General
-
Target
JaffaCakes118_9f60de00184b1f61708abe1b0e58289615fb23f89fa8a52e515e1102a3ae709a
-
Size
610KB
-
Sample
241223-p5y98aznav
-
MD5
3a975924d9dd4045c079f76f604cd332
-
SHA1
ec5b7d61eb9dd14a62b5407bbceb93016aa28e98
-
SHA256
9f60de00184b1f61708abe1b0e58289615fb23f89fa8a52e515e1102a3ae709a
-
SHA512
be75bcbeec4e319171a43caaa02fadbfc2917274250bf1eef2fb4b59e5646c8fb8d9515c54f6cd44ad68ec2ed745403a1dcfb91f78bd37c26205ffafea0be431
-
SSDEEP
12288:auEGbFKu33ljGufC2Qt44VrtRiXi6ZbX5OQ2wOyTZ5gh:sW0u3hfCfva/p532Qbg
Static task
static1
Behavioral task
behavioral1
Sample
yzlepczajx.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
yzlepczajx.js
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
yzlepczajx.js
-
Size
920KB
-
MD5
5c7f48778dda08d83d87b51a67ad54b6
-
SHA1
a3393ea14aa9fde19778941b4ce1aa82d739396b
-
SHA256
5324fbe32d617ae3b84406481bf31ab8b25bd0fc263a50ffb147a9eaae2fbdf2
-
SHA512
8c547d098ced09baf54c40d05a3a849eabcc1d2cf62bdbf6774046cc53ba09996e922c150754b9bbb784f6daefb3376192985ad580b74f54754bd1b065cb837d
-
SSDEEP
12288:ns6jLWrbVoZ/znW4fNRyac0RuUjZltEk+jPmSh163Lq9fAIdKQJHcI:nsdrbVoZ/zWmp/oW+t6LcfAOB
Score10/10-
Adwind family
-
Disables use of System Restore points
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1