Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 01:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-13_f075083179d973bbd0a8651e09abb523_mafia.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-13_f075083179d973bbd0a8651e09abb523_mafia.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-13_f075083179d973bbd0a8651e09abb523_mafia.exe
-
Size
13.9MB
-
MD5
f075083179d973bbd0a8651e09abb523
-
SHA1
f884c38e1a974ab8c47b33412fe651fb5232c453
-
SHA256
7e806494c37cbe06a01e52f1b1c602c6ea00ba7018994e975c667f119a1b57bc
-
SHA512
3d11415e68f1d8cc6f038efaa8d0938bde52e132ddbb5faa6a67dcc676eccc22817ab7c5db60cb5c3b99f2c26809b345c40abcc57756856d1f2dadf64fdf7247
-
SSDEEP
98304:BDlgLVmVkOZJ0kfvwW3nlyU5t9qBDhcsPGIGf8O:BDAetfv/3nt5tscAGIs8O
Malware Config
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 2 IoCs
resource yara_rule behavioral2/memory/2312-0-0x00000000025D0000-0x00000000025ED000-memory.dmp warzonerat behavioral2/memory/2312-1-0x00000000025D0000-0x00000000025ED000-memory.dmp warzonerat -
Program crash 1 IoCs
pid pid_target Process procid_target 2164 2312 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-13_f075083179d973bbd0a8651e09abb523_mafia.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-13_f075083179d973bbd0a8651e09abb523_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-13_f075083179d973bbd0a8651e09abb523_mafia.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 5002⤵
- Program crash
PID:2164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2312 -ip 23121⤵PID:3532