Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29-07-2024 15:13

General

  • Target

    4e7eb50a75f8bf74751576cdd5381809_JaffaCakes118.exe

  • Size

    1.8MB

  • MD5

    4e7eb50a75f8bf74751576cdd5381809

  • SHA1

    7e0dfbdd505b9451513b828e4d392e164fe566e9

  • SHA256

    0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c

  • SHA512

    05b9ae0aef714798034ac0c271f5a1ef44221e9b56480f6de3e07d9e94e438bd0ba11ef44c6ff48267d0d9a94ec18355641c67d744d51326c8c7569048b660f3

  • SSDEEP

    49152:d4FrOycrk+0UpzJtKQFHJSm4DO9qSk/kK:scrv0YTKQFHJSmeAHK

Malware Config

Extracted

Family

warzonerat

C2

hive01.duckdns.org:8584

Signatures

  • HiveRAT

    HiveRAT is an improved version of FirebirdRAT with various capabilities.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • HiveRAT payload 15 IoCs
  • Warzone RAT payload 6 IoCs
  • Drops startup file 8 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 9 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e7eb50a75f8bf74751576cdd5381809_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4e7eb50a75f8bf74751576cdd5381809_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Users\Admin\AppData\Local\Temp\4e7eb50a75f8bf74751576cdd5381809_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\4e7eb50a75f8bf74751576cdd5381809_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Users\Admin\AppData\Roaming\1.exe
        "C:\Users\Admin\AppData\Roaming\1.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2896
        • C:\Users\Admin\AppData\Roaming\1.exe
          "C:\Users\Admin\AppData\Roaming\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1724
      • C:\Users\Admin\AppData\Roaming\2.exe
        "C:\Users\Admin\AppData\Roaming\2.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2876
        • C:\Users\Admin\AppData\Roaming\2.exe
          "C:\Users\Admin\AppData\Roaming\2.exe"
          4⤵
          • Executes dropped EXE
          PID:2680
        • C:\Users\Admin\AppData\Roaming\2.exe
          "C:\Users\Admin\AppData\Roaming\2.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:2904
      • C:\Users\Admin\AppData\Roaming\3.exe
        "C:\Users\Admin\AppData\Roaming\3.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2828
        • C:\Users\Admin\AppData\Roaming\3.exe
          "C:\Users\Admin\AppData\Roaming\3.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2056
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 528
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\4e7eb50a75f8bf74751576cdd5381809_JaffaCakes118.exe

    Filesize

    1.8MB

    MD5

    4e7eb50a75f8bf74751576cdd5381809

    SHA1

    7e0dfbdd505b9451513b828e4d392e164fe566e9

    SHA256

    0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c

    SHA512

    05b9ae0aef714798034ac0c271f5a1ef44221e9b56480f6de3e07d9e94e438bd0ba11ef44c6ff48267d0d9a94ec18355641c67d744d51326c8c7569048b660f3

  • \Users\Admin\AppData\Roaming\1.exe

    Filesize

    393KB

    MD5

    ea33ef88c0e9cf45dcd70dc971c46e02

    SHA1

    68bad4331a4f108a7ced1dfe0e87a63fc5ded774

    SHA256

    6b0c966be8f3ebf3faf33582428a16b669d7571125108c7bbd8308882c55d709

    SHA512

    37c8c9404bedf6e032b1de937641b70586ad51a5a4e95fb08798a472bff5f3766123b98e4059d08f2608932d860325ab111e093276b1c71a9286b7e5d8211998

  • \Users\Admin\AppData\Roaming\2.exe

    Filesize

    585KB

    MD5

    bf400de7c5e0fb5fe483cb09c0ccb745

    SHA1

    46199385eb5aeccd6638d77a980c780344ac8ace

    SHA256

    fafbac3283f1c1b642284c1cee4c4111a165df2afce327798e739e1bb09984fc

    SHA512

    255c6fd43bd6e8954fec5e37b9c4aef9b210728073173ac51bc5ffaa6cb3cddab32d854c027ed7c0ff3e3d311e5b8e3c5a3ed3e1e08e8ccd60449485ec9bc93d

  • \Users\Admin\AppData\Roaming\3.exe

    Filesize

    584KB

    MD5

    d21695b6d9bdd7ed0e35a0c70ce38205

    SHA1

    33522e95507f48e68a981b1097bcbe0354e31c1a

    SHA256

    15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c

    SHA512

    0550e12024173c5a369ca28f20042756d2a5a83025e8fe22e89d5f5712232741ba5c090ea53406a20372b6666a98aa23eb896e3cfb61797401b7591b9c587a5f

  • memory/900-1-0x0000000000940000-0x0000000000B16000-memory.dmp

    Filesize

    1.8MB

  • memory/900-2-0x0000000074080000-0x000000007476E000-memory.dmp

    Filesize

    6.9MB

  • memory/900-3-0x0000000004D10000-0x0000000004EE0000-memory.dmp

    Filesize

    1.8MB

  • memory/900-5-0x0000000074080000-0x000000007476E000-memory.dmp

    Filesize

    6.9MB

  • memory/900-0-0x000000007408E000-0x000000007408F000-memory.dmp

    Filesize

    4KB

  • memory/900-24-0x0000000074080000-0x000000007476E000-memory.dmp

    Filesize

    6.9MB

  • memory/1724-69-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1724-74-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1724-61-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1724-63-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1724-73-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1724-59-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1724-76-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1724-71-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1724-65-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1724-67-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1868-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1868-23-0x00000000002E0000-0x00000000002E8000-memory.dmp

    Filesize

    32KB

  • memory/1868-8-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/1868-12-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/1868-22-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/1868-21-0x0000000074080000-0x000000007476E000-memory.dmp

    Filesize

    6.9MB

  • memory/1868-52-0x0000000074080000-0x000000007476E000-memory.dmp

    Filesize

    6.9MB

  • memory/1868-18-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/1868-10-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/1868-11-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/1868-15-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/2056-141-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2056-137-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2056-133-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2056-135-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2056-139-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2056-142-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2056-144-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2056-145-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2828-51-0x0000000004270000-0x0000000004302000-memory.dmp

    Filesize

    584KB

  • memory/2828-50-0x0000000000B10000-0x0000000000BA8000-memory.dmp

    Filesize

    608KB

  • memory/2876-44-0x00000000011A0000-0x0000000001232000-memory.dmp

    Filesize

    584KB

  • memory/2876-42-0x00000000013D0000-0x0000000001468000-memory.dmp

    Filesize

    608KB

  • memory/2896-40-0x0000000000DA0000-0x0000000000E08000-memory.dmp

    Filesize

    416KB

  • memory/2896-43-0x0000000000B10000-0x0000000000B72000-memory.dmp

    Filesize

    392KB

  • memory/2904-82-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2904-96-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2904-94-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2904-98-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2904-80-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2904-92-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2904-91-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2904-78-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2904-89-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2904-88-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2904-86-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2904-84-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB