Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/03/2025, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION022450.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
QUOTATION022450.exe
Resource
win10v2004-20250313-en
General
-
Target
QUOTATION022450.exe
-
Size
1.3MB
-
MD5
b22d066dc7407e782268c2b465401d29
-
SHA1
3f9acf93951ac8c569dc6125031af1e353771b3c
-
SHA256
9938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b
-
SHA512
5832d068b1f503c1091af1b283c97fa101c4fa546c38416c9a191da684815824c03325371ef0d89666eac3e3310efe448ed7ac2810ba402e7a7bb6d533bffbe5
-
SSDEEP
24576:du6J33O0c+JY5UZ+XC0kGso6FaR0iNiQWBTL+WY:vu0c++OCvkGs9FaRDNibVY
Malware Config
Extracted
warzonerat
198.46.177.153:4532
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2780-23-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rhombical.vbs rhombical.exe -
Executes dropped EXE 1 IoCs
pid Process 2808 rhombical.exe -
Loads dropped DLL 1 IoCs
pid Process 2420 QUOTATION022450.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000800000001748f-11.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2808 set thread context of 2780 2808 rhombical.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QUOTATION022450.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhombical.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2808 rhombical.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2420 QUOTATION022450.exe 2420 QUOTATION022450.exe 2808 rhombical.exe 2808 rhombical.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2420 QUOTATION022450.exe 2420 QUOTATION022450.exe 2808 rhombical.exe 2808 rhombical.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2808 2420 QUOTATION022450.exe 30 PID 2420 wrote to memory of 2808 2420 QUOTATION022450.exe 30 PID 2420 wrote to memory of 2808 2420 QUOTATION022450.exe 30 PID 2420 wrote to memory of 2808 2420 QUOTATION022450.exe 30 PID 2808 wrote to memory of 2780 2808 rhombical.exe 31 PID 2808 wrote to memory of 2780 2808 rhombical.exe 31 PID 2808 wrote to memory of 2780 2808 rhombical.exe 31 PID 2808 wrote to memory of 2780 2808 rhombical.exe 31 PID 2808 wrote to memory of 2780 2808 rhombical.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION022450.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION022450.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\stickers\rhombical.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION022450.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION022450.exe"3⤵PID:2780
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5b22d066dc7407e782268c2b465401d29
SHA13f9acf93951ac8c569dc6125031af1e353771b3c
SHA2569938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b
SHA5125832d068b1f503c1091af1b283c97fa101c4fa546c38416c9a191da684815824c03325371ef0d89666eac3e3310efe448ed7ac2810ba402e7a7bb6d533bffbe5