Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
72s -
max time network
74s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
22/01/2025, 13:57
Static task
static1
Behavioral task
behavioral1
Sample
WarzoneRAT.exe
Resource
win10ltsc2021-20250113-en
General
-
Target
WarzoneRAT.exe
-
Size
321KB
-
MD5
600e0dbaefc03f7bf50abb0def3fb465
-
SHA1
1b5f0ac48e06edc4ed8243be61d71077f770f2b4
-
SHA256
61e6a93f43049712b5f2d949fd233fa8015fe4bef01b9e1285d3d87b12f894f2
-
SHA512
151eebac8f8f6e72d130114f030f048dff5bce0f99ff8d3a22e8fed7616155b3e87d29acf79f488d6b53ed2c5c9b05b57f76f1f91a568c21fe9bca228efb23d9
-
SSDEEP
6144:62GhN2db088fTdUuNU0we+HPps1zcJLVPzGKfwQ7PHC3NJTyhtPB1m:62iNG088fTWsU0wJBsGJPf4Q7PHC3NJ8
Malware Config
Extracted
warzonerat
168.61.222.215:5400
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
resource yara_rule behavioral1/memory/2348-7-0x0000000006720000-0x0000000006748000-memory.dmp rezer0 -
Warzone RAT payload 4 IoCs
resource yara_rule behavioral1/memory/4668-10-0x0000000000400000-0x0000000000553000-memory.dmp warzonerat behavioral1/memory/4668-13-0x0000000000400000-0x0000000000553000-memory.dmp warzonerat behavioral1/memory/4668-14-0x0000000000400000-0x0000000000553000-memory.dmp warzonerat behavioral1/memory/4668-16-0x0000000000400000-0x0000000000553000-memory.dmp warzonerat -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2449540194-3226363261-2578591490-1000\Control Panel\International\Geo\Nation WarzoneRAT.exe Key value queried \REGISTRY\USER\S-1-5-21-2449540194-3226363261-2578591490-1000\Control Panel\International\Geo\Nation WarzoneRAT.exe Key value queried \REGISTRY\USER\S-1-5-21-2449540194-3226363261-2578591490-1000\Control Panel\International\Geo\Nation WarzoneRAT.exe Key value queried \REGISTRY\USER\S-1-5-21-2449540194-3226363261-2578591490-1000\Control Panel\International\Geo\Nation WarzoneRAT.exe Key value queried \REGISTRY\USER\S-1-5-21-2449540194-3226363261-2578591490-1000\Control Panel\International\Geo\Nation WarzoneRAT.exe Key value queried \REGISTRY\USER\S-1-5-21-2449540194-3226363261-2578591490-1000\Control Panel\International\Geo\Nation WarzoneRAT.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2348 set thread context of 4668 2348 WarzoneRAT.exe 86 PID 3968 set thread context of 4528 3968 WarzoneRAT.exe 111 PID 460 set thread context of 4352 460 WarzoneRAT.exe 117 PID 5032 set thread context of 4024 5032 WarzoneRAT.exe 121 PID 3308 set thread context of 4952 3308 WarzoneRAT.exe 125 PID 2392 set thread context of 3172 2392 WarzoneRAT.exe 129 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 35 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WarzoneRAT.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 27 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4484 schtasks.exe 3584 schtasks.exe 5852 schtasks.exe 6488 schtasks.exe 5656 schtasks.exe 6068 schtasks.exe 3232 schtasks.exe 1068 schtasks.exe 5440 schtasks.exe 5496 schtasks.exe 5240 schtasks.exe 5376 schtasks.exe 5824 schtasks.exe 6060 schtasks.exe 32 schtasks.exe 4956 schtasks.exe 5888 schtasks.exe 1904 schtasks.exe 2256 schtasks.exe 4448 schtasks.exe 5288 schtasks.exe 5664 schtasks.exe 1716 schtasks.exe 5328 schtasks.exe 5844 schtasks.exe 5356 schtasks.exe 5200 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2348 WarzoneRAT.exe 2348 WarzoneRAT.exe 2348 WarzoneRAT.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 3968 WarzoneRAT.exe 3968 WarzoneRAT.exe 3968 WarzoneRAT.exe 3968 WarzoneRAT.exe 3968 WarzoneRAT.exe 3968 WarzoneRAT.exe 460 WarzoneRAT.exe 460 WarzoneRAT.exe 460 WarzoneRAT.exe 460 WarzoneRAT.exe 460 WarzoneRAT.exe 460 WarzoneRAT.exe 460 WarzoneRAT.exe 460 WarzoneRAT.exe 5032 WarzoneRAT.exe 5032 WarzoneRAT.exe 5032 WarzoneRAT.exe 5032 WarzoneRAT.exe 3308 WarzoneRAT.exe 3308 WarzoneRAT.exe 3308 WarzoneRAT.exe 3308 WarzoneRAT.exe 2392 WarzoneRAT.exe 2392 WarzoneRAT.exe 2392 WarzoneRAT.exe 2392 WarzoneRAT.exe 3432 WarzoneRAT.exe 3432 WarzoneRAT.exe 3432 WarzoneRAT.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2348 WarzoneRAT.exe Token: SeDebugPrivilege 2916 taskmgr.exe Token: SeSystemProfilePrivilege 2916 taskmgr.exe Token: SeCreateGlobalPrivilege 2916 taskmgr.exe Token: 33 2916 taskmgr.exe Token: SeIncBasePriorityPrivilege 2916 taskmgr.exe Token: SeDebugPrivilege 3968 WarzoneRAT.exe Token: SeDebugPrivilege 460 WarzoneRAT.exe Token: SeDebugPrivilege 5032 WarzoneRAT.exe Token: SeDebugPrivilege 3308 WarzoneRAT.exe Token: SeDebugPrivilege 2392 WarzoneRAT.exe Token: SeDebugPrivilege 3432 WarzoneRAT.exe Token: SeDebugPrivilege 2664 WarzoneRAT.exe Token: SeDebugPrivilege 1356 WarzoneRAT.exe Token: SeDebugPrivilege 4724 WarzoneRAT.exe Token: SeDebugPrivilege 3800 WarzoneRAT.exe Token: SeDebugPrivilege 4932 WarzoneRAT.exe Token: SeDebugPrivilege 3168 WarzoneRAT.exe Token: SeDebugPrivilege 3428 WarzoneRAT.exe Token: SeDebugPrivilege 4692 WarzoneRAT.exe Token: SeDebugPrivilege 2200 WarzoneRAT.exe Token: SeDebugPrivilege 384 WarzoneRAT.exe Token: SeDebugPrivilege 1592 WarzoneRAT.exe Token: SeDebugPrivilege 5032 WarzoneRAT.exe -
Suspicious use of FindShellTrayWindow 48 IoCs
