Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 12:49
Behavioral task
behavioral1
Sample
ezzzzzzzzzzzz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ezzzzzzzzzzzz.exe
Resource
win10v2004-20250217-en
General
-
Target
ezzzzzzzzzzzz.exe
-
Size
132KB
-
MD5
416f744073072d41c1cc491f86a139e6
-
SHA1
b08163f44ede1b36c41d2e661793ac092ab6c199
-
SHA256
b9b1fc57b2ff8a6410c214b7959020f5d9b75aec91f323346695b589c32fe186
-
SHA512
5f1edeccc94584fb08bb746f8a3236a30274d721e2b964e9ad6ffe1f49e12cfba41ad4213a45ec6714ab720f46299e17dd887149b3c58647c8a0fade41ef9060
-
SSDEEP
3072:K7W9jps0Tx4azG6GweOTir5axbjNCz45LT7a:KwpsERzGKurEXCzeLT7a
Malware Config
Extracted
warzonerat
0.tcp.ngrok.io:18696
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016f9c-11.dat warzonerat -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1840 powershell.exe 3048 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat ezzzzzzzzzzzz.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat:start ezzzzzzzzzzzz.exe -
Executes dropped EXE 1 IoCs
pid Process 2716 images.exe -
Loads dropped DLL 2 IoCs
pid Process 1632 ezzzzzzzzzzzz.exe 1632 ezzzzzzzzzzzz.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\Users\\Admin\\Documents\\images.exe" ezzzzzzzzzzzz.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 2 0.tcp.ngrok.io 5 0.tcp.ngrok.io 18 0.tcp.ngrok.io -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language images.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ezzzzzzzzzzzz.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Documents\Documents:ApplicationData ezzzzzzzzzzzz.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1840 powershell.exe 3048 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1840 powershell.exe Token: SeDebugPrivilege 3048 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1840 1632 ezzzzzzzzzzzz.exe 30 PID 1632 wrote to memory of 1840 1632 ezzzzzzzzzzzz.exe 30 PID 1632 wrote to memory of 1840 1632 ezzzzzzzzzzzz.exe 30 PID 1632 wrote to memory of 1840 1632 ezzzzzzzzzzzz.exe 30 PID 1632 wrote to memory of 2716 1632 ezzzzzzzzzzzz.exe 33 PID 1632 wrote to memory of 2716 1632 ezzzzzzzzzzzz.exe 33 PID 1632 wrote to memory of 2716 1632 ezzzzzzzzzzzz.exe 33 PID 1632 wrote to memory of 2716 1632 ezzzzzzzzzzzz.exe 33 PID 2716 wrote to memory of 3048 2716 images.exe 34 PID 2716 wrote to memory of 3048 2716 images.exe 34 PID 2716 wrote to memory of 3048 2716 images.exe 34 PID 2716 wrote to memory of 3048 2716 images.exe 34 PID 2716 wrote to memory of 2644 2716 images.exe 36 PID 2716 wrote to memory of 2644 2716 images.exe 36 PID 2716 wrote to memory of 2644 2716 images.exe 36 PID 2716 wrote to memory of 2644 2716 images.exe 36 PID 2716 wrote to memory of 2644 2716 images.exe 36 PID 2716 wrote to memory of 2644 2716 images.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\ezzzzzzzzzzzz.exe"C:\Users\Admin\AppData\Local\Temp\ezzzzzzzzzzzz.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Users\Admin\Documents\images.exe"C:\Users\Admin\Documents\images.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5b8450ccede5fdf2b6fbcf7d360621f7d
SHA11a0e8ce660dee1b2796ed2f56322f89903c5db08
SHA25653b5e363d7e158c1c3af3aa7825d6d3136690d433118e9ddeec1d0668ee316a7
SHA51250fc9b8437c464dce829d35d9f8a272f76c574a9fdba25e0c2a151542ba95d01c516e0851353c3fd8f486e09b1deb95da2ff66543ba9c3a1ab14ab129192d4a1
-
Filesize
132KB
MD5416f744073072d41c1cc491f86a139e6
SHA1b08163f44ede1b36c41d2e661793ac092ab6c199
SHA256b9b1fc57b2ff8a6410c214b7959020f5d9b75aec91f323346695b589c32fe186
SHA5125f1edeccc94584fb08bb746f8a3236a30274d721e2b964e9ad6ffe1f49e12cfba41ad4213a45ec6714ab720f46299e17dd887149b3c58647c8a0fade41ef9060