Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-04-2024 16:03
Static task
static1
Behavioral task
behavioral1
Sample
edcfec04d359001fe05e4c926eef84d8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
edcfec04d359001fe05e4c926eef84d8_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
edcfec04d359001fe05e4c926eef84d8_JaffaCakes118.exe
-
Size
442KB
-
MD5
edcfec04d359001fe05e4c926eef84d8
-
SHA1
10aff36567d25df6924adb595006a164b88d780b
-
SHA256
36a1bea948304d1993d6eae96a1e22bc6f6964d13083f74c2c5ddde67cc68875
-
SHA512
eeb9a84358e90b0bf9e81e2e2f60cb9dd77ed86b5bf5ce85604d400b40b6eef7be3330f30128dbd1cf920694f83eff8225166b2276c9611352b1fcf7deb1d31a
-
SSDEEP
6144:7Y4iqEUI07K8x6ZgdkZ3GVtG8gtUZl21R:0qEUZe8x5dhetUZg
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
Processes:
resource yara_rule behavioral1/memory/2308-2-0x0000000000580000-0x00000000006DE000-memory.dmp BazaLoader -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2308-2-0x0000000000580000-0x00000000006DE000-memory.dmp warzonerat -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2196 2308 WerFault.exe edcfec04d359001fe05e4c926eef84d8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
edcfec04d359001fe05e4c926eef84d8_JaffaCakes118.exedescription pid process target process PID 2308 wrote to memory of 2196 2308 edcfec04d359001fe05e4c926eef84d8_JaffaCakes118.exe WerFault.exe PID 2308 wrote to memory of 2196 2308 edcfec04d359001fe05e4c926eef84d8_JaffaCakes118.exe WerFault.exe PID 2308 wrote to memory of 2196 2308 edcfec04d359001fe05e4c926eef84d8_JaffaCakes118.exe WerFault.exe PID 2308 wrote to memory of 2196 2308 edcfec04d359001fe05e4c926eef84d8_JaffaCakes118.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\edcfec04d359001fe05e4c926eef84d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edcfec04d359001fe05e4c926eef84d8_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 5642⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2308-0-0x0000000000C10000-0x0000000000C84000-memory.dmpFilesize
464KB
-
memory/2308-1-0x00000000745B0000-0x0000000074C9E000-memory.dmpFilesize
6.9MB
-
memory/2308-2-0x0000000000580000-0x00000000006DE000-memory.dmpFilesize
1.4MB
-
memory/2308-3-0x00000000745B0000-0x0000000074C9E000-memory.dmpFilesize
6.9MB