Analysis
-
max time kernel
170s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
faacf63588108ec1b037a0acd824f360_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
faacf63588108ec1b037a0acd824f360_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
faacf63588108ec1b037a0acd824f360_JaffaCakes118.exe
-
Size
759KB
-
MD5
faacf63588108ec1b037a0acd824f360
-
SHA1
c6079548d11c29a7b56fe62af28649377c408310
-
SHA256
b8b2955c31b2b95a494925426d2f80ab24de3d6b464046c03efd16cb4ee052bc
-
SHA512
87f1891923d116b8c5e74d7cc179ff08ed77c6ff2c8679c473d18efeb68d9e775fa50279c2811aa53fedf754a24b22f0a45f90c4476227f7372f366e0c55b6f1
-
SSDEEP
12288:11Wl8T5+M63xjmetfT/wX5jEA/C8vS+hymyMj1k3WJhC:1A24dxl/wJEAvqgyWhkAhC
Malware Config
Extracted
warzonerat
renajazi.linkpc.net:9494
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/636-2-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/636-4-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/636-6-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/636-7-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
faacf63588108ec1b037a0acd824f360_JaffaCakes118.exedescription pid process target process PID 3104 set thread context of 636 3104 faacf63588108ec1b037a0acd824f360_JaffaCakes118.exe faacf63588108ec1b037a0acd824f360_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
faacf63588108ec1b037a0acd824f360_JaffaCakes118.exepid process 3104 faacf63588108ec1b037a0acd824f360_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
faacf63588108ec1b037a0acd824f360_JaffaCakes118.exedescription pid process target process PID 3104 wrote to memory of 636 3104 faacf63588108ec1b037a0acd824f360_JaffaCakes118.exe faacf63588108ec1b037a0acd824f360_JaffaCakes118.exe PID 3104 wrote to memory of 636 3104 faacf63588108ec1b037a0acd824f360_JaffaCakes118.exe faacf63588108ec1b037a0acd824f360_JaffaCakes118.exe PID 3104 wrote to memory of 636 3104 faacf63588108ec1b037a0acd824f360_JaffaCakes118.exe faacf63588108ec1b037a0acd824f360_JaffaCakes118.exe PID 3104 wrote to memory of 636 3104 faacf63588108ec1b037a0acd824f360_JaffaCakes118.exe faacf63588108ec1b037a0acd824f360_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\faacf63588108ec1b037a0acd824f360_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\faacf63588108ec1b037a0acd824f360_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\faacf63588108ec1b037a0acd824f360_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\faacf63588108ec1b037a0acd824f360_JaffaCakes118.exe"2⤵PID:636
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4036 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:81⤵PID:1220