Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 15:04
Static task
static1
Behavioral task
behavioral1
Sample
cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe
-
Size
324KB
-
MD5
cda0f8a6f45ac14016a97eac3a7e5a83
-
SHA1
44b79ac4bc2a38990b3be7b0536ca3a56ac169bb
-
SHA256
4997489fb6fd63142f6caf468188e91a1e34a80a475ca4c89061bdc7f05cef89
-
SHA512
c93c3bbe26f6a9a939b9c025a5964b3d863e2aff47675c2ce0521543e3096d0353f97afb9cc03a3585e6dd2ef74049d22b9016ec8da51bea26836fb3fb5fafd8
-
SSDEEP
6144:2nMV24atCOXZuDCzR6/4tXULxz6Aed40EeyER8ptBxTeTj4C54e5JPX6F1/csCGU:PyDZu86AtAzad4hER87Bx7NeLPKF1kN
Malware Config
Extracted
warzonerat
hjjhjkk.ydns.eu:7009
Signatures
-
Bazaloader family
-
Detects BazaLoader malware 2 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests - JaffaCakes118.
resource yara_rule behavioral1/memory/8400-1953-0x0000000000400000-0x000000000055E000-memory.dmp BazaLoader behavioral1/memory/8400-1961-0x0000000000400000-0x000000000055E000-memory.dmp BazaLoader -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 2 IoCs
resource yara_rule behavioral1/memory/8400-1953-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat behavioral1/memory/8400-1961-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat -
Executes dropped EXE 5 IoCs
pid Process 8512 images.exe 9308 images.exe 9328 images.exe 9376 images.exe 9356 images.exe -
Loads dropped DLL 5 IoCs
pid Process 8400 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 8512 images.exe 8512 images.exe 8512 images.exe 8512 images.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2284 set thread context of 8400 2284 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 28 PID 8512 set thread context of 9376 8512 images.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language images.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language images.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2284 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 8512 images.exe 8512 images.exe 8512 images.exe 8512 images.exe 8512 images.exe 8512 images.exe 8512 images.exe 8512 images.exe 8512 images.exe 8512 images.exe 8512 images.exe 8512 images.exe 8512 images.exe 8512 images.exe 8512 images.exe 8512 images.exe 8512 images.exe 8512 images.exe 8512 images.exe 8512 images.exe 8512 images.exe 8512 images.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2284 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe Token: SeDebugPrivilege 8512 images.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2284 wrote to memory of 8400 2284 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 28 PID 2284 wrote to memory of 8400 2284 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 28 PID 2284 wrote to memory of 8400 2284 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 28 PID 2284 wrote to memory of 8400 2284 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 28 PID 2284 wrote to memory of 8400 2284 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 28 PID 2284 wrote to memory of 8400 2284 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 28 PID 2284 wrote to memory of 8400 2284 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 28 PID 2284 wrote to memory of 8400 2284 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 28 PID 2284 wrote to memory of 8400 2284 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 28 PID 2284 wrote to memory of 8400 2284 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 28 PID 2284 wrote to memory of 8400 2284 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 28 PID 8400 wrote to memory of 8496 8400 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 29 PID 8400 wrote to memory of 8496 8400 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 29 PID 8400 wrote to memory of 8496 8400 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 29 PID 8400 wrote to memory of 8496 8400 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 29 PID 8400 wrote to memory of 8512 8400 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 31 PID 8400 wrote to memory of 8512 8400 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 31 PID 8400 wrote to memory of 8512 8400 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 31 PID 8400 wrote to memory of 8512 8400 cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe 31 PID 8496 wrote to memory of 8580 8496 cmd.exe 32 PID 8496 wrote to memory of 8580 8496 cmd.exe 32 PID 8496 wrote to memory of 8580 8496 cmd.exe 32 PID 8496 wrote to memory of 8580 8496 cmd.exe 32 PID 8512 wrote to memory of 9308 8512 images.exe 35 PID 8512 wrote to memory of 9308 8512 images.exe 35 PID 8512 wrote to memory of 9308 8512 images.exe 35 PID 8512 wrote to memory of 9308 8512 images.exe 35 PID 8512 wrote to memory of 9328 8512 images.exe 36 PID 8512 wrote to memory of 9328 8512 images.exe 36 PID 8512 wrote to memory of 9328 8512 images.exe 36 PID 8512 wrote to memory of 9328 8512 images.exe 36 PID 8512 wrote to memory of 9356 8512 images.exe 37 PID 8512 wrote to memory of 9356 8512 images.exe 37 PID 8512 wrote to memory of 9356 8512 images.exe 37 PID 8512 wrote to memory of 9356 8512 images.exe 37 PID 8512 wrote to memory of 9376 8512 images.exe 38 PID 8512 wrote to memory of 9376 8512 images.exe 38 PID 8512 wrote to memory of 9376 8512 images.exe 38 PID 8512 wrote to memory of 9376 8512 images.exe 38 PID 8512 wrote to memory of 9376 8512 images.exe 38 PID 8512 wrote to memory of 9376 8512 images.exe 38 PID 8512 wrote to memory of 9376 8512 images.exe 38 PID 8512 wrote to memory of 9376 8512 images.exe 38 PID 8512 wrote to memory of 9376 8512 images.exe 38 PID 8512 wrote to memory of 9376 8512 images.exe 38 PID 8512 wrote to memory of 9376 8512 images.exe 38 PID 9376 wrote to memory of 9496 9376 images.exe 39 PID 9376 wrote to memory of 9496 9376 images.exe 39 PID 9376 wrote to memory of 9496 9376 images.exe 39 PID 9376 wrote to memory of 9496 9376 images.exe 39 PID 9376 wrote to memory of 9496 9376 images.exe 39 PID 9376 wrote to memory of 9496 9376 images.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\cda0f8a6f45ac14016a97eac3a7e5a83_JaffaCakes118.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:8400 -
C:\Windows\SysWOW64\cmd.execmd.exe /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\images.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:8496 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\images.exe"4⤵
- System Location Discovery: System Language Discovery
PID:8580
-
-
-
C:\ProgramData\images.exe"C:\ProgramData\images.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:8512 -
C:\Users\Admin\AppData\Local\Temp\images.exeC:\Users\Admin\AppData\Local\Temp\images.exe4⤵
- Executes dropped EXE
PID:9308
-
-
C:\Users\Admin\AppData\Local\Temp\images.exeC:\Users\Admin\AppData\Local\Temp\images.exe4⤵
- Executes dropped EXE
PID:9328
-
-
C:\Users\Admin\AppData\Local\Temp\images.exeC:\Users\Admin\AppData\Local\Temp\images.exe4⤵
- Executes dropped EXE
PID:9356
-
-
C:\Users\Admin\AppData\Local\Temp\images.exeC:\Users\Admin\AppData\Local\Temp\images.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:9376 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵
- System Location Discovery: System Language Discovery
PID:9496
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324KB
MD5cda0f8a6f45ac14016a97eac3a7e5a83
SHA144b79ac4bc2a38990b3be7b0536ca3a56ac169bb
SHA2564997489fb6fd63142f6caf468188e91a1e34a80a475ca4c89061bdc7f05cef89
SHA512c93c3bbe26f6a9a939b9c025a5964b3d863e2aff47675c2ce0521543e3096d0353f97afb9cc03a3585e6dd2ef74049d22b9016ec8da51bea26836fb3fb5fafd8