pid Process 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2348 wrote to memory of 32 2348 WarzoneRAT.exe 84 PID 2348 wrote to memory of 32 2348 WarzoneRAT.exe 84 PID 2348 wrote to memory of 32 2348 WarzoneRAT.exe 84 PID 2348 wrote to memory of 4668 2348 WarzoneRAT.exe 86 PID 2348 wrote to memory of 4668 2348 WarzoneRAT.exe 86 PID 2348 wrote to memory of 4668 2348 WarzoneRAT.exe 86 PID 2348 wrote to memory of 4668 2348 WarzoneRAT.exe 86 PID 2348 wrote to memory of 4668 2348 WarzoneRAT.exe 86 PID 2348 wrote to memory of 4668 2348 WarzoneRAT.exe 86 PID 2348 wrote to memory of 4668 2348 WarzoneRAT.exe 86 PID 2348 wrote to memory of 4668 2348 WarzoneRAT.exe 86 PID 2348 wrote to memory of 4668 2348 WarzoneRAT.exe 86 PID 2348 wrote to memory of 4668 2348 WarzoneRAT.exe 86 PID 2348 wrote to memory of 4668 2348 WarzoneRAT.exe 86 PID 3968 wrote to memory of 4484 3968 WarzoneRAT.exe 108 PID 3968 wrote to memory of 4484 3968 WarzoneRAT.exe 108 PID 3968 wrote to memory of 4484 3968 WarzoneRAT.exe 108 PID 3968 wrote to memory of 4232 3968 WarzoneRAT.exe 110 PID 3968 wrote to memory of 4232 3968 WarzoneRAT.exe 110 PID 3968 wrote to memory of 4232 3968 WarzoneRAT.exe 110 PID 3968 wrote to memory of 4528 3968 WarzoneRAT.exe 111 PID 3968 wrote to memory of 4528 3968 WarzoneRAT.exe 111 PID 3968 wrote to memory of 4528 3968 WarzoneRAT.exe 111 PID 3968 wrote to memory of 4528 3968 WarzoneRAT.exe 111 PID 3968 wrote to memory of 4528 3968 WarzoneRAT.exe 111 PID 3968 wrote to memory of 4528 3968 WarzoneRAT.exe 111 PID 3968 wrote to memory of 4528 3968 WarzoneRAT.exe 111 PID 3968 wrote to memory of 4528 3968 WarzoneRAT.exe 111 PID 3968 wrote to memory of 4528 3968 WarzoneRAT.exe 111 PID 3968 wrote to memory of 4528 3968 WarzoneRAT.exe 111 PID 3968 wrote to memory of 4528 3968 WarzoneRAT.exe 111 PID 460 wrote to memory of 1716 460 WarzoneRAT.exe 113 PID 460 wrote to memory of 1716 460 WarzoneRAT.exe 113 PID 460 wrote to memory of 1716 460 WarzoneRAT.exe 113 PID 460 wrote to memory of 3608 460 WarzoneRAT.exe 115 PID 460 wrote to memory of 3608 460 WarzoneRAT.exe 115 PID 460 wrote to memory of 3608 460 WarzoneRAT.exe 115 PID 460 wrote to memory of 4648 460 WarzoneRAT.exe 116 PID 460 wrote to memory of 4648 460 WarzoneRAT.exe 116 PID 460 wrote to memory of 4648 460 WarzoneRAT.exe 116 PID 460 wrote to memory of 4352 460 WarzoneRAT.exe 117 PID 460 wrote to memory of 4352 460 WarzoneRAT.exe 117 PID 460 wrote to memory of 4352 460 WarzoneRAT.exe 117 PID 460 wrote to memory of 4352 460 WarzoneRAT.exe 117 PID 460 wrote to memory of 4352 460 WarzoneRAT.exe 117 PID 460 wrote to memory of 4352 460 WarzoneRAT.exe 117 PID 460 wrote to memory of 4352 460 WarzoneRAT.exe 117 PID 460 wrote to memory of 4352 460 WarzoneRAT.exe 117 PID 460 wrote to memory of 4352 460 WarzoneRAT.exe 117 PID 460 wrote to memory of 4352 460 WarzoneRAT.exe 117 PID 460 wrote to memory of 4352 460 WarzoneRAT.exe 117 PID 5032 wrote to memory of 1068 5032 WarzoneRAT.exe 119 PID 5032 wrote to memory of 1068 5032 WarzoneRAT.exe 119 PID 5032 wrote to memory of 1068 5032 WarzoneRAT.exe 119 PID 5032 wrote to memory of 4024 5032 WarzoneRAT.exe 121 PID 5032 wrote to memory of 4024 5032 WarzoneRAT.exe 121 PID 5032 wrote to memory of 4024 5032 WarzoneRAT.exe 121 PID 5032 wrote to memory of 4024 5032 WarzoneRAT.exe 121 PID 5032 wrote to memory of 4024 5032 WarzoneRAT.exe 121 PID 5032 wrote to memory of 4024 5032 WarzoneRAT.exe 121 PID 5032 wrote to memory of 4024 5032 WarzoneRAT.exe 121 PID 5032 wrote to memory of 4024 5032 WarzoneRAT.exe 121 PID 5032 wrote to memory of 4024 5032 WarzoneRAT.exe 121 PID 5032 wrote to memory of 4024 5032 WarzoneRAT.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7705.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:32
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4668
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2916
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6915.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4484
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:4232
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6F20.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1716
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:3608
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:4648
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4352
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp74AE.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4024
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3308 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7C01.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4448
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4952
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2392 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp83A2.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4956
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3172
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3432 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8A88.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5656
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6772
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4724 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8920.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5328
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6252
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1356 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp896F.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5200
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6340
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6360
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6380
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2664 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8A59.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5376
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6280
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6316
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3800 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8A2A.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5440
