General

  • Target

    0efe0390c8090737336da87e00251c40_JaffaCakes118

  • Size

    2.9MB

  • Sample

    240728-jhcj2swajk

  • MD5

    0efe0390c8090737336da87e00251c40

  • SHA1

    df54d9f18d81f1589a14430c0918043e6cfa1644

  • SHA256

    3fcce7e208e700448738eaa4306943bcc20b65c3a5fc6affc02c2ef13556e238

  • SHA512

    1dcbe966bf9872a5c9a527c2937b2bdf1d3e61a8b29fee9c23dc440707e1a4021b29dfeb6f54f9e8816b8d22e0acfdc1a2edb39ad6848d5d304ffe80111d687b

  • SSDEEP

    24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHW:ATU7AAmw4gxeOw46fUbNecCCFbNecZ

Malware Config

Targets

    • Target

      0efe0390c8090737336da87e00251c40_JaffaCakes118

    • Size

      2.9MB

    • MD5

      0efe0390c8090737336da87e00251c40

    • SHA1

      df54d9f18d81f1589a14430c0918043e6cfa1644

    • SHA256

      3fcce7e208e700448738eaa4306943bcc20b65c3a5fc6affc02c2ef13556e238

    • SHA512

      1dcbe966bf9872a5c9a527c2937b2bdf1d3e61a8b29fee9c23dc440707e1a4021b29dfeb6f54f9e8816b8d22e0acfdc1a2edb39ad6848d5d304ffe80111d687b

    • SSDEEP

      24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHW:ATU7AAmw4gxeOw46fUbNecCCFbNecZ

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks