Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2024 08:04

General

  • Target

    1ff9b1f3cce75540c7a5f664822a7fa5_JaffaCakes118.exe

  • Size

    284KB

  • MD5

    1ff9b1f3cce75540c7a5f664822a7fa5

  • SHA1

    17e3060ca811708a53ba2bcb1e64b1c1ad1b9377

  • SHA256

    79cb1ad7f322fcbe1d6d40a6e6604e9546d12a342824edb5290ef83d043d1065

  • SHA512

    4175bca8d1d79c54bfd1df38b3a16d8d2cf39a3ef2434871600e0bd122206f1cb5d941f353accea7ac67b9172a9d721db149e0e3289925c39d721e92a750ff43

  • SSDEEP

    6144:3lAcPLOpOym0A6RzqMmpAmYD0pJH4eC3ALv1Dc+:V5PCsLAzqimY4pJYe2A5Q+

Malware Config

Extracted

Family

warzonerat

C2

phllka.com:5400

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ff9b1f3cce75540c7a5f664822a7fa5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1ff9b1f3cce75540c7a5f664822a7fa5_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4904
    • C:\ProgramData\clock.exe
      "C:\ProgramData\clock.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\clock.exe

    Filesize

    284KB

    MD5

    1ff9b1f3cce75540c7a5f664822a7fa5

    SHA1

    17e3060ca811708a53ba2bcb1e64b1c1ad1b9377

    SHA256

    79cb1ad7f322fcbe1d6d40a6e6604e9546d12a342824edb5290ef83d043d1065

    SHA512

    4175bca8d1d79c54bfd1df38b3a16d8d2cf39a3ef2434871600e0bd122206f1cb5d941f353accea7ac67b9172a9d721db149e0e3289925c39d721e92a750ff43

  • memory/4244-17-0x00000000046A0000-0x00000000046B0000-memory.dmp

    Filesize

    64KB

  • memory/4244-14-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4244-15-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4244-16-0x00000000046A0000-0x00000000046B0000-memory.dmp

    Filesize

    64KB

  • memory/4244-18-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4244-20-0x00000000046A0000-0x00000000046B0000-memory.dmp

    Filesize

    64KB

  • memory/4244-21-0x00000000046A0000-0x00000000046B0000-memory.dmp

    Filesize

    64KB

  • memory/4904-4-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/4904-2-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4904-9-0x0000000077121000-0x0000000077241000-memory.dmp

    Filesize

    1.1MB

  • memory/4904-10-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4904-3-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/4904-5-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB