Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2025, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
9938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b.exe
Resource
win10v2004-20250314-en
General
-
Target
9938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b.exe
-
Size
1.3MB
-
MD5
b22d066dc7407e782268c2b465401d29
-
SHA1
3f9acf93951ac8c569dc6125031af1e353771b3c
-
SHA256
9938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b
-
SHA512
5832d068b1f503c1091af1b283c97fa101c4fa546c38416c9a191da684815824c03325371ef0d89666eac3e3310efe448ed7ac2810ba402e7a7bb6d533bffbe5
-
SSDEEP
24576:du6J33O0c+JY5UZ+XC0kGso6FaR0iNiQWBTL+WY:vu0c++OCvkGs9FaRDNibVY
Malware Config
Extracted
warzonerat
198.46.177.153:4532
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral2/memory/5960-20-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat behavioral2/memory/5960-22-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat behavioral2/memory/5960-23-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat behavioral2/memory/5960-24-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rhombical.vbs rhombical.exe -
Executes dropped EXE 1 IoCs
pid Process 2424 rhombical.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1964-6-0x0000000001680000-0x0000000001A80000-memory.dmp autoit_exe behavioral2/files/0x00080000000242ca-9.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2424 set thread context of 5960 2424 rhombical.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhombical.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2424 rhombical.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1964 9938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b.exe 1964 9938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b.exe 2424 rhombical.exe 2424 rhombical.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1964 9938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b.exe 1964 9938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b.exe 2424 rhombical.exe 2424 rhombical.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2424 1964 9938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b.exe 83 PID 1964 wrote to memory of 2424 1964 9938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b.exe 83 PID 1964 wrote to memory of 2424 1964 9938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b.exe 83 PID 2424 wrote to memory of 5960 2424 rhombical.exe 84 PID 2424 wrote to memory of 5960 2424 rhombical.exe 84 PID 2424 wrote to memory of 5960 2424 rhombical.exe 84 PID 2424 wrote to memory of 5960 2424 rhombical.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b.exe"C:\Users\Admin\AppData\Local\Temp\9938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\stickers\rhombical.exe"C:\Users\Admin\AppData\Local\Temp\9938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\9938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5960
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5b22d066dc7407e782268c2b465401d29
SHA13f9acf93951ac8c569dc6125031af1e353771b3c
SHA2569938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b
SHA5125832d068b1f503c1091af1b283c97fa101c4fa546c38416c9a191da684815824c03325371ef0d89666eac3e3310efe448ed7ac2810ba402e7a7bb6d533bffbe5