Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 06:30
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 8976765564566787978754566787909875654567.scr
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
RFQ 8976765564566787978754566787909875654567.scr
Resource
win10v2004-20241007-en
General
-
Target
RFQ 8976765564566787978754566787909875654567.scr
-
Size
557KB
-
MD5
f302ac3931ec4406589e92bb0ceb5a05
-
SHA1
e9fc3f3264cd3a1ec6023493a5c96c2ba317755f
-
SHA256
6b83778b6931df0a74268e44daf5ca87dee79b0360b1022e6976281c5a1c58de
-
SHA512
a3ce33d824ccd13a368e974d0df5d33081474652223280fd8464339f59a2598d80b8c83490b543a3d2cb09af60d4a342fe918fdb72076dafe4fdfe954817922c
-
SSDEEP
12288:8zll9Z7a0GM4Rb9So1JELBYaKMwHI3lpa+zD56gsjFQX0zHVjczn4SB0AjlEVwtw:qawL6Ib/N6zjFQERQn4SB1jRti
Malware Config
Extracted
warzonerat
172.245.23.149:4020
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 6 IoCs
resource yara_rule behavioral2/memory/2548-47-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral2/memory/2548-32-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral2/memory/2548-93-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral2/memory/2548-99-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral2/memory/2548-101-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral2/memory/2548-100-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4140 powershell.exe 776 powershell.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\Microsoft DN1\\sqlmap.dll" RFQ 8976765564566787978754566787909875654567.scr -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation RFQ 8976765564566787978754566787909875654567.scr -
Loads dropped DLL 1 IoCs
pid Process 4360 svchost.exe -
Modifies WinLogon 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList RFQ 8976765564566787978754566787909875654567.scr Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts RFQ 8976765564566787978754566787909875654567.scr Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\gz.asbn = "0" RFQ 8976765564566787978754566787909875654567.scr Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" RFQ 8976765564566787978754566787909875654567.scr -
Hide Artifacts: Hidden Users 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\gz.asbn = "0" RFQ 8976765564566787978754566787909875654567.scr -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1596 set thread context of 2548 1596 RFQ 8976765564566787978754566787909875654567.scr 95 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Microsoft DN1\sqlmap.dll RFQ 8976765564566787978754566787909875654567.scr File created C:\Program Files\Microsoft DN1\rdpwrap.ini RFQ 8976765564566787978754566787909875654567.scr File opened for modification \??\c:\program files\microsoft dn1\rdpwrap.txt svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ 8976765564566787978754566787909875654567.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ 8976765564566787978754566787909875654567.scr -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2276 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4140 powershell.exe 776 powershell.exe 776 powershell.exe 4140 powershell.exe 4360 svchost.exe 4360 svchost.exe 4360 svchost.exe 4360 svchost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4140 powershell.exe Token: SeDebugPrivilege 776 powershell.exe Token: SeDebugPrivilege 2548 RFQ 8976765564566787978754566787909875654567.scr Token: SeAuditPrivilege 4360 svchost.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1596 wrote to memory of 4140 1596 RFQ 8976765564566787978754566787909875654567.scr 89 PID 1596 wrote to memory of 4140 1596 RFQ 8976765564566787978754566787909875654567.scr 89 PID 1596 wrote to memory of 4140 1596 RFQ 8976765564566787978754566787909875654567.scr 89 PID 1596 wrote to memory of 776 1596 RFQ 8976765564566787978754566787909875654567.scr 91 PID 1596 wrote to memory of 776 1596 RFQ 8976765564566787978754566787909875654567.scr 91 PID 1596 wrote to memory of 776 1596 RFQ 8976765564566787978754566787909875654567.scr 91 PID 1596 wrote to memory of 2276 1596 RFQ 8976765564566787978754566787909875654567.scr 92 PID 1596 wrote to memory of 2276 1596 RFQ 8976765564566787978754566787909875654567.scr 92 PID 1596 wrote to memory of 2276 1596 RFQ 8976765564566787978754566787909875654567.scr 92 PID 1596 wrote to memory of 2548 1596 RFQ 8976765564566787978754566787909875654567.scr 95 PID 1596 wrote to memory of 2548 1596 RFQ 8976765564566787978754566787909875654567.scr 95 PID 1596 wrote to memory of 2548 1596 RFQ 8976765564566787978754566787909875654567.scr 95 PID 1596 wrote to memory of 2548 1596 RFQ 8976765564566787978754566787909875654567.scr 95 PID 1596 wrote to memory of 2548 1596 RFQ 8976765564566787978754566787909875654567.scr 95 PID 1596 wrote to memory of 2548 1596 RFQ 8976765564566787978754566787909875654567.scr 95 PID 1596 wrote to memory of 2548 1596 RFQ 8976765564566787978754566787909875654567.scr 95 PID 1596 wrote to memory of 2548 1596 RFQ 8976765564566787978754566787909875654567.scr 95 PID 1596 wrote to memory of 2548 1596 RFQ 8976765564566787978754566787909875654567.scr 95 PID 1596 wrote to memory of 2548 1596 RFQ 8976765564566787978754566787909875654567.scr 95 PID 1596 wrote to memory of 2548 1596 RFQ 8976765564566787978754566787909875654567.scr 95 PID 2548 wrote to memory of 3396 2548 RFQ 8976765564566787978754566787909875654567.scr 96 PID 2548 wrote to memory of 3396 2548 RFQ 8976765564566787978754566787909875654567.scr 96 PID 2548 wrote to memory of 3396 2548 RFQ 8976765564566787978754566787909875654567.scr 96 PID 2548 wrote to memory of 3396 2548 RFQ 8976765564566787978754566787909875654567.scr 96 PID 2548 wrote to memory of 3396 2548 RFQ 8976765564566787978754566787909875654567.scr 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ 8976765564566787978754566787909875654567.scr"C:\Users\Admin\AppData\Local\Temp\RFQ 8976765564566787978754566787909875654567.scr" /S1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RFQ 8976765564566787978754566787909875654567.scr"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\rQCIRoFZewxkov.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rQCIRoFZewxkov" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE7DF.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\RFQ 8976765564566787978754566787909875654567.scr"C:\Users\Admin\AppData\Local\Temp\RFQ 8976765564566787978754566787909875654567.scr"2⤵
- Server Software Component: Terminal Services DLL
- Modifies WinLogon
- Hide Artifacts: Hidden Users
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3396
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵PID:2984
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4360
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD50669dfcddc70376f7e1e202f34861bf5
SHA1237fe1fc9cf4eb6eb07cd8a7cea5abd922d5b35f
SHA256d32ba43d8bb8965e879c986cb7278f84fb7beda8b886d105567c9bece6682063
SHA512d94a6a481de521a11aee3c140a5e5cd36b4c3e841c87533e1221dc51321cdc1562ef2267bc4dfea791071ed1ba5d67159efc3734f13a207cff8423ccf67a118a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5738fa81a621d635bdf8f397170c38ebc
SHA16077f64f357c304153c4bd01ff5c4179e9edac2b
SHA2567751826f58dfec8fb5caf889a5fd88978e616025ec4c801483400392b2d56426
SHA51222e369fad2e124fe123e5145c6df1b841281e4093f0d97c10596d8b22c6f6af34dd79b7c4424cdea8e04172b764f536286c9daec08dab80e7931ec34abe56778
-
Filesize
114KB
MD5461ade40b800ae80a40985594e1ac236
SHA1b3892eef846c044a2b0785d54a432b3e93a968c8
SHA256798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4
SHA512421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26