Analysis
-
max time kernel
109s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 04:34
Behavioral task
behavioral1
Sample
046a08c40c5ff787bbe473f575f672a15855a3c9b343d57935f8eadac4d1cde7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
046a08c40c5ff787bbe473f575f672a15855a3c9b343d57935f8eadac4d1cde7.exe
Resource
win10v2004-20241007-en
General
-
Target
046a08c40c5ff787bbe473f575f672a15855a3c9b343d57935f8eadac4d1cde7.exe
-
Size
152KB
-
MD5
0a898fdbbb64c5236260b65598a3c1be
-
SHA1
b92ec7dad61b08ddc4f2ae9ba6d2bc3537392606
-
SHA256
046a08c40c5ff787bbe473f575f672a15855a3c9b343d57935f8eadac4d1cde7
-
SHA512
0eb79d232bf3ff96b3710b69a5a29d783e051b39696dd2833af4ac2d1599448c105c5d0f47475b25058c5b9ac86b85cf6f4201bf787a103b203dd8f073a0741e
-
SSDEEP
3072:4NLOpnhTdOw9YAJOzIY9gVl01T2ENipdDg0z5F:4NLYdT97JSIFl0QENqFF
Malware Config
Extracted
warzonerat
daddy.linkpc.net:1145
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 1 IoCs
Processes:
resource yara_rule C:\ProgramData\images.exe warzonerat -
Executes dropped EXE 1 IoCs
Processes:
images.exepid process 4872 images.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
046a08c40c5ff787bbe473f575f672a15855a3c9b343d57935f8eadac4d1cde7.exeimages.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 046a08c40c5ff787bbe473f575f672a15855a3c9b343d57935f8eadac4d1cde7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language images.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
046a08c40c5ff787bbe473f575f672a15855a3c9b343d57935f8eadac4d1cde7.exeimages.exedescription pid process target process PID 1132 wrote to memory of 4872 1132 046a08c40c5ff787bbe473f575f672a15855a3c9b343d57935f8eadac4d1cde7.exe images.exe PID 1132 wrote to memory of 4872 1132 046a08c40c5ff787bbe473f575f672a15855a3c9b343d57935f8eadac4d1cde7.exe images.exe PID 1132 wrote to memory of 4872 1132 046a08c40c5ff787bbe473f575f672a15855a3c9b343d57935f8eadac4d1cde7.exe images.exe PID 4872 wrote to memory of 4280 4872 images.exe cmd.exe PID 4872 wrote to memory of 4280 4872 images.exe cmd.exe PID 4872 wrote to memory of 4280 4872 images.exe cmd.exe PID 4872 wrote to memory of 4280 4872 images.exe cmd.exe PID 4872 wrote to memory of 4280 4872 images.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\046a08c40c5ff787bbe473f575f672a15855a3c9b343d57935f8eadac4d1cde7.exe"C:\Users\Admin\AppData\Local\Temp\046a08c40c5ff787bbe473f575f672a15855a3c9b343d57935f8eadac4d1cde7.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4280
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD50a898fdbbb64c5236260b65598a3c1be
SHA1b92ec7dad61b08ddc4f2ae9ba6d2bc3537392606
SHA256046a08c40c5ff787bbe473f575f672a15855a3c9b343d57935f8eadac4d1cde7
SHA5120eb79d232bf3ff96b3710b69a5a29d783e051b39696dd2833af4ac2d1599448c105c5d0f47475b25058c5b9ac86b85cf6f4201bf787a103b203dd8f073a0741e