Analysis
-
max time kernel
93s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
21-02-2025 02:27
Static task
static1
Behavioral task
behavioral1
Sample
3386f42cc721bd4da6af93cdde0824ba355f05bc6901bf99c90f2f254fff7e98.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3386f42cc721bd4da6af93cdde0824ba355f05bc6901bf99c90f2f254fff7e98.dll
Resource
win10v2004-20250217-en
General
-
Target
3386f42cc721bd4da6af93cdde0824ba355f05bc6901bf99c90f2f254fff7e98.dll
-
Size
5.1MB
-
MD5
333662bb359f77dc06edec4d23b6451c
-
SHA1
47f662bf56879afe6d03977f2de44b8f08ccd248
-
SHA256
3386f42cc721bd4da6af93cdde0824ba355f05bc6901bf99c90f2f254fff7e98
-
SHA512
54f71ac3f61ba2553f293e4a52d319071aa47820e3e1bbebb43f1811326d036f5244aefd3853cc97e8eb5e9ecc1cd813cb938ea9de16a1692bfb5073bdc4d6b0
-
SSDEEP
49152:HbGsqmReRRKtdF06Brmci4F+Jyzunn9cAJ/g+fmkVB/CuofcFEVLiTmO3gVTpvLD:uEdpky8Cyg+fmCB6ueO3YfQL
Malware Config
Extracted
warzonerat
198.46.177.153:4532
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral2/memory/4716-0-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat behavioral2/memory/4716-2-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat behavioral2/memory/4716-3-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat behavioral2/memory/4716-4-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3692 set thread context of 4716 3692 rundll32.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3692 wrote to memory of 3572 3692 rundll32.exe 83 PID 3692 wrote to memory of 3572 3692 rundll32.exe 83 PID 3692 wrote to memory of 3572 3692 rundll32.exe 83 PID 3692 wrote to memory of 4716 3692 rundll32.exe 84 PID 3692 wrote to memory of 4716 3692 rundll32.exe 84 PID 3692 wrote to memory of 4716 3692 rundll32.exe 84 PID 3692 wrote to memory of 4716 3692 rundll32.exe 84 PID 3692 wrote to memory of 4716 3692 rundll32.exe 84 PID 3692 wrote to memory of 4716 3692 rundll32.exe 84 PID 3692 wrote to memory of 4716 3692 rundll32.exe 84 PID 3692 wrote to memory of 4716 3692 rundll32.exe 84 PID 3692 wrote to memory of 4716 3692 rundll32.exe 84 PID 3692 wrote to memory of 4716 3692 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3386f42cc721bd4da6af93cdde0824ba355f05bc6901bf99c90f2f254fff7e98.dll,#11⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"2⤵PID:3572
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4716
-