Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 04:57
Static task
static1
Behavioral task
behavioral1
Sample
dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe
-
Size
940KB
-
MD5
dbcfc21ffafc545f171df65dd419682a
-
SHA1
7801722cb68ba9b3d5af59f9faa70277b530a9c0
-
SHA256
7d3323da32cb30fed5acbc1b1e0f053ee43d111a5c354c3bae95d580e54a7e79
-
SHA512
61a3da4da4217936965077772274ad1b1fd6db0005525704ced2b36d6f2543810dd2b69c727606b1ecc9e98be07d1524613f1737a773c005d377cb30663221bf
-
SSDEEP
12288:HCyhPc4hbmOwD71tJha6QSGYlrVs8tBnqRrfgwNaSctMXe:HCak8bmOKhtPUY8bxsMO
Malware Config
Extracted
warzonerat
pastorcc.duckdns.org:2223
Signatures
-
Detects BazaLoader malware 4 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral2/memory/1336-30-0x0000000000400000-0x000000000055E000-memory.dmp BazaLoader behavioral2/memory/1336-33-0x0000000000400000-0x000000000055E000-memory.dmp BazaLoader behavioral2/memory/1336-34-0x0000000000400000-0x000000000055E000-memory.dmp BazaLoader behavioral2/memory/1336-82-0x0000000000400000-0x000000000055E000-memory.dmp BazaLoader -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral2/memory/1336-30-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat behavioral2/memory/1336-33-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat behavioral2/memory/1336-34-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat behavioral2/memory/1336-82-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 232 ADSFEDGRFHGJH.exe 1336 AddInProcess32.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/1152-5-0x0000000006650000-0x0000000006678000-memory.dmp agile_net -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ADSFDGFHGJHKJJH = "C:\\Users\\Admin\\AppData\\Roaming\\ADSFEDGRFHGJH.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 232 set thread context of 1336 232 ADSFEDGRFHGJH.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 232 ADSFEDGRFHGJH.exe 232 ADSFEDGRFHGJH.exe 3200 powershell.exe 3200 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe Token: SeDebugPrivilege 232 ADSFEDGRFHGJH.exe Token: SeDebugPrivilege 3200 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2004 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 88 PID 1152 wrote to memory of 2004 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 88 PID 1152 wrote to memory of 2004 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 88 PID 2004 wrote to memory of 872 2004 cmd.exe 90 PID 2004 wrote to memory of 872 2004 cmd.exe 90 PID 2004 wrote to memory of 872 2004 cmd.exe 90 PID 1152 wrote to memory of 232 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 99 PID 1152 wrote to memory of 232 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 99 PID 1152 wrote to memory of 232 1152 dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe 99 PID 232 wrote to memory of 1336 232 ADSFEDGRFHGJH.exe 101 PID 232 wrote to memory of 1336 232 ADSFEDGRFHGJH.exe 101 PID 232 wrote to memory of 1336 232 ADSFEDGRFHGJH.exe 101 PID 232 wrote to memory of 1336 232 ADSFEDGRFHGJH.exe 101 PID 232 wrote to memory of 1336 232 ADSFEDGRFHGJH.exe 101 PID 232 wrote to memory of 1336 232 ADSFEDGRFHGJH.exe 101 PID 232 wrote to memory of 1336 232 ADSFEDGRFHGJH.exe 101 PID 232 wrote to memory of 1336 232 ADSFEDGRFHGJH.exe 101 PID 232 wrote to memory of 1336 232 ADSFEDGRFHGJH.exe 101 PID 232 wrote to memory of 1336 232 ADSFEDGRFHGJH.exe 101 PID 1336 wrote to memory of 3200 1336 AddInProcess32.exe 102 PID 1336 wrote to memory of 3200 1336 AddInProcess32.exe 102 PID 1336 wrote to memory of 3200 1336 AddInProcess32.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "ADSFDGFHGJHKJJH" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\ADSFEDGRFHGJH.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "ADSFDGFHGJHKJJH" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\ADSFEDGRFHGJH.exe"3⤵
- Adds Run key to start application
PID:872
-
-
-
C:\Users\Admin\AppData\Roaming\ADSFEDGRFHGJH.exe"C:\Users\Admin\AppData\Roaming\ADSFEDGRFHGJH.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD59827ff3cdf4b83f9c86354606736ca9c
SHA1e73d73f42bb2a310f03eb1bcbb22be2b8eb7c723
SHA256c1cf3dc8fa1c7fc00f88e07ad539979b3706ca8d69223cffd1d58bc8f521f63a
SHA5128261828d55f3b5134c0aeb98311c04e20c5395d4347251746f3be0fb854f36cc7e118713cd00c9867537e6e47d5e71f2b2384fc00c67f0ae1b285b8310321579
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
940KB
MD5dbcfc21ffafc545f171df65dd419682a
SHA17801722cb68ba9b3d5af59f9faa70277b530a9c0
SHA2567d3323da32cb30fed5acbc1b1e0f053ee43d111a5c354c3bae95d580e54a7e79
SHA51261a3da4da4217936965077772274ad1b1fd6db0005525704ced2b36d6f2543810dd2b69c727606b1ecc9e98be07d1524613f1737a773c005d377cb30663221bf