Analysis
-
max time kernel
109s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 08:16
Behavioral task
behavioral1
Sample
1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe
Resource
win10v2004-20241007-en
General
-
Target
1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe
-
Size
152KB
-
MD5
5aae8462f845854f8e15f1c17abb73a0
-
SHA1
13d05504fc37678ad1e7c37444c6aabdae5453a0
-
SHA256
1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a
-
SHA512
974deb28f5f5f75d67a7e8ddcf5ac96ac9945006ee5fffcb153c81f495c18badffa58d824a9a9d8b0141c1537c57a2c7a7bcc59ef93e9e762568bbf3e1526814
-
SSDEEP
3072:4NLOpnhTdOw9YAJOzIY9gVl01T2ENipdDg0z5f:4NLYdT97JSIFl0QENqFf
Malware Config
Extracted
warzonerat
daddy.linkpc.net:1145
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023b91-2.dat warzonerat -
Executes dropped EXE 1 IoCs
pid Process 2804 images.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language images.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3276 wrote to memory of 2804 3276 1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe 83 PID 3276 wrote to memory of 2804 3276 1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe 83 PID 3276 wrote to memory of 2804 3276 1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe 83 PID 2804 wrote to memory of 4572 2804 images.exe 85 PID 2804 wrote to memory of 4572 2804 images.exe 85 PID 2804 wrote to memory of 4572 2804 images.exe 85 PID 2804 wrote to memory of 4572 2804 images.exe 85 PID 2804 wrote to memory of 4572 2804 images.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe"C:\Users\Admin\AppData\Local\Temp\1b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD55aae8462f845854f8e15f1c17abb73a0
SHA113d05504fc37678ad1e7c37444c6aabdae5453a0
SHA2561b4d6e3ca2e51ca857bd4cc84c8b02c07f40bc55a67cc9a52be46afecf4d199a
SHA512974deb28f5f5f75d67a7e8ddcf5ac96ac9945006ee5fffcb153c81f495c18badffa58d824a9a9d8b0141c1537c57a2c7a7bcc59ef93e9e762568bbf3e1526814