f253edb0f59d4735b492e91482ce01b3bfc341be
SHA51200e184cd1c6c457e96430d6d40c01cd8b080676f23191bc566185e43164afeecbcf8226159f8e71119701ad358027e264400f93a207260daa16cfeecd0d2f1b0
-
Filesize
525B
MD5abc90273fe0c7017bd3a6c4261ed19b6
SHA1e93587a0833f3a85289da32c447326f62c716abc
SHA2565b34125b6faf65e0fa600764b66d982f5c32db749a079c1ebe2cbcf9a0e51b2a
SHA51268f01633d0a9c8e6ed9d43821cf12b551c59b419e090b72aa4ffbad63ad44a2e4f121c2f35e1fcb7d90d269fb30036a2fb5cd16015dfcf1487ade639b3541e2c
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
587B
MD502add4c5da79fcb387e49955a09e44c1
SHA1708198f17b366a153b8901975ac35615aed2dd0f
SHA256afb3c2e28d5f9d81ee5dafccbacbfbcb56e0b0fd4f49290eb4d137c4a8c22086
SHA512c7a79636b57550dac6ae225171c8c1c1ed86d9659d6fae8b51021689317d98b46345422ea6944b2e9f565aa50215c6ea96ce37fea43356416ed6d90811426e81
-
Filesize
525B
MD59ca9f2990bb04a6933b5a83cb75cd400
SHA157afe18224df3b94ab99a0f044988366765c343c
SHA25669fd950763387e4986e38636b039c5a271edb3d64f463bf17f70d38538318202
SHA512274985e5b6acb444dd949b9e7711c6465bff12feb253d02732c3948472305ccf54118ac7eaabb9a54da159f90b9b9850a73133e9d953a9882c5649a12145d6ed
-
Filesize
596B
MD51fb90bf45556332bf1fc840223b042c3
SHA1b444a953fe647fd038e4c4bb88fb56c372830b1c
SHA2564fe4c72f9b5c0e15b8999be916e24f3571a448da1dda7e2fb3d287054f3438e4
SHA512e064851fd10fb54ecd11cd0a583fc662f406e7527e6aa0efe28966b19973c8bb0ea91a34abe6edc7931e23386b57be16548b1d52adb35ca3fa9b3ad1c41cdcb5
-
Filesize
564B
MD5c782b7e7c2de2008c49e6a95eb81a01b
SHA1aeed210bd89fce4bc564c6d6a37e93a4c632bd64
SHA256cba2995053c32440838c47a0a64e120c8a24804ee10b247a6833b8a0e7032caf
SHA512bde52b84e50e6c1dfa3594e5180527462c30396ff4cd196cc18889d8ec83f8d02559ec51796f4c05f36449cbdcd370352e12d4cf08fa1bf1be381a4d98ba1e04
-
Filesize
85KB
MD5add8b72bf00db071ab452149a1342501
SHA1482e826adffc3f57b60c6e7a2b1c17de60bb23df
SHA256df9153d81ecdd4200a989da8afa6e777b9435bc24b2827f31657b9a711ea705e
SHA512763276eb45bff216c51e724a027831570cd61a3d8ab9cdb5d0f2954187f3b81e9cfb40db58779c17846c23a9449dedf6056fcc004ad2b1d00e587639f67d562a
-
Filesize
542B
MD5ac726a17bce548600e46fbcc9bab8812
SHA1da41a86df7d402443b627aaa44bb56c88fd6a48b
SHA256799e0a2526ec45c98453a21bc7400ccf0d6f97953e291c548418420417b21553
SHA51235b493c564b93f06f16dd6e039b294b5a9e866acb3f57df539b845e25a095ab4cc855d98b81a1e5855bda2f999847f272efb71cd788bc78a3b74905d6eaaf42c
-
Filesize
540B
MD5dc6a2ec0d8d1a3421627f7f4b8becb22
SHA1628ae8ad3839a664e2ce0ac9f4d5c791c5171c5f
SHA256eb886c2ad6afc3b4a462b1d6977da50eba54b59a5b8ab5d6623f34fb34f688c0
SHA512be28cdd58b01973af88e68c9137f1b7c701eaea57e0045b26436018a5f20782033be7e96a935679d8ff39063dff0940bc4850d498eb8e11167eb17d80241491c
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b