Analysis
-
max time kernel
11s -
max time network
11s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 02:23
Static task
static1
Behavioral task
behavioral1
Sample
asdATS7sdd_encryptix.exe
Resource
win10v2004-20241007-en
General
-
Target
asdATS7sdd_encryptix.exe
-
Size
175KB
-
MD5
219f70af670bdb8775f77155f969ff05
-
SHA1
acd9da0eaed2fc2fb974b2e20d25ea81027906de
-
SHA256
f430e03de9760296609c2de83c1a44cc9f5e089d43059e8cb979c9a988133925
-
SHA512
442be37fd95dd42b22969093cc8cefef23c823dcdaa07357f7af2d303766a5a6c53e23984c7f909914a2ee374147e65bb6b42b0ca7d828960612e64193992683
-
SSDEEP
3072:H/4KgM/9oUsDjW1YsiH84IogGgDWcXmY+9iIlu9TjEifNAJQZToZd8Kss//+6UpF:HQKgMFdgEiHRLgDBXmDZu9TA8AJQZTo
Malware Config
Extracted
warzonerat
based-identity.gl.at.ply.gg:15157
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral1/memory/2200-6-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/2200-3-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/2200-8-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/2200-10-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4504 set thread context of 2200 4504 asdATS7sdd_encryptix.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asdATS7sdd_encryptix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asdATS7sdd_encryptix.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4504 wrote to memory of 2200 4504 asdATS7sdd_encryptix.exe 87 PID 4504 wrote to memory of 2200 4504 asdATS7sdd_encryptix.exe 87 PID 4504 wrote to memory of 2200 4504 asdATS7sdd_encryptix.exe 87 PID 4504 wrote to memory of 2200 4504 asdATS7sdd_encryptix.exe 87 PID 4504 wrote to memory of 2200 4504 asdATS7sdd_encryptix.exe 87 PID 4504 wrote to memory of 2200 4504 asdATS7sdd_encryptix.exe 87 PID 4504 wrote to memory of 2200 4504 asdATS7sdd_encryptix.exe 87 PID 4504 wrote to memory of 2200 4504 asdATS7sdd_encryptix.exe 87 PID 4504 wrote to memory of 2200 4504 asdATS7sdd_encryptix.exe 87 PID 4504 wrote to memory of 2200 4504 asdATS7sdd_encryptix.exe 87 PID 4504 wrote to memory of 2200 4504 asdATS7sdd_encryptix.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\asdATS7sdd_encryptix.exe"C:\Users\Admin\AppData\Local\Temp\asdATS7sdd_encryptix.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\asdATS7sdd_encryptix.exe#by-unknown2⤵
- System Location Discovery: System Language Discovery
PID:2200
-