Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/04/2024, 23:19

General

  • Target

    e8aaade776c2a9e279825189b23f6eed_JaffaCakes118.exe

  • Size

    8.2MB

  • MD5

    e8aaade776c2a9e279825189b23f6eed

  • SHA1

    b42a39d4c5888efb186480430544060f758fb8dc

  • SHA256

    78473f3a3e461bc15c18f82ae52ad130b0f0dff4109e21b2e47f2dde90acbf46

  • SHA512

    367e58fe5d78e84c6d33f027aaeb05fa527d70a50d2e67ff300b948363cc558317d6b715fe5cae37caf19ffc5aa587c81f2b327daf61bf295bc9a4bc841be12a

  • SSDEEP

    49152:7C0bNechC0bNechC0bNeccC0bNechC0bNechC0bNecO:V8e8e878e8e89

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 5 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 52 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8aaade776c2a9e279825189b23f6eed_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e8aaade776c2a9e279825189b23f6eed_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Users\Admin\AppData\Local\Temp\e8aaade776c2a9e279825189b23f6eed_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\e8aaade776c2a9e279825189b23f6eed_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2572
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1456
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1804
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            PID:2440
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Windows directory
              • Suspicious use of SetWindowsHookEx
              PID:2196
              • \??\c:\windows\system\svchost.exe
                c:\windows\system\svchost.exe
                7⤵
                • Executes dropped EXE
                PID:2644
            • C:\Windows\SysWOW64\diskperf.exe
              "C:\Windows\SysWOW64\diskperf.exe"
              6⤵
                PID:2588
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2096
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2864
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2916
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:396
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1188
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1188 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1200
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              PID:3004
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2376
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              PID:2216
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2088
          • C:\Windows\SysWOW64\diskperf.exe
            "C:\Windows\SysWOW64\diskperf.exe"
            4⤵
              PID:1400
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          2⤵
            PID:2476

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

                Filesize

                8.2MB

                MD5

                e8aaade776c2a9e279825189b23f6eed

                SHA1

                b42a39d4c5888efb186480430544060f758fb8dc

                SHA256

                78473f3a3e461bc15c18f82ae52ad130b0f0dff4109e21b2e47f2dde90acbf46

                SHA512

                367e58fe5d78e84c6d33f027aaeb05fa527d70a50d2e67ff300b948363cc558317d6b715fe5cae37caf19ffc5aa587c81f2b327daf61bf295bc9a4bc841be12a

              • C:\Windows\system\explorer.exe

                Filesize

                8.2MB

                MD5

                de621bd3a2ead9fc140519c8cfab2681

                SHA1

                ad66f57cf27d79a6904e176203acbb6456aaf085

                SHA256

                03c5cb18820dadce1ec08b59270c530f0fd53bd082f3edc442ac545bad55ce61

                SHA512

                7fdf70f8d6e26d77cc45d720c01734c0a9135af72f3aff0c0306c3734a4cfb8e05e98b5e16c9a3025c4ca4b05372de04b4c0c1e1af5dad5c1e677245f69279b5

              • \Windows\system\spoolsv.exe

                Filesize

                8.2MB

                MD5

                2159a0a12fa39960745b74e08c104973

                SHA1

                c6f34181817cf738c04b989dac86e862c8d3e7f4

                SHA256

                26a91bd38bf96251f1a1380cde30b6d15ec698d579cda371c8370870f2dd3eaa

                SHA512

                f2ad41f8b3ce3007cbdab5933dc303b21e728ada80b3fc2a042ae1e4d7fc1a411bd230ac3981009942023507feadfb727a1597eb31ecb2fad7b4c18ca33a3f8e

              • \Windows\system\svchost.exe

                Filesize

                8.2MB

                MD5

                75baaf02c37b384a9d330c0c3624a7c1

                SHA1

                7fb7c066a62bf2d96d5151735bafb41e81c98581

                SHA256

                1a93323b50d7a21b0de7c0dbd43efd9d9e1109969807af18bb79eaf7f650261c

                SHA512

                60049a3517483a4169dab671907ac614cae62bc491f43de6dbc42cb7a53d5e2178500f10a5ed7c2590223a37e20520193d748df3363bdd8ac3536d5cf21e725a

