Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
PO-2019-0206DR.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO-2019-0206DR.exe
Resource
win10v2004-20240802-en
General
-
Target
PO-2019-0206DR.exe
-
Size
684KB
-
MD5
26b437c0fac1ab41712f80cbacc028bb
-
SHA1
7af2f6e902aa95f030453618875b5f6665b9d1b8
-
SHA256
00d8516cf44beee7b16042dc82dca4a1353e0f1a06210f8f5a576f8451e2c052
-
SHA512
db626946cae02de525008e04519f4e7bd7523ae78e4a6446b6fb9c3a37312bb3edb7ed766867723e8484856a9b3efdb14965be0dfee2214117d58dbd8ed432ce
-
SSDEEP
12288:H4QycNStCd0cDF2m/4q+wAfFjy2A0rJvjI/6dJyL/mU7obiS3Ii5W+JoljtH8lFf:YSSoNDF2m/4q+wAfFjy2A0FvjI/6dJyK
Malware Config
Extracted
warzonerat
xilogrid.info:6080
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 6 IoCs
resource yara_rule behavioral1/memory/2272-58-0x0000000000560000-0x000000000057C000-memory.dmp warzonerat behavioral1/memory/2780-68-0x0000000000400000-0x000000000041C000-memory.dmp warzonerat behavioral1/memory/2780-79-0x0000000000400000-0x000000000041C000-memory.dmp warzonerat behavioral1/memory/2780-66-0x0000000000400000-0x000000000041C000-memory.dmp warzonerat behavioral1/memory/2780-70-0x0000000000400000-0x000000000041C000-memory.dmp warzonerat behavioral1/memory/2780-84-0x0000000000400000-0x000000000041C000-memory.dmp warzonerat -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2272 set thread context of 2780 2272 PO-2019-0206DR.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO-2019-0206DR.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe 2272 PO-2019-0206DR.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2272 PO-2019-0206DR.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2780 2272 PO-2019-0206DR.exe 30 PID 2272 wrote to memory of 2780 2272 PO-2019-0206DR.exe 30 PID 2272 wrote to memory of 2780 2272 PO-2019-0206DR.exe 30 PID 2272 wrote to memory of 2780 2272 PO-2019-0206DR.exe 30 PID 2272 wrote to memory of 2780 2272 PO-2019-0206DR.exe 30 PID 2272 wrote to memory of 2780 2272 PO-2019-0206DR.exe 30 PID 2272 wrote to memory of 2780 2272 PO-2019-0206DR.exe 30 PID 2272 wrote to memory of 2780 2272 PO-2019-0206DR.exe 30 PID 2272 wrote to memory of 2780 2272 PO-2019-0206DR.exe 30 PID 2272 wrote to memory of 2780 2272 PO-2019-0206DR.exe 30 PID 2272 wrote to memory of 2780 2272 PO-2019-0206DR.exe 30 PID 2272 wrote to memory of 2780 2272 PO-2019-0206DR.exe 30 PID 2272 wrote to memory of 2860 2272 PO-2019-0206DR.exe 31 PID 2272 wrote to memory of 2860 2272 PO-2019-0206DR.exe 31 PID 2272 wrote to memory of 2860 2272 PO-2019-0206DR.exe 31 PID 2272 wrote to memory of 2860 2272 PO-2019-0206DR.exe 31 PID 2860 wrote to memory of 2152 2860 cmd.exe 33 PID 2860 wrote to memory of 2152 2860 cmd.exe 33 PID 2860 wrote to memory of 2152 2860 cmd.exe 33 PID 2860 wrote to memory of 2152 2860 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO-2019-0206DR.exe"C:\Users\Admin\AppData\Local\Temp\PO-2019-0206DR.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2780
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PO-2019-0206DR.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵
- System Location Discovery: System Language Discovery
PID:2152
-
-