Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 05:59
Static task
static1
Behavioral task
behavioral1
Sample
8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe
-
Size
336KB
-
MD5
8d1a4a0e2b3826798a728707527baeba
-
SHA1
2409203f258633d47325042cc2aae439725d4d62
-
SHA256
b77860073b44ee02d8f4fffd3883683bb5e336e35fa0226531735e5de82e68e2
-
SHA512
416d5e41824df31f862013d5a99dcaeba773b37e6571fcb484c48e0f1756f17966ce51382e5f10dd453e1e46c8b8a806a78c84855237aa2a06a4f7e88128ad50
-
SSDEEP
6144:E+Ju2JS+1+EYJEMs2ujJtfTGGgToub7iRr//RuHuG/:E+JDJS+E9JEMs5J9T7g0uXihXtG/
Malware Config
Extracted
warzonerat
185.29.9.58:1023
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3008-9-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral1/memory/2388-20-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat -
Executes dropped EXE 1 IoCs
Processes:
images.exepid process 2652 images.exe -
Loads dropped DLL 4 IoCs
Processes:
8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exeimages.exeimages.exepid process 3008 8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe 3008 8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe 2652 images.exe 2388 images.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" 8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exeimages.exedescription pid process target process PID 1808 set thread context of 3008 1808 8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe 8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe PID 2652 set thread context of 2388 2652 images.exe images.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exeimages.exepid process 1808 8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe 2652 images.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exeimages.exeimages.exedescription pid process target process PID 1808 wrote to memory of 3008 1808 8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe 8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe PID 1808 wrote to memory of 3008 1808 8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe 8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe PID 1808 wrote to memory of 3008 1808 8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe 8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe PID 1808 wrote to memory of 3008 1808 8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe 8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe PID 1808 wrote to memory of 3008 1808 8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe 8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe PID 3008 wrote to memory of 2652 3008 8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe images.exe PID 3008 wrote to memory of 2652 3008 8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe images.exe PID 3008 wrote to memory of 2652 3008 8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe images.exe PID 3008 wrote to memory of 2652 3008 8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe images.exe PID 2652 wrote to memory of 2388 2652 images.exe images.exe PID 2652 wrote to memory of 2388 2652 images.exe images.exe PID 2652 wrote to memory of 2388 2652 images.exe images.exe PID 2652 wrote to memory of 2388 2652 images.exe images.exe PID 2652 wrote to memory of 2388 2652 images.exe images.exe PID 2388 wrote to memory of 2976 2388 images.exe cmd.exe PID 2388 wrote to memory of 2976 2388 images.exe cmd.exe PID 2388 wrote to memory of 2976 2388 images.exe cmd.exe PID 2388 wrote to memory of 2976 2388 images.exe cmd.exe PID 2388 wrote to memory of 2976 2388 images.exe cmd.exe PID 2388 wrote to memory of 2976 2388 images.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8d1a4a0e2b3826798a728707527baeba_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵PID:2976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD58d1a4a0e2b3826798a728707527baeba
SHA12409203f258633d47325042cc2aae439725d4d62
SHA256b77860073b44ee02d8f4fffd3883683bb5e336e35fa0226531735e5de82e68e2
SHA512416d5e41824df31f862013d5a99dcaeba773b37e6571fcb484c48e0f1756f17966ce51382e5f10dd453e1e46c8b8a806a78c84855237aa2a06a4f7e88128ad50