Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 08:27
Static task
static1
Behavioral task
behavioral1
Sample
1d567410aef049362058e077fed717b0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1d567410aef049362058e077fed717b0_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
1d567410aef049362058e077fed717b0_JaffaCakes118.exe
-
Size
656KB
-
MD5
1d567410aef049362058e077fed717b0
-
SHA1
fefd561a5a19ac75e0f2a2c7b1fa4517ad6e16f8
-
SHA256
33568c503537a0e4e8735690c59bd4636453227e27eae6cfbc08dc2f6b9df921
-
SHA512
c033d3cf3ebde4a7b84943153e06101faa1db8e5e4d8d601397f6fe2be05c9467960075cdede2a4f610251eb0367c3c949f9cd2cc9c14cbf522a41dbeb32059e
-
SSDEEP
12288:ZFX3TJwh9BfrYDgtIKZ/ZhVNFXOGLhFb/yM0WeXyBxkjAt:7TeLkoZnNF
Malware Config
Extracted
warzonerat
176.126.86.243:2021
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 7 IoCs
resource yara_rule behavioral2/memory/4488-5-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/4488-8-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/4488-10-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/4488-15-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/3628-26-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/3628-28-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/3628-31-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Executes dropped EXE 2 IoCs
pid Process 4616 microsoftupdate.exe 3628 microsoftupdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\windowsdefender = "C:\\ProgramData\\microsoftupdate.exe" 1d567410aef049362058e077fed717b0_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3972 set thread context of 4488 3972 1d567410aef049362058e077fed717b0_JaffaCakes118.exe 96 PID 4616 set thread context of 3628 4616 microsoftupdate.exe 98 -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3972 wrote to memory of 4488 3972 1d567410aef049362058e077fed717b0_JaffaCakes118.exe 96 PID 3972 wrote to memory of 4488 3972 1d567410aef049362058e077fed717b0_JaffaCakes118.exe 96 PID 3972 wrote to memory of 4488 3972 1d567410aef049362058e077fed717b0_JaffaCakes118.exe 96 PID 3972 wrote to memory of 4488 3972 1d567410aef049362058e077fed717b0_JaffaCakes118.exe 96 PID 3972 wrote to memory of 4488 3972 1d567410aef049362058e077fed717b0_JaffaCakes118.exe 96 PID 3972 wrote to memory of 4488 3972 1d567410aef049362058e077fed717b0_JaffaCakes118.exe 96 PID 3972 wrote to memory of 4488 3972 1d567410aef049362058e077fed717b0_JaffaCakes118.exe 96 PID 3972 wrote to memory of 4488 3972 1d567410aef049362058e077fed717b0_JaffaCakes118.exe 96 PID 3972 wrote to memory of 4488 3972 1d567410aef049362058e077fed717b0_JaffaCakes118.exe 96 PID 3972 wrote to memory of 4488 3972 1d567410aef049362058e077fed717b0_JaffaCakes118.exe 96 PID 3972 wrote to memory of 4488 3972 1d567410aef049362058e077fed717b0_JaffaCakes118.exe 96 PID 4488 wrote to memory of 4616 4488 1d567410aef049362058e077fed717b0_JaffaCakes118.exe 97 PID 4488 wrote to memory of 4616 4488 1d567410aef049362058e077fed717b0_JaffaCakes118.exe 97 PID 4488 wrote to memory of 4616 4488 1d567410aef049362058e077fed717b0_JaffaCakes118.exe 97 PID 4616 wrote to memory of 3628 4616 microsoftupdate.exe 98 PID 4616 wrote to memory of 3628 4616 microsoftupdate.exe 98 PID 4616 wrote to memory of 3628 4616 microsoftupdate.exe 98 PID 4616 wrote to memory of 3628 4616 microsoftupdate.exe 98 PID 4616 wrote to memory of 3628 4616 microsoftupdate.exe 98 PID 4616 wrote to memory of 3628 4616 microsoftupdate.exe 98 PID 4616 wrote to memory of 3628 4616 microsoftupdate.exe 98 PID 4616 wrote to memory of 3628 4616 microsoftupdate.exe 98 PID 4616 wrote to memory of 3628 4616 microsoftupdate.exe 98 PID 4616 wrote to memory of 3628 4616 microsoftupdate.exe 98 PID 4616 wrote to memory of 3628 4616 microsoftupdate.exe 98 PID 3628 wrote to memory of 4844 3628 microsoftupdate.exe 99 PID 3628 wrote to memory of 4844 3628 microsoftupdate.exe 99 PID 3628 wrote to memory of 4844 3628 microsoftupdate.exe 99 PID 3628 wrote to memory of 4844 3628 microsoftupdate.exe 99 PID 3628 wrote to memory of 4844 3628 microsoftupdate.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d567410aef049362058e077fed717b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1d567410aef049362058e077fed717b0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\1d567410aef049362058e077fed717b0_JaffaCakes118.exe"{path}"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\ProgramData\microsoftupdate.exe"C:\ProgramData\microsoftupdate.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\ProgramData\microsoftupdate.exe"{path}"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵PID:4844
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
656KB
MD51d567410aef049362058e077fed717b0
SHA1fefd561a5a19ac75e0f2a2c7b1fa4517ad6e16f8
SHA25633568c503537a0e4e8735690c59bd4636453227e27eae6cfbc08dc2f6b9df921
SHA512c033d3cf3ebde4a7b84943153e06101faa1db8e5e4d8d601397f6fe2be05c9467960075cdede2a4f610251eb0367c3c949f9cd2cc9c14cbf522a41dbeb32059e