General
-
Target
22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe
-
Size
8.2MB
-
Sample
241206-dlg12stjal
-
MD5
5b38b3b2a571a945db7ef36cedf360a0
-
SHA1
d8c31282b5842d0a4c8c4842c70690e52a79b700
-
SHA256
22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edc
-
SHA512
7f053766692102ab9aa74e5daa2253649b4abdf407702bb9685f4c0d4dfb324d90a4d687578d4e264be502c894e3f91a80a2e7087dda453ff1a29166bdebf57f
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecH:V8e8e8f8e8e8Y
Behavioral task
behavioral1
Sample
22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe
-
Size
8.2MB
-
MD5
5b38b3b2a571a945db7ef36cedf360a0
-
SHA1
d8c31282b5842d0a4c8c4842c70690e52a79b700
-
SHA256
22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edc
-
SHA512
7f053766692102ab9aa74e5daa2253649b4abdf407702bb9685f4c0d4dfb324d90a4d687578d4e264be502c894e3f91a80a2e7087dda453ff1a29166bdebf57f
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecH:V8e8e8f8e8e8Y
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4