Analysis

  • max time kernel
    146s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2024, 20:10

General

  • Target

    JaffaCakes118_340c89b2f53261125d86d2289fd65456.exe

  • Size

    1.3MB

  • MD5

    340c89b2f53261125d86d2289fd65456

  • SHA1

    4cf8364eeb744304775a3037da631c6b0cffa19a

  • SHA256

    f25660daa72c172425bc14dd48d5aaa52fd87b6babecc911e12b39b5e51954d0

  • SHA512

    165faf95ae82cccdbf3eb47def07953f17fbe11c85c2db2db12b87cc02d1b515d9f2d5c3c276c149206b7f5eef72058aaa2c95d70ac57a658790d0d350b13444

  • SSDEEP

    6144:DuW80WhmQDzYm00RiTwSltgxCKYPMXq9NmiQBYGhpX8x4MWy1FYCz8hJ2n3C+8JD:DuWoJ4D4pa7+o4H

Malware Config

Extracted

Family

warzonerat

C2

win64pooldrv.ddns.net:9010

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_340c89b2f53261125d86d2289fd65456.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_340c89b2f53261125d86d2289fd65456.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • NTFS ADS
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell Add-MpPreference -ExclusionPath C:\
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2656
    • C:\ProgramData\images.exe
      "C:\ProgramData\images.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell Add-MpPreference -ExclusionPath C:\
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3004
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1892

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          95d6a1b1bf1faee48738e4fda31658c7

          SHA1

          e6cbb3c5a552c159df78cfbc2f988fd402c32d1c

          SHA256

          ff80bba39867058ae4d0558dd5b7c02d4192080cb76cefae0a421cdf16966e34

          SHA512

          7295ff58738908ee61f05b2d97e3ccbb4cd0a8f42e98933e5d8ad636d8bd5f60cee620432b846845c3b7a8913ecab36063861344ad74901ded54915238d34164

        • \ProgramData\images.exe

          Filesize

          1.3MB

          MD5

          340c89b2f53261125d86d2289fd65456

          SHA1

          4cf8364eeb744304775a3037da631c6b0cffa19a

          SHA256

          f25660daa72c172425bc14dd48d5aaa52fd87b6babecc911e12b39b5e51954d0

          SHA512

          165faf95ae82cccdbf3eb47def07953f17fbe11c85c2db2db12b87cc02d1b515d9f2d5c3c276c149206b7f5eef72058aaa2c95d70ac57a658790d0d350b13444

        • memory/1892-39-0x0000000000270000-0x0000000000271000-memory.dmp

          Filesize

          4KB

        • memory/1892-41-0x0000000000270000-0x0000000000271000-memory.dmp

          Filesize

          4KB

        • memory/2164-0-0x0000000076B2F000-0x0000000076B30000-memory.dmp

          Filesize

          4KB

        • memory/2164-1-0x0000000076AC0000-0x0000000076BC0000-memory.dmp

          Filesize

          1024KB

        • memory/2164-2-0x0000000000970000-0x0000000000AC4000-memory.dmp

          Filesize

          1.3MB

        • memory/2164-20-0x0000000000970000-0x0000000000AC4000-memory.dmp

          Filesize

          1.3MB

        • memory/2164-21-0x0000000076AC0000-0x0000000076BC0000-memory.dmp

          Filesize

          1024KB

        • memory/2656-25-0x0000000076AC0000-0x0000000076BC0000-memory.dmp

          Filesize

          1024KB

        • memory/2832-27-0x0000000000830000-0x0000000000984000-memory.dmp

          Filesize

          1.3MB