Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-11-2024 02:33

General

  • Target

    3790861e8c62040dbb2dd3c290d1a2738cef6b04fd38de2d37ba58708838ddab.exe

  • Size

    113KB

  • MD5

    e94753e8a792b65ce7765c83e7d901e9

  • SHA1

    b007cc3dde9c3eb45a2da18fac939d51c80e641b

  • SHA256

    3790861e8c62040dbb2dd3c290d1a2738cef6b04fd38de2d37ba58708838ddab

  • SHA512

    1a572de1861f2e6487ee60ea9102ea8443d057ae9c00b53242719e1835f56d22e3eed3ac6999408b7b2a6902cf432ed23074968ad5d0f2907ffc70645812af6a

  • SSDEEP

    1536:h0jP7/L1B5rVmN8sxHv2M28ix8EUaJxWZoB4u0OVE01:K1VmhaH8EFvW+0OVE0

Malware Config

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3790861e8c62040dbb2dd3c290d1a2738cef6b04fd38de2d37ba58708838ddab.exe
    "C:\Users\Admin\AppData\Local\Temp\3790861e8c62040dbb2dd3c290d1a2738cef6b04fd38de2d37ba58708838ddab.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    PID:1360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads