Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-04-2024 00:37

General

  • Target

    fe043a8a6f140f41b505113bb8ed95a5_JaffaCakes118.exe

  • Size

    944KB

  • MD5

    fe043a8a6f140f41b505113bb8ed95a5

  • SHA1

    1f3480f69adb3eb963ea19e17cca92a07a21c777

  • SHA256

    50fe211af4c35fdfc2800374ce93abcca854aff9c0bd2443646d6b2badaa6379

  • SHA512

    ce321dc886fd1a39948186cafdec0f533ddeb7d2c03aecb80760537666727efc63149eb74eff2b4793e9316ac9b505be978e45aa2ca8878faf521cc394ec0ada

  • SSDEEP

    24576:vtmwccu2gQvgSsVSsLJeEdqcIu1MkFJ3y:vgwccqQvgSCSstLISMk3i

Malware Config

Signatures

  • Detect Neshta payload 3 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe043a8a6f140f41b505113bb8ed95a5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fe043a8a6f140f41b505113bb8ed95a5_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Users\Admin\AppData\Local\Temp\3582-490\fe043a8a6f140f41b505113bb8ed95a5_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\fe043a8a6f140f41b505113bb8ed95a5_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Users\Admin\AppData\Local\Temp\0E0ADE61-BAB0-7891-A70F-3EE815231783\Setup.exe
        "C:\Users\Admin\AppData\Local\Temp\0E0ADE61-BAB0-7891-A70F-3EE815231783\Setup.exe" -490\fe043a8a6f140f41b505113bb8ed95a5_JaffaCakes118.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2696
        • C:\Windows\SysWOW64\rundll32.exe
          C:\Windows\SysWOW64\\rundll32.exe C:\Users\Admin\AppData\Local\Temp\0E0ADE~1\IECOOK~1.DLL,UpdateProtectedModeCookieCache URI|http://babylon.com
          4⤵
          • Loads dropped DLL
          • Checks whether UAC is enabled
          • Modifies Internet Explorer settings
          • Suspicious use of WriteProcessMemory
          PID:2504
          • C:\Program Files (x86)\Internet Explorer\IELowutil.exe
            "C:\Program Files (x86)\Internet Explorer\IELowutil.exe" -embedding
            5⤵
              PID:2480

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe

      Filesize

      547KB

      MD5

      cf6c595d3e5e9667667af096762fd9c4

      SHA1

      9bb44da8d7f6457099cb56e4f7d1026963dce7ce

      SHA256

      593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d

      SHA512

      ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80

    • C:\Users\Admin\AppData\Local\Babylon\Setup\ClientAddon.zpb

      Filesize

      144KB

      MD5

      c527c93158d460cbebc787d29d7478d1

      SHA1

      f8ac61945c885309c5ddca10f0cdf3611447c1bf

      SHA256

      f576532fb56f747a3e826992e5f75d1e79b2089ceca5f1292118b36d32a594f7

      SHA512

      d29f692f8415622881ff44e04d9fd26d223b8b4b3d35bcffdbfae305c357ae4f14ca61605752a7efda86a9d8aa09bf52480fde85068ab7019ef382ff03b179af

    • C:\Users\Admin\AppData\Local\Babylon\Setup\Setup-w64.zpb

      Filesize

      246KB

      MD5

      bc13fc94e3d5aa602c8a2d92e2644394

      SHA1

      ce8ecaa7d90b5ea1b6eaa6a913f28f5bcd39236d

      SHA256

      ee9e980db0f5dbc76c75b5d7510d8d7058766717fb6174a22bca360b11d28ccb

      SHA512

      d01cbdcedd46bf1884d4283c5651d42ea1fb5b4cc7ebbab22b42071e3a877c324aec1a7c2ab29b4fc54967d8bcbbd0e0a5cb16950a6b4c02e93a2a78eda53ea7

    • C:\Users\Admin\AppData\Local\Temp\0E0ADE61-BAB0-7891-A70F-3EE815231783\Babylon.dat

      Filesize

      12KB

      MD5

      edec4b2f9a4d941dd0dfd1e18a855ab7

      SHA1

      1a73a278a2a4e5f8b66b30296644eb91b3849514

      SHA256

      c388368dcaef4637345d6fc4e94c81c27b7d8025603e24e7621731c390402d3f

      SHA512

      45830977e552f3e917aabe869212ef865a95325405a21095a818f3458de008ee239f099e49cc8092fd37bcedb265b879f0d81e21e3a0cdf7c289671ee35ba36b

    • C:\Users\Admin\AppData\Local\Temp\0E0ADE61-BAB0-7891-A70F-3EE815231783\HtmlScreens\cmbx.png

      Filesize

      3KB

      MD5

      f42ef9814569ec9f8c120d0ed4914326

      SHA1

      ec41ceb084d6a4c4a001929dbbd7d589d78a6994

      SHA256

      f7c80d69aefe9999bdb82e1fadd400945d8e0bc958cfbeb23dd8d2f547a58e0e

      SHA512

      f2d06c6a052715e247f9a53e25c8d1e275b616d82789af7fa9ac8f838d5238f0a8364f5419e3b06c358d1ab227c5694a7ce19373307646eb708b136382c26beb

    • C:\Users\Admin\AppData\Local\Temp\0E0ADE61-BAB0-7891-A70F-3EE815231783\HtmlScreens\lngs.png

      Filesize

      25KB

      MD5

      d494998cd34c0ff5973635026f0805d6

      SHA1

      41ad724f4579b944b6f0fee5c1e21b7556d131e3

      SHA256

      430ca1aac14605774a79f057a628305e0861d8adb095d3c347ea9f4179cdcd17

      SHA512

      07f7668286f25c7c6b61bdea85f26f52b3e5931ca0e1aa1ab02405c7c90936de5ba195541822fd9ad3f9cd6fd44a7947f27f4f1fd74211ed83d96bd910c8cfc0

    • C:\Users\Admin\AppData\Local\Temp\0E0ADE61-BAB0-7891-A70F-3EE815231783\HtmlScreens\pBar.gif

      Filesize

      3KB

      MD5

      26621cb27bbc94f6bab3561791ac013b

      SHA1

      4010a489350cf59fd8f36f8e59b53e724c49cc5b

      SHA256

      e512d5b772fef448f724767662e3a6374230157e35cab6f4226496acc7aa7ad3

      SHA512

      9a19e8f233113519b22d9f3b205f2a3c1b59669a0431a5c3ef6d7ed66882b93c8582f3baa13df4647bcc265d19f7c6543758623044315105479d2533b11f92c6

    • C:\Users\Admin\AppData\Local\Temp\0E0ADE61-BAB0-7891-A70F-3EE815231783\HtmlScreens\page0.html

      Filesize

      1KB

      MD5

      cf33120dd42cee842d96532843bb1961

      SHA1

      1db4f3e0aa1e4036a078a05f48fefdbb8744e3cf

      SHA256

      783a0e39d4a751462e26e4acfcf6fb4953f818980ad3d7d7fb821ac35c00c29f

      SHA512

      889d4043672b551a08979054add55bca4c5a4438fef5189b1ecf309c803ff1468664ed1123b0d22ceecb21a7bc5cfbf85a7428ed72ad7be04596185432aa68e3

    • C:\Users\Admin\AppData\Local\Temp\0E0ADE61-BAB0-7891-A70F-3EE815231783\HtmlScreens\page1.css

      Filesize

      3KB

      MD5

      9738e367bdfab14e75f2babb30c6b3c4

      SHA1

      adbe229876d1b9097549580806cf700c2cd9b7c7

      SHA256

      841ea92fdf1e748803c5ff03c1afdfcf940477d91765586a50651cc6fa5bdc41

      SHA512

      bf12b1f8f94737613792d75bdf537f145640f29d53d9c620eac1326e37591ca198f6a8b50895df57e339228d16c479fef16ea7b124161c2ff91c25170d040851

