Analysis
-
max time kernel
95s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2025 06:58
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION#00547-ÇEVRE TEKNO PROJECT.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
QUOTATION#00547-ÇEVRE TEKNO PROJECT.exe
Resource
win10v2004-20250217-en
General
-
Target
QUOTATION#00547-ÇEVRE TEKNO PROJECT.exe
-
Size
1.8MB
-
MD5
e32c4f7540fd5ab3ff716c2d236b0647
-
SHA1
f94e8f2dcdc5e005a814fbbf6ec232d2d1fca434
-
SHA256
518d9aeaf075a297467fbd6962f4a04f7f256680f9b506b4e4b51b67c185b365
-
SHA512
f243f941e1da01090e9b672f04c624ab43e3544f49a7d8a2ae99a66a0fe119b2601b2025da9e528aafa628864b6fa939acc9b9c0882d9006161d70eff912e685
-
SSDEEP
24576:Njc1TK7Gs05bZbtYXekG4+BiKr8Zk/oq5Yy9FXfqa0rYkorF:NlLOkG8aPYyrXuqF
Malware Config
Extracted
warzonerat
198.46.177.153:4532
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/3288-2-0x00000000029B0000-0x00000000039B0000-memory.dmp modiloader_stage2 -
Warzone RAT payload 2 IoCs
resource yara_rule behavioral2/memory/3700-8-0x000000002F730000-0x000000002F88E000-memory.dmp warzonerat behavioral2/memory/3700-10-0x000000002F730000-0x000000002F88E000-memory.dmp warzonerat -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QUOTATION#00547-ÇEVRE TEKNO PROJECT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SndVol.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3288 QUOTATION#00547-ÇEVRE TEKNO PROJECT.exe 3288 QUOTATION#00547-ÇEVRE TEKNO PROJECT.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3700 SndVol.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3700 SndVol.exe 3700 SndVol.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3288 wrote to memory of 3700 3288 QUOTATION#00547-ÇEVRE TEKNO PROJECT.exe 89 PID 3288 wrote to memory of 3700 3288 QUOTATION#00547-ÇEVRE TEKNO PROJECT.exe 89 PID 3288 wrote to memory of 3700 3288 QUOTATION#00547-ÇEVRE TEKNO PROJECT.exe 89 PID 3288 wrote to memory of 3700 3288 QUOTATION#00547-ÇEVRE TEKNO PROJECT.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION#00547-ÇEVRE TEKNO PROJECT.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION#00547-ÇEVRE TEKNO PROJECT.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\SndVol.exeC:\Windows\System32\SndVol.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3700
-