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6388
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6412
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4932 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp88D2.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5240
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6172
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6204
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6224
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3428 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8A5A.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5496
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6476
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6520
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6548
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3168 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp898E.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5288
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6424
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4692 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8AD6.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5664
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6788
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2200 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8BB1.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5844
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:7012
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:7048
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:7076
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:7120
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:7144
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1592 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8C2E.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5888
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:7020
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:7056
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:384 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8C8B.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5824
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6684
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6708
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- System Location Discovery: System Language Discovery
PID:5008 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8DA5.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:6060
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6716
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6752
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6820
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- System Location Discovery: System Language Discovery
PID:864 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8E12.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1904
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6764
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1308 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8E70.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:6068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:7036
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:7064
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5032 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8C4D.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5852
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6744
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6800
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵
- System Location Discovery: System Language Discovery
PID:5028 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8E60.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:3584
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6944
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6960
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵PID:1120
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8FD7.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2256
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6952
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵PID:5164
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9025.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5356
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:6780
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵PID:5172
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8FE7.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:3232
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:7152
-
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT.exe"1⤵PID:5980
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp92A6.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:6488
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:5604
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:5352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
507B
MD599bc7c92ff1f6642977ff3c7465fab28
SHA11eff41803e0e41dc0875a487c0518b1b57d06361
SHA256786039babd4fa235b09901db1874338548d823ddd8fb4e801f84b880eb2bb49a
SHA5128edb36c9a1045f34a72b4b376b63324d3df7d61008a63bd84b8e764bedff9b460fb0b260ca9ffbe5a79a3a8468e52f419adef3ea197fa89f8268d0d93457dda4
-
Filesize
1KB
MD5664589af886b2a4a0633a9cf96d7cd2b
SHA1992b8f456a07a15b03cbe3bd20a5371aa3053892
SHA2568ad5cbea85b1c004d2040a67e9372eb195c7adc078b8e774b60df4cb3e923c8b
SHA512d3a03639273068d1548ef463777fbf9ed5fa647dd20bfc92fe8adf97ef317fc8015290f8c8ea734c9d48c7bb91b2d914a3fa8fa9980e9c5281b3a021e3db5245