Analysis

  • max time kernel
    131s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-12-2024 02:34

General

  • Target

    4fbea9806312eece3dd8523cf6c9509cedda1abe14fdc55bf793606dffe6c053.exe

  • Size

    277KB

  • MD5

    22a231b758870d819a1169a9744a0805

  • SHA1

    5a175eff3e50d5108f9d859b57c5be276a23ac53

  • SHA256

    4fbea9806312eece3dd8523cf6c9509cedda1abe14fdc55bf793606dffe6c053

  • SHA512

    447d2ca8eab182c29c380ddf7ba66bbb5c9ad86edd113d0771e3290146c3a187e95e4931f1ef2b89b2bddd79f42813ea8f47ef643a0ad93f8643e0ae05815ef7

  • SSDEEP

    6144:K6fjKlLXlCLVH30qRECXqo+5MuUgYXNV+d:1LK1XkLVHxGo+egYX6

Malware Config

Extracted

Family

warzonerat

C2

dns.stipamana.com:5219

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 9 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4fbea9806312eece3dd8523cf6c9509cedda1abe14fdc55bf793606dffe6c053.exe
    "C:\Users\Admin\AppData\Local\Temp\4fbea9806312eece3dd8523cf6c9509cedda1abe14fdc55bf793606dffe6c053.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4420
    • C:\Users\Admin\AppData\Local\Temp\4fbea9806312eece3dd8523cf6c9509cedda1abe14fdc55bf793606dffe6c053.exe
      C:\Users\Admin\AppData\Local\Temp\4fbea9806312eece3dd8523cf6c9509cedda1abe14fdc55bf793606dffe6c053.exe
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3404
      • C:\ProgramData\images.exe
        "C:\ProgramData\images.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2852
        • C:\ProgramData\images.exe
          C:\ProgramData\images.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2968
        • C:\ProgramData\images.exe
          C:\ProgramData\images.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4760
    • C:\Users\Admin\AppData\Local\Temp\4fbea9806312eece3dd8523cf6c9509cedda1abe14fdc55bf793606dffe6c053.exe
      C:\Users\Admin\AppData\Local\Temp\4fbea9806312eece3dd8523cf6c9509cedda1abe14fdc55bf793606dffe6c053.exe
      2⤵
        PID:3968
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 80
          3⤵
          • Program crash
          PID:2064
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3968 -ip 3968
      1⤵
        PID:2092

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\images.exe

        Filesize

        277KB

        MD5

        22a231b758870d819a1169a9744a0805

        SHA1

        5a175eff3e50d5108f9d859b57c5be276a23ac53

        SHA256

        4fbea9806312eece3dd8523cf6c9509cedda1abe14fdc55bf793606dffe6c053

        SHA512

        447d2ca8eab182c29c380ddf7ba66bbb5c9ad86edd113d0771e3290146c3a187e95e4931f1ef2b89b2bddd79f42813ea8f47ef643a0ad93f8643e0ae05815ef7

      • memory/2852-32-0x00000000747E0000-0x0000000074F90000-memory.dmp

        Filesize

        7.7MB

      • memory/2852-20-0x00000000747E0000-0x0000000074F90000-memory.dmp

        Filesize

        7.7MB

      • memory/2852-19-0x00000000747EE000-0x00000000747EF000-memory.dmp

        Filesize

        4KB

      • memory/2968-34-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/2968-24-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/2968-29-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/3404-7-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/3404-11-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/3404-18-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/3404-12-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/4420-5-0x00000000073F0000-0x0000000007482000-memory.dmp

        Filesize

        584KB

      • memory/4420-13-0x0000000074F10000-0x00000000756C0000-memory.dmp

        Filesize

        7.7MB

      • memory/4420-6-0x0000000074F10000-0x00000000756C0000-memory.dmp

        Filesize

        7.7MB

      • memory/4420-0-0x0000000074F1E000-0x0000000074F1F000-memory.dmp

        Filesize

        4KB

      • memory/4420-4-0x0000000007900000-0x0000000007EA4000-memory.dmp

        Filesize

        5.6MB

      • memory/4420-3-0x00000000072B0000-0x000000000734C000-memory.dmp

        Filesize

        624KB

      • memory/4420-2-0x00000000028A0000-0x00000000028F8000-memory.dmp

        Filesize

        352KB

      • memory/4420-1-0x0000000000380000-0x00000000003CC000-memory.dmp

        Filesize

        304KB

      • memory/4760-30-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/4760-33-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB