Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 04:50
Static task
static1
Behavioral task
behavioral1
Sample
50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe
-
Size
510KB
-
MD5
50c1f9426e7b18782bfe8dd638be85e4
-
SHA1
a507417fca984123b0de2609d91340ad5dde298f
-
SHA256
b2fbe46792563f45618d19c9209d0e01944884741ca5dd0f232035e2708bf523
-
SHA512
bf021d59975c473067f594302922839e881a39759c58558dd35ba637be4bde48e92b50697586e13b6d053715f3855c6dd360a89c87a0501ca3c7a755a83f787f
-
SSDEEP
6144:Ml2KSCXwIyjLg//AwJY/NO7oORRj+LAY3EgRA2+3c8WY1/gtrU012+saG:+t/ULuVJY/N83n52EcNigm1aG
Malware Config
Extracted
warzonerat
172.94.14.49:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral2/memory/1824-2404-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/1824-2410-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/2128-4812-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/2128-4816-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Executes dropped EXE 2 IoCs
pid Process 1400 winvidos.exe 2128 winvidos.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\videoslt = "C:\\ProgramData\\winvidos.exe" 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3948 set thread context of 1824 3948 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe 102 PID 1400 set thread context of 2128 1400 winvidos.exe 115 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winvidos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winvidos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3948 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe 3948 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe 1400 winvidos.exe 1400 winvidos.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3948 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe Token: SeDebugPrivilege 1400 winvidos.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3948 wrote to memory of 1824 3948 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe 102 PID 3948 wrote to memory of 1824 3948 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe 102 PID 3948 wrote to memory of 1824 3948 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe 102 PID 3948 wrote to memory of 1824 3948 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe 102 PID 3948 wrote to memory of 1824 3948 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe 102 PID 3948 wrote to memory of 1824 3948 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe 102 PID 3948 wrote to memory of 1824 3948 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe 102 PID 3948 wrote to memory of 1824 3948 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe 102 PID 3948 wrote to memory of 1824 3948 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe 102 PID 3948 wrote to memory of 1824 3948 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe 102 PID 3948 wrote to memory of 1824 3948 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe 102 PID 1824 wrote to memory of 1400 1824 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe 103 PID 1824 wrote to memory of 1400 1824 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe 103 PID 1824 wrote to memory of 1400 1824 50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe 103 PID 1400 wrote to memory of 2128 1400 winvidos.exe 115 PID 1400 wrote to memory of 2128 1400 winvidos.exe 115 PID 1400 wrote to memory of 2128 1400 winvidos.exe 115 PID 1400 wrote to memory of 2128 1400 winvidos.exe 115 PID 1400 wrote to memory of 2128 1400 winvidos.exe 115 PID 1400 wrote to memory of 2128 1400 winvidos.exe 115 PID 1400 wrote to memory of 2128 1400 winvidos.exe 115 PID 1400 wrote to memory of 2128 1400 winvidos.exe 115 PID 1400 wrote to memory of 2128 1400 winvidos.exe 115 PID 1400 wrote to memory of 2128 1400 winvidos.exe 115 PID 1400 wrote to memory of 2128 1400 winvidos.exe 115 PID 2128 wrote to memory of 2640 2128 winvidos.exe 116 PID 2128 wrote to memory of 2640 2128 winvidos.exe 116 PID 2128 wrote to memory of 2640 2128 winvidos.exe 116 PID 2128 wrote to memory of 2640 2128 winvidos.exe 116 PID 2128 wrote to memory of 2640 2128 winvidos.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\50c1f9426e7b18782bfe8dd638be85e4_JaffaCakes118.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\ProgramData\winvidos.exe"C:\ProgramData\winvidos.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\winvidos.exeC:\Users\Admin\AppData\Local\Temp\winvidos.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2640
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
510KB
MD550c1f9426e7b18782bfe8dd638be85e4
SHA1a507417fca984123b0de2609d91340ad5dde298f
SHA256b2fbe46792563f45618d19c9209d0e01944884741ca5dd0f232035e2708bf523
SHA512bf021d59975c473067f594302922839e881a39759c58558dd35ba637be4bde48e92b50697586e13b6d053715f3855c6dd360a89c87a0501ca3c7a755a83f787f