Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 08:34
Behavioral task
behavioral1
Sample
16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe
-
Size
127KB
-
MD5
16d7cfecc0d1f44bcf020b5d2c900a64
-
SHA1
8170d4759a48ae196102b921dc7b89b3bda27886
-
SHA256
d9577922518c5fd98ec3518daa760289edf5e1151a7aea86e528606dde7563fb
-
SHA512
a8d69562b780389afe4fa02b16f12577c4654657863fabbdddec721d48194690270f1ea74fe1fa1981577cfa84c77585d765213c3318ecab40018ca7d62fa281
-
SSDEEP
3072:SCbz/KdJp8JZHIpKx+KDMbrfpaIeiX4d2Vzv9z/ri:SC+fFpWMXUCRVD9/
Malware Config
Extracted
warzonerat
asdfwrkhl.warzonedns.com:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2216-8-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral1/memory/2216-6-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral1/memory/2216-14-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat -
Drops startup file 1 IoCs
Processes:
16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\saohydukhksicao.eu.url 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral1/memory/2812-1-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2812-0-0x0000000000400000-0x0000000000435000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exedescription pid process target process PID 2812 set thread context of 2216 2812 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exepid process 2812 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe 2812 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe 2812 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe 2812 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe 2812 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe 2812 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe 2812 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exepid process 2812 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exedescription pid process target process PID 2812 wrote to memory of 2216 2812 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe PID 2812 wrote to memory of 2216 2812 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe PID 2812 wrote to memory of 2216 2812 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe PID 2812 wrote to memory of 2216 2812 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe PID 2812 wrote to memory of 2216 2812 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe PID 2216 wrote to memory of 1392 2216 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe cmd.exe PID 2216 wrote to memory of 1392 2216 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe cmd.exe PID 2216 wrote to memory of 1392 2216 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe cmd.exe PID 2216 wrote to memory of 1392 2216 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe cmd.exe PID 2216 wrote to memory of 1392 2216 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe cmd.exe PID 2216 wrote to memory of 1392 2216 16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:1392