    • C:\Users\Admin\AppData\Local\Temp\0E0ADE61-BAB0-7891-A70F-3EE815231783\HtmlScreens\page1.html

      Filesize

      4KB

      MD5

      e5cd196e92bcce3742c3ff5cfffc3d63

      SHA1

      a5030d4da8ab23c962c61be98481f8d3ec21a3ea

      SHA256

      7cf3a993ccd974417d7b778afff75fd17ba1d70c5a6daf98a4f918e4009cde9a

      SHA512

      8a153eaee2c2ec36badb497dbefdb53a66146c9cb26eaab39d998c6d7732f0c5c31f32f65cc9c1504df9a83797bdb43c17b6ec29d199d5a8705142a50bd87c04

    • C:\Users\Admin\AppData\Local\Temp\0E0ADE61-BAB0-7891-A70F-3EE815231783\HtmlScreens\setup.js

      Filesize

      14KB

      MD5

      d198249f251b01db774ac4cfd0befe31

      SHA1

      0d2d6e983169fe90ed0158c4422c1d2fd67cb623

      SHA256

      379a9716d8f13827dc10ec40733d9e32b2a6d4a42968fdcea9c14f5383673fa5

      SHA512

      039fd85d6d9ed22bfcd2e1e9b071018a5ac834a76a7b5e2b938dad346300e78fbac1b05858aa9c4632dbfee24551a4c3d59e50729ef73c9fc38430caf25c178f

    • C:\Users\Admin\AppData\Local\Temp\0E0ADE61-BAB0-7891-A70F-3EE815231783\HtmlScreens\title.png

      Filesize

      25KB

      MD5

      12ef76069cc40b8ad478d9091915ded6

      SHA1

      fabad560b6e6839f9e5ae1268695d11ca35f9d74

      SHA256

      4be568ed2044e1b74bc1d61d13ce71080e5a9717ed481616a6efc1ec4c35dd0c

      SHA512

      5625082a87aa75266c9680a4f4b31eb7b1df084bba6c7e2e70512f232556f9029af06a0a63b342ffc220bf3797cc09f333437fe26547ea6494913f1c59b2e067

    • C:\Users\Admin\AppData\Local\Temp\0E0ADE61-BAB0-7891-A70F-3EE815231783\HtmlScreens\vIcn.png

      Filesize

      2KB

      MD5

      1385093e8869c3de726a0d5e04d1da97

      SHA1

      68ec235899825f9529c86147ee36e52437a0750b

      SHA256

      dac95d45107e929298649746c75d475d68321ef1f85e3a7d492974a4ea9120d3

      SHA512

      4041b3649a459baeaf75604d509149baf3811898689b44b81bd16bfe1b97e28f6d246120cd03bb230fd84995b1b36843fbfc3af9860f6ef3491e48cc40e0cdda

    • C:\Users\Admin\AppData\Local\Temp\0E0ADE61-BAB0-7891-A70F-3EE815231783\SetupStrings.dat

      Filesize

      88KB

      MD5

      3c72fdc53ad2bc291021a1e7535be489

      SHA1

      1b0496a042efdf77a69d06e7a19fc6066c9e6a30

      SHA256

      ae4d1010067384f780c4344628f6584982babb3d41bb61456a6e3182e47e8f55

      SHA512

      a2c3a61923fcc18a7ef18c823ed3655a9c9a8d06960e4b991de6b1e12adba9f5c12773fc93093af5b1758916a029390e95a2890ef3bd8a9f7162305798c48368

    • C:\Users\Admin\AppData\Local\Temp\0E0ADE61-BAB0-7891-A70F-3EE815231783\bab027.ttype310512_510.dat

