Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
02a68091ca0e02c6bad47a48d75dd48c_JaffaCakes118.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
02a68091ca0e02c6bad47a48d75dd48c_JaffaCakes118.js
Resource
win10v2004-20240802-en
General
-
Target
02a68091ca0e02c6bad47a48d75dd48c_JaffaCakes118.js
-
Size
260KB
-
MD5
02a68091ca0e02c6bad47a48d75dd48c
-
SHA1
71dcb7021a6bf0bb0d2d7b36aca064bea7cb3c43
-
SHA256
d7217a9ff11d5a340d29cae2cf192d6198539c3fd2f93263e9e67fdd2c6c322a
-
SHA512
0ec94137fb399c9ea238e330ea3dc0857bbb86761cca5554092e67490416d00e68f070b080257cb18e779e85a15a61fd884a1664bd7a06a6915085db7409d9d9
-
SSDEEP
3072:uRD8ETk+dMKuPoEMYWj/dDbIw495dmOy1xAtM7JkY++:2kuuPPMnBD74Xa7Vz
Malware Config
Signatures
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B6AEBE19-A651-2377-EB37-581B1A3A1BA3} wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B6AEBE19-A651-2377-EB37-581B1A3A1BA3}\ = "MS Media Module" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B6AEBE19-A651-2377-EB37-581B1A3A1BA3}\NoExplorer = "1" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" wscript.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B6AEBE19-A651-2377-EB37-581B1A3A1BA3} wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B6AEBE19-A651-2377-EB37-581B1A3A1BA3}\ = "MS Media Module" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B6AEBE19-A651-2377-EB37-581B1A3A1BA3}\InprocServer32 wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B6AEBE19-A651-2377-EB37-581B1A3A1BA3}\InprocServer32\ = "C:\\ru26EV4XAYf.dll" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B6AEBE19-A651-2377-EB37-581B1A3A1BA3}\InprocServer32\ThreadingModel = "Apartment" wscript.exe