Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2024 20:51

General

  • Target

    JaffaCakes118_3640b9da89871f72a86d8aac0558e5e4.exe

  • Size

    901KB

  • MD5

    3640b9da89871f72a86d8aac0558e5e4

  • SHA1

    5d9620e919446a5ab9ed8b1d3ff1fb29790c1dfe

  • SHA256

    3cef21b3cacd18eb48c6b2d3d517aa2891a132c2a4bd51fc06d9936abdbc144e

  • SHA512

    956ca0fe1baa0d9febe1f56d9c0395fdd22212e0cbf5eb8d81a845b06bec683ad3e57f7be65ac71487dd92265b93de0cc6c15f6d07b46c5b7d24787cd18e948d

  • SSDEEP

    24576:XAHnh+eWsN3skA4RV1Hom2KXMmHackv5:Kh+ZkldoPK8Yac4

Malware Config

Extracted

Family

warzonerat

C2

crypterfile.com:1500

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3640b9da89871f72a86d8aac0558e5e4.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3640b9da89871f72a86d8aac0558e5e4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3640b9da89871f72a86d8aac0558e5e4.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3640b9da89871f72a86d8aac0558e5e4.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2044-7-0x00000000002E0000-0x00000000002FD000-memory.dmp

    Filesize

    116KB

  • memory/2044-9-0x00000000002E0000-0x00000000002FD000-memory.dmp

    Filesize

    116KB

  • memory/2044-10-0x00000000002E0000-0x00000000002FD000-memory.dmp

    Filesize

    116KB

  • memory/2044-11-0x00000000002E0000-0x00000000002FD000-memory.dmp

    Filesize

    116KB