General
-
Target
JaffaCakes118_2c962931cbd7724909e416952b21f412890801380aea4e17e5590fc3f6c6e798
-
Size
6KB
-
Sample
241230-zf37zszqhx
-
MD5
c7817e5626d7e3d4ba2b0adf4e3654da
-
SHA1
55d8497cf4562b808b8726a6c0f2680443dbd159
-
SHA256
2c962931cbd7724909e416952b21f412890801380aea4e17e5590fc3f6c6e798
-
SHA512
163bc1ffd6c00e12a8f7b0d347be5b2410d76a49d95cd6f12144f6bb750283b2f201fad747e8e25cb9c12bba015fa1965b73657cab9562bc4c1df222f9d7ec72
-
SSDEEP
192:nisBz8rlq7vjbs7ccZEr9wHrG0eukcM0By6rwobn2kFhRh:nis18SvycHBwHSABy6JtRh
Static task
static1
Behavioral task
behavioral1
Sample
ZXTEJDJGDMND.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ZXTEJDJGDMND.js
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ZXTEJDJGDMND.js
-
Size
9KB
-
MD5
4bf6f13902c5c69baf11914cc4c6eb4c
-
SHA1
5fcb4b1f0092a79c2f050c678a69fbc6ee8e2852
-
SHA256
d1d87467831ba4b691160509772995bb99ce7d2abcc96bd6b6cdd6ec1af058dc
-
SHA512
1b3ecdf7dd4a8541c80d0fa51359228bdb10687715697cb1ceaea8e14d36db5f6f53425a3e5f065797faf2ff8ebdc7c9afe5e32a9149de1d81e79b68a10dbaa9
-
SSDEEP
192:BXBxq3DILsVtE285GYsZm1t0WXHyuYLbBZEXZT9BCZzD5Xes:9Bx8DIiXMG5E1aWXSZX2EJ
Score10/10-
Vjw0rm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1