Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 21:21
Static task
static1
Behavioral task
behavioral1
Sample
2bc2e9be1b54bd6742b8e9e3d9968f2b_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2bc2e9be1b54bd6742b8e9e3d9968f2b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2bc2e9be1b54bd6742b8e9e3d9968f2b_JaffaCakes118.exe
-
Size
833KB
-
MD5
2bc2e9be1b54bd6742b8e9e3d9968f2b
-
SHA1
da25c96686ce15f7e19a251f48260f4683df15e5
-
SHA256
71435231f2c9636b8286fbc31f59a95fc8a2f9a598525f4c9c65c7b1f6c3c634
-
SHA512
1c014b69662c30dc2537932d5a28531772083360b0e183a054f4e45fdfb04011b433150365ad05bfd0fd17a560cb50bc9f915d0b9d07d293e035689591cfc9df
-
SSDEEP
12288:Lb6mCM9sXHh9BoRPqsxOVKuS5r70xwgeqh043L97/hO4pbYnx:6eSHhYRRxOVGcxJBdb1xix
Malware Config
Extracted
warzonerat
bestsuccess.ddns.net:2442
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 7 IoCs
resource yara_rule behavioral2/memory/3180-4-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/3180-8-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/3180-6-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/3180-12-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/2360-22-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/2360-24-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/2360-27-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Executes dropped EXE 2 IoCs
pid Process 3540 notepad.exe 2360 notepad.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Explorer = "C:\\ProgramData\\notepad.exe" 2bc2e9be1b54bd6742b8e9e3d9968f2b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1740 set thread context of 3180 1740 2bc2e9be1b54bd6742b8e9e3d9968f2b_JaffaCakes118.exe 82 PID 3540 set thread context of 2360 3540 notepad.exe 86 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1740 2bc2e9be1b54bd6742b8e9e3d9968f2b_JaffaCakes118.exe 1740 2bc2e9be1b54bd6742b8e9e3d9968f2b_JaffaCakes118.exe 3540 notepad.exe 3540 notepad.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1740 2bc2e9be1b54bd6742b8e9e3d9968f2b_JaffaCakes118.exe 3540 notepad.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1740 wrote to memory of 3180 1740 2bc2e9be1b54bd6742b8e9e3d9968f2b_JaffaCakes118.exe 82 PID 1740 wrote to memory of 3180 1740 2bc2e9be1b54bd6742b8e9e3d9968f2b_JaffaCakes118.exe 82 PID 1740 wrote to memory of 3180 1740 2bc2e9be1b54bd6742b8e9e3d9968f2b_JaffaCakes118.exe 82 PID 3180 wrote to memory of 3540 3180 2bc2e9be1b54bd6742b8e9e3d9968f2b_JaffaCakes118.exe 85 PID 3180 wrote to memory of 3540 3180 2bc2e9be1b54bd6742b8e9e3d9968f2b_JaffaCakes118.exe 85 PID 3180 wrote to memory of 3540 3180 2bc2e9be1b54bd6742b8e9e3d9968f2b_JaffaCakes118.exe 85 PID 3540 wrote to memory of 2360 3540 notepad.exe 86 PID 3540 wrote to memory of 2360 3540 notepad.exe 86 PID 3540 wrote to memory of 2360 3540 notepad.exe 86 PID 2360 wrote to memory of 2532 2360 notepad.exe 87 PID 2360 wrote to memory of 2532 2360 notepad.exe 87 PID 2360 wrote to memory of 2532 2360 notepad.exe 87 PID 2360 wrote to memory of 2532 2360 notepad.exe 87 PID 2360 wrote to memory of 2532 2360 notepad.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bc2e9be1b54bd6742b8e9e3d9968f2b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2bc2e9be1b54bd6742b8e9e3d9968f2b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\2bc2e9be1b54bd6742b8e9e3d9968f2b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2bc2e9be1b54bd6742b8e9e3d9968f2b_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\ProgramData\notepad.exe"C:\ProgramData\notepad.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\ProgramData\notepad.exe"C:\ProgramData\notepad.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵PID:2532
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
833KB
MD52bc2e9be1b54bd6742b8e9e3d9968f2b
SHA1da25c96686ce15f7e19a251f48260f4683df15e5
SHA25671435231f2c9636b8286fbc31f59a95fc8a2f9a598525f4c9c65c7b1f6c3c634
SHA5121c014b69662c30dc2537932d5a28531772083360b0e183a054f4e45fdfb04011b433150365ad05bfd0fd17a560cb50bc9f915d0b9d07d293e035689591cfc9df