Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 08:16
Behavioral task
behavioral1
Sample
1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe
Resource
win10v2004-20241007-en
General
-
Target
1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe
-
Size
152KB
-
MD5
5aae8462f845854f8e15f1c17abb73a0
-
SHA1
13d05504fc37678ad1e7c37444c6aabdae5453a0
-
SHA256
1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a
-
SHA512
974deb28f5f5f75d67a7e8ddcf5ac96ac9945006ee5fffcb153c81f495c18badffa58d824a9a9d8b0141c1537c57a2c7a7bcc59ef93e9e762568bbf3e1526814
-
SSDEEP
3072:4NLOpnhTdOw9YAJOzIY9gVl01T2ENipdDg0z5f:4NLYdT97JSIFl0QENqFf
Malware Config
Extracted
warzonerat
daddy.linkpc.net:1145
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x00080000000160ae-1.dat warzonerat -
Executes dropped EXE 1 IoCs
pid Process 2028 images.exe -
Loads dropped DLL 2 IoCs
pid Process 2108 1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe 2108 1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language images.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2028 2108 1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe 30 PID 2108 wrote to memory of 2028 2108 1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe 30 PID 2108 wrote to memory of 2028 2108 1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe 30 PID 2108 wrote to memory of 2028 2108 1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe"C:\Users\Admin\AppData\Local\Temp\1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD55aae8462f845854f8e15f1c17abb73a0
SHA113d05504fc37678ad1e7c37444c6aabdae5453a0
SHA2561b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a
SHA512974deb28f5f5f75d67a7e8ddcf5ac96ac9945006ee5fffcb153c81f495c18badffa58d824a9a9d8b0141c1537c57a2c7a7bcc59ef93e9e762568bbf3e1526814