Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
PO-2019-0206DR.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO-2019-0206DR.exe
Resource
win10v2004-20240802-en
General
-
Target
PO-2019-0206DR.exe
-
Size
684KB
-
MD5
26b437c0fac1ab41712f80cbacc028bb
-
SHA1
7af2f6e902aa95f030453618875b5f6665b9d1b8
-
SHA256
00d8516cf44beee7b16042dc82dca4a1353e0f1a06210f8f5a576f8451e2c052
-
SHA512
db626946cae02de525008e04519f4e7bd7523ae78e4a6446b6fb9c3a37312bb3edb7ed766867723e8484856a9b3efdb14965be0dfee2214117d58dbd8ed432ce
-
SSDEEP
12288:H4QycNStCd0cDF2m/4q+wAfFjy2A0rJvjI/6dJyL/mU7obiS3Ii5W+JoljtH8lFf:YSSoNDF2m/4q+wAfFjy2A0FvjI/6dJyK
Malware Config
Extracted
warzonerat
xilogrid.info:6080
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral2/memory/3064-58-0x0000000004AB0000-0x0000000004ACC000-memory.dmp warzonerat behavioral2/memory/2316-62-0x0000000000400000-0x000000000041C000-memory.dmp warzonerat behavioral2/memory/2316-60-0x0000000000400000-0x000000000041C000-memory.dmp warzonerat behavioral2/memory/2316-64-0x0000000000400000-0x000000000041C000-memory.dmp warzonerat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation PO-2019-0206DR.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3064 set thread context of 2316 3064 PO-2019-0206DR.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO-2019-0206DR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe 3064 PO-2019-0206DR.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3064 PO-2019-0206DR.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2316 3064 PO-2019-0206DR.exe 85 PID 3064 wrote to memory of 2316 3064 PO-2019-0206DR.exe 85 PID 3064 wrote to memory of 2316 3064 PO-2019-0206DR.exe 85 PID 3064 wrote to memory of 2316 3064 PO-2019-0206DR.exe 85 PID 3064 wrote to memory of 2316 3064 PO-2019-0206DR.exe 85 PID 3064 wrote to memory of 2316 3064 PO-2019-0206DR.exe 85 PID 3064 wrote to memory of 2316 3064 PO-2019-0206DR.exe 85 PID 3064 wrote to memory of 2316 3064 PO-2019-0206DR.exe 85 PID 3064 wrote to memory of 2316 3064 PO-2019-0206DR.exe 85 PID 3064 wrote to memory of 2316 3064 PO-2019-0206DR.exe 85 PID 3064 wrote to memory of 2316 3064 PO-2019-0206DR.exe 85 PID 3064 wrote to memory of 4456 3064 PO-2019-0206DR.exe 86 PID 3064 wrote to memory of 4456 3064 PO-2019-0206DR.exe 86 PID 3064 wrote to memory of 4456 3064 PO-2019-0206DR.exe 86 PID 4456 wrote to memory of 2480 4456 cmd.exe 88 PID 4456 wrote to memory of 2480 4456 cmd.exe 88 PID 4456 wrote to memory of 2480 4456 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO-2019-0206DR.exe"C:\Users\Admin\AppData\Local\Temp\PO-2019-0206DR.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PO-2019-0206DR.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵
- System Location Discovery: System Language Discovery
PID:2480
-
-