General

  • Target

    b83be61001a4e5ead78d33df5fc56493_JaffaCakes118

  • Size

    541KB

  • Sample

    240617-mys4hsxelg

  • MD5

    b83be61001a4e5ead78d33df5fc56493

  • SHA1

    44dd492fa917adcb0dc71833e1bf95ef412597ab

  • SHA256

    ef6788991948184362c2ca053ff70484ed6a248674d6550bb28efa40ed96d459

  • SHA512

    468ca76a681eb5bc7d7dfeef58c131a7ae9a688c2934fbcb02b5f47c0ce49bfd4badfff24d0a8da7e46124278d70760f03abf4b9f250c31866797539601a10c4

  • SSDEEP

    12288:21tzpFyRsj8hUmkp0Zdl4jxTpCP7CdtsP8/Sy:tyjGZdl4jppJ3PKy

Malware Config

Targets

    • Target

      b83be61001a4e5ead78d33df5fc56493_JaffaCakes118

    • Size

      541KB

    • MD5

      b83be61001a4e5ead78d33df5fc56493

    • SHA1

      44dd492fa917adcb0dc71833e1bf95ef412597ab

    • SHA256

      ef6788991948184362c2ca053ff70484ed6a248674d6550bb28efa40ed96d459

    • SHA512

      468ca76a681eb5bc7d7dfeef58c131a7ae9a688c2934fbcb02b5f47c0ce49bfd4badfff24d0a8da7e46124278d70760f03abf4b9f250c31866797539601a10c4

    • SSDEEP

      12288:21tzpFyRsj8hUmkp0Zdl4jxTpCP7CdtsP8/Sy:tyjGZdl4jppJ3PKy

    • AdWind

      A Java-based RAT family operated as malware-as-a-service.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

File and Directory Permissions Modification

1
T1222

Modify Registry

2
T1112

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Tasks