General

  • Target

    c1cc8c40af4d53e8782dd0c6d5150895_JaffaCakes118

  • Size

    1.8MB

  • Sample

    240825-3af22s1cnc

  • MD5

    c1cc8c40af4d53e8782dd0c6d5150895

  • SHA1

    3f2b46a1ba00d9714c2a650099d15f58e807ff60

  • SHA256

    76ef3ab1f847980d9a9c68eb4de7c197202332e0df025a355e46a7c2a70e0152

  • SHA512

    741f7ae0a4254207193b6bb8719407894131036d547eba614cb09b15afabbd74f71c51263e9dc6603d5388ba0079916ec5c7a64acc115b610888be3be94d7640

  • SSDEEP

    12288:p99Vbpgx4OuE+aCpBPY0PkI686WNUfWO6yuXzT5SPlSGN/A7W2FeDSIGVH/KIDgm:r1gg4CppEI6GGfWDkCQDbGV6eH81kN

Malware Config

Targets

    • Target

      c1cc8c40af4d53e8782dd0c6d5150895_JaffaCakes118

    • Size

      1.8MB

    • MD5

      c1cc8c40af4d53e8782dd0c6d5150895

    • SHA1

      3f2b46a1ba00d9714c2a650099d15f58e807ff60

    • SHA256

      76ef3ab1f847980d9a9c68eb4de7c197202332e0df025a355e46a7c2a70e0152

    • SHA512

      741f7ae0a4254207193b6bb8719407894131036d547eba614cb09b15afabbd74f71c51263e9dc6603d5388ba0079916ec5c7a64acc115b610888be3be94d7640

    • SSDEEP

      12288:p99Vbpgx4OuE+aCpBPY0PkI686WNUfWO6yuXzT5SPlSGN/A7W2FeDSIGVH/KIDgm:r1gg4CppEI6GGfWDkCQDbGV6eH81kN

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks