General

  • Target

    114648480974b3ab59a0694981c5a571_JaffaCakes118

  • Size

    2.9MB

  • Sample

    240728-krwjys1hkh

  • MD5

    114648480974b3ab59a0694981c5a571

  • SHA1

    f3d988c3eaa5345ba3ffa7e214bca43dfc7defbb

  • SHA256

    25b9670313db49f1a36fe626a00abbda9c5702dc73dc66550f442f9e5ff2de6c

  • SHA512

    c5a08cada78039e9e51ec74c35d3a019e50c5947c15cfe3456ca1aae4df97afa3846e9ec756e50f64d25df499966fa1fd4c20ba3032f44674a2f448b1a5a1ff4

  • SSDEEP

    24576:3Ty7A3mZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHJ:3Ty7A3mw4gxeOw46fUbNecCCFbNec6

Malware Config

Targets

    • Target

      114648480974b3ab59a0694981c5a571_JaffaCakes118

    • Size

      2.9MB

    • MD5

      114648480974b3ab59a0694981c5a571

    • SHA1

      f3d988c3eaa5345ba3ffa7e214bca43dfc7defbb

    • SHA256

      25b9670313db49f1a36fe626a00abbda9c5702dc73dc66550f442f9e5ff2de6c

    • SHA512

      c5a08cada78039e9e51ec74c35d3a019e50c5947c15cfe3456ca1aae4df97afa3846e9ec756e50f64d25df499966fa1fd4c20ba3032f44674a2f448b1a5a1ff4

    • SSDEEP

      24576:3Ty7A3mZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHJ:3Ty7A3mw4gxeOw46fUbNecCCFbNec6

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks