General
-
Target
e8aaade776c2a9e279825189b23f6eed_JaffaCakes118
-
Size
8.2MB
-
Sample
240408-3a7vrseg76
-
MD5
e8aaade776c2a9e279825189b23f6eed
-
SHA1
b42a39d4c5888efb186480430544060f758fb8dc
-
SHA256
78473f3a3e461bc15c18f82ae52ad130b0f0dff4109e21b2e47f2dde90acbf46
-
SHA512
367e58fe5d78e84c6d33f027aaeb05fa527d70a50d2e67ff300b948363cc558317d6b715fe5cae37caf19ffc5aa587c81f2b327daf61bf295bc9a4bc841be12a
-
SSDEEP
49152:7C0bNechC0bNechC0bNeccC0bNechC0bNechC0bNecO:V8e8e878e8e89
Behavioral task
behavioral1
Sample
e8aaade776c2a9e279825189b23f6eed_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e8aaade776c2a9e279825189b23f6eed_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
e8aaade776c2a9e279825189b23f6eed_JaffaCakes118
-
Size
8.2MB
-
MD5
e8aaade776c2a9e279825189b23f6eed
-
SHA1
b42a39d4c5888efb186480430544060f758fb8dc
-
SHA256
78473f3a3e461bc15c18f82ae52ad130b0f0dff4109e21b2e47f2dde90acbf46
-
SHA512
367e58fe5d78e84c6d33f027aaeb05fa527d70a50d2e67ff300b948363cc558317d6b715fe5cae37caf19ffc5aa587c81f2b327daf61bf295bc9a4bc841be12a
-
SSDEEP
49152:7C0bNechC0bNechC0bNeccC0bNechC0bNechC0bNecO:V8e8e878e8e89
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Modifies Installed Components in the registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1