General

  • Target

    0c7ad72d81aa9320b6525c138081c8e2_JaffaCakes118

  • Size

    2.9MB

  • Sample

    240728-g4ycjasdkq

  • MD5

    0c7ad72d81aa9320b6525c138081c8e2

  • SHA1

    f079223253099d29d43d09b6b9be0fd5cca3a9c6

  • SHA256

    698136b63240c5ec716c9cd7eb1e2dc99d1dc4f731827e59f30490ac20db5e0c

  • SHA512

    6dfe342d1e24d5317f9371bd9f94ba49177a6581c1659eed45f5147a85afd17a3f1aa8a135825354130f77be96804528a9519879d0bb0dfe040b2a75a8c37d6a

  • SSDEEP

    24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHr:ATU7AAmw4gxeOw46fUbNecCCFbNecI

Malware Config

Targets

    • Target

      0c7ad72d81aa9320b6525c138081c8e2_JaffaCakes118

    • Size

      2.9MB

    • MD5

      0c7ad72d81aa9320b6525c138081c8e2

    • SHA1

      f079223253099d29d43d09b6b9be0fd5cca3a9c6

    • SHA256

      698136b63240c5ec716c9cd7eb1e2dc99d1dc4f731827e59f30490ac20db5e0c

    • SHA512

      6dfe342d1e24d5317f9371bd9f94ba49177a6581c1659eed45f5147a85afd17a3f1aa8a135825354130f77be96804528a9519879d0bb0dfe040b2a75a8c37d6a

    • SSDEEP

      24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHr:ATU7AAmw4gxeOw46fUbNecCCFbNecI

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks