Analysis
-
max time kernel
38s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/03/2025, 03:08 UTC
Static task
static1
Behavioral task
behavioral1
Sample
4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe
Resource
win10v2004-20250217-en
General
-
Target
4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe
-
Size
703KB
-
MD5
5d5439b5ce694c7329f002033dc479b5
-
SHA1
fa00d36077c1a8442c5f44cbdf7545a041e85ed3
-
SHA256
4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277
-
SHA512
f66685591e4504f802f4895bbfbeee8a524a78a09d7813e4e9d5e34cddaa2ea49635db1c09f658f5279e7999fe7a59db4514187e2f33f4f3d5c02f9cf6b8fb0e
-
SSDEEP
12288:4Io7W7X/WI7oDLmMjWQumYISeIQAAApLlX2/MT77oyhDdsCGW:foSbWqqmFQumNLInpSAhDd
Malware Config
Extracted
warzonerat
193.23.160.31:6008
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 6 IoCs
resource yara_rule behavioral1/memory/2872-27-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/2872-35-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/2872-34-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/2872-31-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/2872-29-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/2872-25-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1824 powershell.exe 1976 powershell.exe 1256 powershell.exe 1748 powershell.exe 2444 powershell.exe -
Executes dropped EXE 6 IoCs
pid Process 2892 PO 2452 PO 2216 PO 2636 PO 2012 PO 2632 PO -
Loads dropped DLL 1 IoCs
pid Process 2872 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\Users\\Admin\\Documents\\PO" 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2336 set thread context of 2872 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2688 schtasks.exe 3068 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 1824 powershell.exe 1976 powershell.exe 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 1256 powershell.exe 2892 PO 2892 PO 2892 PO 2892 PO 2892 PO 2892 PO 2892 PO 2892 PO 2892 PO 2892 PO 2892 PO 2892 PO 2892 PO 2444 powershell.exe 1748 powershell.exe 2892 PO 2892 PO 2892 PO 2892 PO 2892 PO 2892 PO 2892 PO 2892 PO 2892 PO 2892 PO -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe Token: SeDebugPrivilege 1824 powershell.exe Token: SeDebugPrivilege 1976 powershell.exe Token: SeDebugPrivilege 1256 powershell.exe Token: SeDebugPrivilege 2892 PO Token: SeDebugPrivilege 2444 powershell.exe Token: SeDebugPrivilege 1748 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1824 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 31 PID 2336 wrote to memory of 1824 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 31 PID 2336 wrote to memory of 1824 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 31 PID 2336 wrote to memory of 1824 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 31 PID 2336 wrote to memory of 1976 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 33 PID 2336 wrote to memory of 1976 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 33 PID 2336 wrote to memory of 1976 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 33 PID 2336 wrote to memory of 1976 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 33 PID 2336 wrote to memory of 2688 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 35 PID 2336 wrote to memory of 2688 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 35 PID 2336 wrote to memory of 2688 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 35 PID 2336 wrote to memory of 2688 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 35 PID 2336 wrote to memory of 2872 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 37 PID 2336 wrote to memory of 2872 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 37 PID 2336 wrote to memory of 2872 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 37 PID 2336 wrote to memory of 2872 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 37 PID 2336 wrote to memory of 2872 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 37 PID 2336 wrote to memory of 2872 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 37 PID 2336 wrote to memory of 2872 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 37 PID 2336 wrote to memory of 2872 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 37 PID 2336 wrote to memory of 2872 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 37 PID 2336 wrote to memory of 2872 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 37 PID 2336 wrote to memory of 2872 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 37 PID 2336 wrote to memory of 2872 2336 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 37 PID 2872 wrote to memory of 1256 2872 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 38 PID 2872 wrote to memory of 1256 2872 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 38 PID 2872 wrote to memory of 1256 2872 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 38 PID 2872 wrote to memory of 1256 2872 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 38 PID 2872 wrote to memory of 2892 2872 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 40 PID 2872 wrote to memory of 2892 2872 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 40 PID 2872 wrote to memory of 2892 2872 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 40 PID 2872 wrote to memory of 2892 2872 4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe 40 PID 2892 wrote to memory of 1748 2892 PO 42 PID 2892 wrote to memory of 1748 2892 PO 42 PID 2892 wrote to memory of 1748 2892 PO 42 PID 2892 wrote to memory of 1748 2892 PO 42 PID 2892 wrote to memory of 2444 2892 PO 44 PID 2892 wrote to memory of 2444 2892 PO 44 PID 2892 wrote to memory of 2444 2892 PO 44 PID 2892 wrote to memory of 2444 2892 PO 44 PID 2892 wrote to memory of 3068 2892 PO 46 PID 2892 wrote to memory of 3068 2892 PO 46 PID 2892 wrote to memory of 3068 2892 PO 46 PID 2892 wrote to memory of 3068 2892 PO 46 PID 2892 wrote to memory of 2452 2892 PO 48 PID 2892 wrote to memory of 2452 2892 PO 48 PID 2892 wrote to memory of 2452 2892 PO 48 PID 2892 wrote to memory of 2452 2892 PO 48 PID 2892 wrote to memory of 2216 2892 PO 49 PID 2892 wrote to memory of 2216 2892 PO 49 PID 2892 wrote to memory of 2216 2892 PO 49 PID 2892 wrote to memory of 2216 2892 PO 49 PID 2892 wrote to memory of 2012 2892 PO 50 PID 2892 wrote to memory of 2012 2892 PO 50 PID 2892 wrote to memory of 2012 2892 PO 50 PID 2892 wrote to memory of 2012 2892 PO 50 PID 2892 wrote to memory of 2636 2892 PO 51 PID 2892 wrote to memory of 2636 2892 PO 51 PID 2892 wrote to memory of 2636 2892 PO 51 PID 2892 wrote to memory of 2636 2892 PO 51 PID 2892 wrote to memory of 2632 2892 PO 52 PID 2892 wrote to memory of 2632 2892 PO 52 PID 2892 wrote to memory of 2632 2892 PO 52 PID 2892 wrote to memory of 2632 2892 PO 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe"C:\Users\Admin\AppData\Local\Temp\4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\XBPKxvbN.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XBPKxvbN" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4624.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe"C:\Users\Admin\AppData\Local\Temp\4f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
C:\Users\Admin\Documents\PO"C:\Users\Admin\Documents\PO"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Documents\PO"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\XBPKxvbN.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XBPKxvbN" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9914.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3068
-
-
C:\Users\Admin\Documents\PO"C:\Users\Admin\Documents\PO"4⤵
- Executes dropped EXE
PID:2452
-
-
C:\Users\Admin\Documents\PO"C:\Users\Admin\Documents\PO"4⤵
- Executes dropped EXE
PID:2216
-
-
C:\Users\Admin\Documents\PO"C:\Users\Admin\Documents\PO"4⤵
- Executes dropped EXE
PID:2012
-
-
C:\Users\Admin\Documents\PO"C:\Users\Admin\Documents\PO"4⤵
- Executes dropped EXE
PID:2636
-
-
C:\Users\Admin\Documents\PO"C:\Users\Admin\Documents\PO"4⤵
- Executes dropped EXE
PID:2632
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2768
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2376
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD552cba81c17985a0208148f80579f2ab8
SHA10efd45ec943bd88f198e89a12095a81e31db08f9
SHA256f27a21407f9443ae6713df5dfc5f2b18579b07eb8ddfdd59774a0192e2518b66
SHA5126ec1567b9a30b47ed0ac8585bb6a2a3747cd11ae24c293f9ca12e374b257cf152702f6121330f7e7b07f06194f74944afe170027a1567e9cbda5092b94b80c40
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD573279327c45bf0242b5880099375f6f8
SHA1959f20f88de45ba5addcade6dd4d43941e3e3961
SHA256b6a60fcd9d443c6f8e8d8d41479fea9a84e66879409be36d9534aa8b446c31bd
SHA512e2f13ba504350231ca1f244d50088ce51c0de196ea9833a31cbe1837d6882dde0de21308df11aee0e7995f4905e9b4a6190064a511349321fa10789377a4fecc
-
Filesize
703KB
MD55d5439b5ce694c7329f002033dc479b5
SHA1fa00d36077c1a8442c5f44cbdf7545a041e85ed3
SHA2564f52022aa6286c18573e79cb079d5c9a01382bf1b4685a5a0dcc72cd6307b277
SHA512f66685591e4504f802f4895bbfbeee8a524a78a09d7813e4e9d5e34cddaa2ea49635db1c09f658f5279e7999fe7a59db4514187e2f33f4f3d5c02f9cf6b8fb0e