Analysis
-
max time kernel
125s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
31/08/2024, 04:05
Static task
static1
Behavioral task
behavioral1
Sample
b24cc506fb4cef38b05dabfac2e15ef98e8e0d55fccc421b8755230937961d1c.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b24cc506fb4cef38b05dabfac2e15ef98e8e0d55fccc421b8755230937961d1c.exe
Resource
win10v2004-20240802-en
General
-
Target
b24cc506fb4cef38b05dabfac2e15ef98e8e0d55fccc421b8755230937961d1c.exe
-
Size
1.1MB
-
MD5
98b9ee58f23e50a27cc8fd93de2ef08a
-
SHA1
92da139ae7a2ca9e13edb70f614e6b6a84143b08
-
SHA256
b24cc506fb4cef38b05dabfac2e15ef98e8e0d55fccc421b8755230937961d1c
-
SHA512
5648121102a02a8344abb9b68c7106905abcd43085d73607b5b5d8b852418c602588f374a07c9e2f7b68f367868f099929b8025c20136067bc81c09fb9ba0d38
-
SSDEEP
24576:g0BG9gGUvH+uStz+Xdzu6ENDrhh1bx7n2H:g0PGAeF+Nurlrxbx7G
Malware Config
Extracted
warzonerat
192.236.249.173:2709
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2768-45-0x0000000000750000-0x00000000008A4000-memory.dmp warzonerat behavioral1/memory/2768-52-0x0000000002110000-0x0000000002D10000-memory.dmp warzonerat -
Executes dropped EXE 2 IoCs
pid Process 2868 onedrv.exe 2768 WINWORD.exe -
Loads dropped DLL 6 IoCs
pid Process 1944 b24cc506fb4cef38b05dabfac2e15ef98e8e0d55fccc421b8755230937961d1c.exe 1944 b24cc506fb4cef38b05dabfac2e15ef98e8e0d55fccc421b8755230937961d1c.exe 1944 b24cc506fb4cef38b05dabfac2e15ef98e8e0d55fccc421b8755230937961d1c.exe 1944 b24cc506fb4cef38b05dabfac2e15ef98e8e0d55fccc421b8755230937961d1c.exe 1944 b24cc506fb4cef38b05dabfac2e15ef98e8e0d55fccc421b8755230937961d1c.exe 2868 onedrv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language onedrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b24cc506fb4cef38b05dabfac2e15ef98e8e0d55fccc421b8755230937961d1c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2748 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2868 onedrv.exe 2748 AcroRd32.exe 2748 AcroRd32.exe 2748 AcroRd32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2868 1944 b24cc506fb4cef38b05dabfac2e15ef98e8e0d55fccc421b8755230937961d1c.exe 31 PID 1944 wrote to memory of 2868 1944 b24cc506fb4cef38b05dabfac2e15ef98e8e0d55fccc421b8755230937961d1c.exe 31 PID 1944 wrote to memory of 2868 1944 b24cc506fb4cef38b05dabfac2e15ef98e8e0d55fccc421b8755230937961d1c.exe 31 PID 1944 wrote to memory of 2868 1944 b24cc506fb4cef38b05dabfac2e15ef98e8e0d55fccc421b8755230937961d1c.exe 31 PID 2868 wrote to memory of 2768 2868 onedrv.exe 32 PID 2868 wrote to memory of 2768 2868 onedrv.exe 32 PID 2868 wrote to memory of 2768 2868 onedrv.exe 32 PID 2868 wrote to memory of 2768 2868 onedrv.exe 32 PID 2868 wrote to memory of 2748 2868 onedrv.exe 33 PID 2868 wrote to memory of 2748 2868 onedrv.exe 33 PID 2868 wrote to memory of 2748 2868 onedrv.exe 33 PID 2868 wrote to memory of 2748 2868 onedrv.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b24cc506fb4cef38b05dabfac2e15ef98e8e0d55fccc421b8755230937961d1c.exe"C:\Users\Admin\AppData\Local\Temp\b24cc506fb4cef38b05dabfac2e15ef98e8e0d55fccc421b8755230937961d1c.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\ckz_YW40\zip\onedrv.exe"C:\Users\Admin\AppData\Local\Temp\ckz_YW40\zip\onedrv.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\ckz_YW40\zip\WINWORD.exe"C:\Users\Admin\AppData\Local\Temp\ckz_YW40\zip\WINWORD.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ckz_YW40\zip\file.pdf"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
894KB
MD5626d639ecf5972f7cea034b18dbee0f4
SHA1c8a61d6fab901afb34435b63c7ee95e913540717
SHA2563e6650eabdb08e5806c80bc5ed390f279d79faddb63fe2a4c7eeb84b25bb3ec0
SHA512e172d356647851e27a1819eb1597a8512921ba53de4e8beacfbdb263f42910798163be1cf54bd02cc1a6f43dbe9dcd108ff7bc721e41b849779ca85776828ca6
-
Filesize
233KB
MD570c2851ccffcc74203ce20b2250ef104
SHA1e153ee56481693d33693246027d22b585758c407
SHA2560022cf3d70891a42950eb9ca705eec76b25346c3ce473837dd0dc1ac006bb80d
SHA512fde0deac41f119e389114fea343abf5142de50ca6011e240e2d8686cc8f45893f97365885a1c4420fd4c2212546a4ff71b2de67b93ea21d68b9473004bad9703
-
Filesize
3KB
MD5378f8305f5198eaac0cda174b5281f6e
SHA1e4cc8c75394a1369cf64150bac7c8baa958d5994
SHA256a918366306fe9e0f86448eec0dd630666a644a6cb16d09fba613570cfa3c7ece
SHA5124679fb8e93d3b060a6cf2e0c16f0b4cf87476757f9f89f7bffe90520e99d42352bdbcadb5e8c9d84427023ad4edc75effd3d7c549f033e57443fc1aca3aa067a
-
Filesize
20KB
MD585f2b9dace6497d42c370feeb69bd662
SHA13d4b98d68a56b024d4ed7cf3b4746de43e223ded
SHA2562d036fc8e7778e7fbc5ad1f3422f0855918e1ff7fa05e89701f6d84ce2a6ffce
SHA51237a01c1cb3b05cbb48f29bcaf422f7de4e22e23a74b49fd1b36d88f391b3198a99144c993add6d394b8b90fabdf7e7e623c89ab736b0c0b81e8a8cc7e860f915