Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2025 10:39
Static task
static1
Behavioral task
behavioral1
Sample
libde265.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
libde265.dll
Resource
win10v2004-20250217-en
General
-
Target
libde265.dll
-
Size
5.1MB
-
MD5
333662bb359f77dc06edec4d23b6451c
-
SHA1
47f662bf56879afe6d03977f2de44b8f08ccd248
-
SHA256
3386f42cc721bd4da6af93cdde0824ba355f05bc6901bf99c90f2f254fff7e98
-
SHA512
54f71ac3f61ba2553f293e4a52d319071aa47820e3e1bbebb43f1811326d036f5244aefd3853cc97e8eb5e9ecc1cd813cb938ea9de16a1692bfb5073bdc4d6b0
-
SSDEEP
49152:HbGsqmReRRKtdF06Brmci4F+Jyzunn9cAJ/g+fmkVB/CuofcFEVLiTmO3gVTpvLD:uEdpky8Cyg+fmCB6ueO3YfQL
Malware Config
Extracted
warzonerat
198.46.177.153:4532
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral2/memory/3328-0-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat behavioral2/memory/3328-2-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat behavioral2/memory/3328-3-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat behavioral2/memory/3328-4-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2148 set thread context of 3328 2148 rundll32.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_wp.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2148 wrote to memory of 3328 2148 rundll32.exe 87 PID 2148 wrote to memory of 3328 2148 rundll32.exe 87 PID 2148 wrote to memory of 3328 2148 rundll32.exe 87 PID 2148 wrote to memory of 3328 2148 rundll32.exe 87 PID 2148 wrote to memory of 3328 2148 rundll32.exe 87 PID 2148 wrote to memory of 3328 2148 rundll32.exe 87 PID 2148 wrote to memory of 3328 2148 rundll32.exe 87 PID 2148 wrote to memory of 3328 2148 rundll32.exe 87 PID 2148 wrote to memory of 3328 2148 rundll32.exe 87 PID 2148 wrote to memory of 3328 2148 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\libde265.dll,#11⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3328
-