General

  • Target

    06bef9c86944b567103b5e9e2deba5a0_JaffaCakes118

  • Size

    2.7MB

  • Sample

    240728-dnwl8ayakg

  • MD5

    06bef9c86944b567103b5e9e2deba5a0

  • SHA1

    88d11d0f3239635ea6c0d144886de1f2bd0b8356

  • SHA256

    5a27f33e6141371d9e06bb19def7b23be230553d704932177fc182a72426418f

  • SHA512

    5e861c40d724cdccf91d06a6329c36f2c9497d0003f77086bd725cd6e403fc21886aed4c04d01eb3be4a8bbcc1bce1409546bcffc9aeafd575e8665b206f8bdf

  • SSDEEP

    24576:ssF6mZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eH81b:fF6mw4gxeOw46fUbNecCCFbNec5

Malware Config

Targets

    • Target

      06bef9c86944b567103b5e9e2deba5a0_JaffaCakes118

    • Size

      2.7MB

    • MD5

      06bef9c86944b567103b5e9e2deba5a0

    • SHA1

      88d11d0f3239635ea6c0d144886de1f2bd0b8356

    • SHA256

      5a27f33e6141371d9e06bb19def7b23be230553d704932177fc182a72426418f

    • SHA512

      5e861c40d724cdccf91d06a6329c36f2c9497d0003f77086bd725cd6e403fc21886aed4c04d01eb3be4a8bbcc1bce1409546bcffc9aeafd575e8665b206f8bdf

    • SSDEEP

      24576:ssF6mZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eH81b:fF6mw4gxeOw46fUbNecCCFbNec5

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks