Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 09:28
Static task
static1
Behavioral task
behavioral1
Sample
New order.scr
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
New order.scr
Resource
win10v2004-20241007-en
General
-
Target
New order.scr
-
Size
514KB
-
MD5
f3c47c8e567df8678fb83a825baa5789
-
SHA1
1c17a349f537f276685c4f3f7eb1da18193f2e23
-
SHA256
57938cb80e99cf9a194713f9881ade81408229ce437ec8cd0e632c25a14d2bda
-
SHA512
7d72c5ca458f7e6efbfa8729a5af36db06016d94e25c6c7da36eb9f585545ed3fc891d37dea999b2a87602da2a0fb5f70d556f482631fd5091b0c0e612b337fe
-
SSDEEP
12288:A1RveBYTrDxr5fKuuGMz6z9BokDCQTyBX2XLh6Ezp1XlJcLL:A1RWBYVlK7GMGBBoqCQTyBGXLhdt11JC
Malware Config
Extracted
warzonerat
103.161.133.139:222
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 7 IoCs
resource yara_rule behavioral2/memory/1696-11-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/1696-14-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/1696-16-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/1696-17-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/1696-21-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/1696-24-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/1696-26-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2080 set thread context of 1696 2080 New order.scr 95 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New order.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New order.scr -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2080 New order.scr 2080 New order.scr 2080 New order.scr 2080 New order.scr -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2080 New order.scr -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2080 wrote to memory of 3048 2080 New order.scr 94 PID 2080 wrote to memory of 3048 2080 New order.scr 94 PID 2080 wrote to memory of 3048 2080 New order.scr 94 PID 2080 wrote to memory of 1696 2080 New order.scr 95 PID 2080 wrote to memory of 1696 2080 New order.scr 95 PID 2080 wrote to memory of 1696 2080 New order.scr 95 PID 2080 wrote to memory of 1696 2080 New order.scr 95 PID 2080 wrote to memory of 1696 2080 New order.scr 95 PID 2080 wrote to memory of 1696 2080 New order.scr 95 PID 2080 wrote to memory of 1696 2080 New order.scr 95 PID 2080 wrote to memory of 1696 2080 New order.scr 95 PID 2080 wrote to memory of 1696 2080 New order.scr 95 PID 2080 wrote to memory of 1696 2080 New order.scr 95 PID 2080 wrote to memory of 1696 2080 New order.scr 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\New order.scr"C:\Users\Admin\AppData\Local\Temp\New order.scr" /S1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\New order.scr"C:\Users\Admin\AppData\Local\Temp\New order.scr"2⤵PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\New order.scr"C:\Users\Admin\AppData\Local\Temp\New order.scr"2⤵
- System Location Discovery: System Language Discovery
PID:1696
-