Analysis
-
max time kernel
125s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 08:49
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_98b9ee58f23e50a27cc8fd93de2ef08a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_98b9ee58f23e50a27cc8fd93de2ef08a.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_98b9ee58f23e50a27cc8fd93de2ef08a.exe
-
Size
1.1MB
-
MD5
98b9ee58f23e50a27cc8fd93de2ef08a
-
SHA1
92da139ae7a2ca9e13edb70f614e6b6a84143b08
-
SHA256
b24cc506fb4cef38b05dabfac2e15ef98e8e0d55fccc421b8755230937961d1c
-
SHA512
5648121102a02a8344abb9b68c7106905abcd43085d73607b5b5d8b852418c602588f374a07c9e2f7b68f367868f099929b8025c20136067bc81c09fb9ba0d38
-
SSDEEP
24576:g0BG9gGUvH+uStz+Xdzu6ENDrhh1bx7n2H:g0PGAeF+Nurlrxbx7G
Malware Config
Extracted
warzonerat
192.236.249.173:2709
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2172-45-0x0000000002AA0000-0x0000000002BF4000-memory.dmp warzonerat behavioral1/memory/2172-52-0x0000000001EA0000-0x0000000002AA0000-memory.dmp warzonerat -
Executes dropped EXE 2 IoCs
pid Process 2992 onedrv.exe 2172 WINWORD.exe -
Loads dropped DLL 6 IoCs
pid Process 2996 JaffaCakes118_98b9ee58f23e50a27cc8fd93de2ef08a.exe 2996 JaffaCakes118_98b9ee58f23e50a27cc8fd93de2ef08a.exe 2996 JaffaCakes118_98b9ee58f23e50a27cc8fd93de2ef08a.exe 2996 JaffaCakes118_98b9ee58f23e50a27cc8fd93de2ef08a.exe 2996 JaffaCakes118_98b9ee58f23e50a27cc8fd93de2ef08a.exe 2992 onedrv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98b9ee58f23e50a27cc8fd93de2ef08a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language onedrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2696 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2992 onedrv.exe 2696 AcroRd32.exe 2696 AcroRd32.exe 2696 AcroRd32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2992 2996 JaffaCakes118_98b9ee58f23e50a27cc8fd93de2ef08a.exe 30 PID 2996 wrote to memory of 2992 2996 JaffaCakes118_98b9ee58f23e50a27cc8fd93de2ef08a.exe 30 PID 2996 wrote to memory of 2992 2996 JaffaCakes118_98b9ee58f23e50a27cc8fd93de2ef08a.exe 30 PID 2996 wrote to memory of 2992 2996 JaffaCakes118_98b9ee58f23e50a27cc8fd93de2ef08a.exe 30 PID 2992 wrote to memory of 2172 2992 onedrv.exe 32 PID 2992 wrote to memory of 2172 2992 onedrv.exe 32 PID 2992 wrote to memory of 2172 2992 onedrv.exe 32 PID 2992 wrote to memory of 2172 2992 onedrv.exe 32 PID 2992 wrote to memory of 2696 2992 onedrv.exe 33 PID 2992 wrote to memory of 2696 2992 onedrv.exe 33 PID 2992 wrote to memory of 2696 2992 onedrv.exe 33 PID 2992 wrote to memory of 2696 2992 onedrv.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98b9ee58f23e50a27cc8fd93de2ef08a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98b9ee58f23e50a27cc8fd93de2ef08a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\ckz_IPZB\zip\onedrv.exe"C:\Users\Admin\AppData\Local\Temp\ckz_IPZB\zip\onedrv.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\ckz_IPZB\zip\WINWORD.exe"C:\Users\Admin\AppData\Local\Temp\ckz_IPZB\zip\WINWORD.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2172
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ckz_IPZB\zip\file.pdf"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
894KB
MD5626d639ecf5972f7cea034b18dbee0f4
SHA1c8a61d6fab901afb34435b63c7ee95e913540717
SHA2563e6650eabdb08e5806c80bc5ed390f279d79faddb63fe2a4c7eeb84b25bb3ec0
SHA512e172d356647851e27a1819eb1597a8512921ba53de4e8beacfbdb263f42910798163be1cf54bd02cc1a6f43dbe9dcd108ff7bc721e41b849779ca85776828ca6
-
Filesize
233KB
MD570c2851ccffcc74203ce20b2250ef104
SHA1e153ee56481693d33693246027d22b585758c407
SHA2560022cf3d70891a42950eb9ca705eec76b25346c3ce473837dd0dc1ac006bb80d
SHA512fde0deac41f119e389114fea343abf5142de50ca6011e240e2d8686cc8f45893f97365885a1c4420fd4c2212546a4ff71b2de67b93ea21d68b9473004bad9703
-
Filesize
3KB
MD529fe54d8fd30949e453994f98ac4a2af
SHA1be7fe2ed1b540e7da3d723c4bf81b456d0819745
SHA256ef7620a600c8dc362c7378eac14f19531c108922625c543165de30b74ccc9403
SHA512aacd96880baf43433e25ad0ad81e24b37a1e2df31850c7e433e623358d137ef9f2b21f5bcf56643647e42828a6f94b0d489df93a81d32ea8b3462d909f86eda3
-
Filesize
20KB
MD585f2b9dace6497d42c370feeb69bd662
SHA13d4b98d68a56b024d4ed7cf3b4746de43e223ded
SHA2562d036fc8e7778e7fbc5ad1f3422f0855918e1ff7fa05e89701f6d84ce2a6ffce
SHA51237a01c1cb3b05cbb48f29bcaf422f7de4e22e23a74b49fd1b36d88f391b3198a99144c993add6d394b8b90fabdf7e7e623c89ab736b0c0b81e8a8cc7e860f915