              • memory/1400-87-0x0000000000400000-0x0000000000412000-memory.dmp

                Filesize

                72KB

              • memory/1456-54-0x0000000000400000-0x0000000000514000-memory.dmp

                Filesize

                1.1MB

              • memory/1456-82-0x0000000000400000-0x0000000000514000-memory.dmp

                Filesize

                1.1MB

              • memory/1456-52-0x00000000001B0000-0x00000000001B1000-memory.dmp

                Filesize

                4KB

              • memory/1456-51-0x0000000000400000-0x0000000000514000-memory.dmp

                Filesize

                1.1MB

              • memory/1456-50-0x0000000000400000-0x0000000000514000-memory.dmp

                Filesize

                1.1MB

              • memory/1456-48-0x0000000000400000-0x0000000000514000-memory.dmp

                Filesize

                1.1MB

              • memory/1772-6-0x0000000000220000-0x0000000000221000-memory.dmp

                Filesize

                4KB

              • memory/1772-0-0x0000000000400000-0x0000000000514000-memory.dmp

                Filesize

                1.1MB

              • memory/1772-4-0x0000000000400000-0x0000000000514000-memory.dmp

                Filesize

                1.1MB

              • memory/1772-3-0x0000000000220000-0x0000000000221000-memory.dmp

                Filesize

                4KB

              • memory/1772-2-0x0000000000400000-0x0000000000514000-memory.dmp

                Filesize

                1.1MB

              • memory/1772-1-0x0000000000400000-0x0000000000514000-memory.dmp

                Filesize

                1.1MB

              • memory/1772-35-0x0000000000400000-0x0000000000514000-memory.dmp

                Filesize

                1.1MB

              • memory/1804-132-0x0000000002F40000-0x0000000003054000-memory.dmp

                Filesize

                1.1MB

              • memory/1804-93-0x0000000002F40000-0x0000000003054000-memory.dmp

                Filesize

                1.1MB

              • memory/1804-183-0x0000000002F40000-0x0000000003054000-memory.dmp

                Filesize

                1.1MB

              • memory/1804-152-0x0000000002F40000-0x0000000003054000-memory.dmp

                Filesize

                1.1MB

              • memory/1804-143-0x0000000000400000-0x000000000043E000-memory.dmp

                Filesize

                248KB

              • memory/1804-123-0x0000000000400000-0x000000000043E000-memory.dmp

                Filesize

                248KB

              • memory/1804-113-0x0000000002F40000-0x0000000003054000-memory.dmp

                Filesize

                1.1MB

              • memory/1804-98-0x0000000002F40000-0x0000000003054000-memory.dmp

                Filesize

                1.1MB

              • memory/2096-115-0x0000000000400000-0x0000000000514000-memory.dmp

                Filesize

                1.1MB

              • memory/2196-238-0x0000000000400000-0x000000000043E000-memory.dmp

                Filesize

                248KB

              • memory/2196-234-0x0000000002CB0000-0x0000000002DC4000-memory.dmp

                Filesize

                1.1MB

              • memory/2196-230-0x0000000002CB0000-0x0000000002DC4000-memory.dmp

                Filesize

                1.1MB

              • memory/2440-103-0x0000000000220000-0x0000000000221000-memory.dmp

                Filesize

                4KB

              • memory/2440-101-0x0000000000400000-0x0000000000514000-memory.dmp

                Filesize

                1.1MB

              • memory/2440-102-0x0000000000400000-0x0000000000514000-memory.dmp

                Filesize

                1.1MB

              • memory/2440-224-0x0000000000400000-0x0000000000514000-memory.dmp

                Filesize

                1.1MB

              • memory/2440-124-0x0000000000400000-0x0000000000514000-memory.dmp

                Filesize

                1.1MB

              • memory/2440-139-0x0000000000220000-0x0000000000221000-memory.dmp

                Filesize

                4KB

              • memory/2476-37-0x0000000000400000-0x0000000000412000-memory.dmp

                Filesize

                72KB

              • memory/2476-36-0x0000000000400000-0x0000000000412000-memory.dmp

                Filesize

                72KB

              • memory/2476-31-0x0000000000400000-0x0000000000412000-memory.dmp

                Filesize

                72KB

              • memory/2476-27-0x0000000000400000-0x0000000000412000-memory.dmp

                Filesize

                72KB

              • memory/2476-29-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                Filesize

                4KB

              • memory/2572-46-0x0000000003010000-0x0000000003124000-memory.dmp

                Filesize

                1.1MB

              • memory/2572-11-0x0000000000400000-0x000000000043E000-memory.dmp

                Filesize

                248KB

              • memory/2572-53-0x0000000000400000-0x000000000043E000-memory.dmp

                Filesize

                248KB

              • memory/2572-26-0x0000000000400000-0x000000000043E000-memory.dmp

                Filesize

                248KB

              • memory/2572-23-0x0000000000400000-0x000000000043E000-memory.dmp

                Filesize

                248KB

              • memory/2572-13-0x0000000000400000-0x000000000043E000-memory.dmp

                Filesize

                248KB

              • memory/2572-49-0x0000000003010000-0x0000000003124000-memory.dmp

                Filesize

                1.1MB

              • memory/2572-9-0x0000000000400000-0x000000000043E000-memory.dmp

                Filesize

                248KB

              • memory/2572-17-0x0000000000400000-0x000000000043E000-memory.dmp

                Filesize

                248KB

              • memory/2588-220-0x0000000000400000-0x0000000000412000-memory.dmp

                Filesize

                72KB

              • memory/2644-232-0x0000000000400000-0x0000000000514000-memory.dmp

                Filesize

                1.1MB

              • memory/2644-235-0x0000000000230000-0x0000000000231000-memory.dmp

                Filesize

                4KB

              • memory/2916-134-0x0000000000400000-0x0000000000514000-memory.dmp

                Filesize

                1.1MB