      Filesize

      200B

      MD5

      9c3dacb5b5a8352c54ad9c036d7220f2

      SHA1

      15d35013f553712adcdd51dfcd1616a139e1e865

      SHA256

      d53b0257eb82a60523aa80f13bd91b627b2489cd52776a02d57106648079b6cd

      SHA512

      f9947383bdbbb3c4a9f737e69c5bd6e99fc9070421f801bd5484e84c1adc9a915e0423fa352f57ab99080d1d6129a5e995e40e28f8e54fe206d30b7d891f125a

    • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

      Filesize

      252KB

      MD5

      9e2b9928c89a9d0da1d3e8f4bd96afa7

      SHA1

      ec66cda99f44b62470c6930e5afda061579cde35

      SHA256

      8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

      SHA512

      2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

    • \Users\Admin\AppData\Local\Temp\0E0ADE61-BAB0-7891-A70F-3EE815231783\Setup.exe

      Filesize

      1.7MB

      MD5

      0a5c0c819aeb95a648b4b25f332ca39a

      SHA1

      2f7f92f0eeb0c8353bacb26bc12fed71822de7e9

      SHA256

      6e1e3da876e5a4ac05420a63e10cbb395916ed741d42ed356a4e958265e24e5a

      SHA512

      4da63c6e7987d670b94901565c1509b212eb00a956ce24f3e0f69afc94f9e2ece724ae1efee2f6218028a54e5f860e95dba5520eb7ed938206748ba295b6f920

    • \Users\Admin\AppData\Local\Temp\0E0ADE61-BAB0-7891-A70F-3EE815231783\sqlite3.dll

      Filesize

      508KB

      MD5

      0f66e8e2340569fb17e774dac2010e31

      SHA1

      406bb6854e7384ff77c0b847bf2f24f3315874a3

      SHA256

      de818c832308b82c2fabd5d3d4339c489e6f4e9d32bb8152c0dcd8359392695f

      SHA512

      39275df6e210836286e62a95ace7f66c7d2736a07b80f9b7e9bd2a716a6d074c79deae54e2d21505b74bac63df0328d6780a2129cdfda93aec1f75b523da9e05

    • \Users\Admin\AppData\Local\Temp\0E0ADE~1\IECOOK~1.DLL

      Filesize

      5KB

      MD5

      030a3d14fcbef96dcbbc3703c75ccf37

      SHA1

      51a0e61b7550b03a36052a6603741510b21e7169

      SHA256

      5551bdfe47245f552e266166a19c38110f57d2a83e1eb2a9584876da01f2b5fe

      SHA512

      1dbd25dacc5256aff9e1c9086c8e9df53bf3ca7a30a0ab28876fbabeb2722591a73cf35c160b2e5c965754dabc846bc148f97c869480d8382494179463982b8c

    • \Users\Admin\AppData\Local\Temp\3582-490\fe043a8a6f140f41b505113bb8ed95a5_JaffaCakes118.exe

      Filesize

      904KB

      MD5

      d70cf342d6e54d20bfd2d220bc538e96

      SHA1

      906dba6213a0436677ef363054be294cef20cbba

      SHA256

      1770e50f7fa6463bf4627193389a7e51b8590a66bb4a372732f9aedf9943934f

      SHA512

      e7003f1efa907f97cf9ff849234975cdf7a7c46aa8af2f9799462e035133b1eb0ef8b9802c2be76fc88227772df77e8cee984cdecae21479a05d8304d2a326d4

    • memory/2480-73-0x0000000002820000-0x0000000002822000-memory.dmp

      Filesize

      8KB

    • memory/2504-75-0x0000000000260000-0x0000000000262000-memory.dmp

      Filesize

      8KB

    • memory/2696-94-0x0000000000AE0000-0x0000000000AE1000-memory.dmp

      Filesize

      4KB

    • memory/2696-192-0x0000000060900000-0x0000000060970000-memory.dmp

      Filesize

      448KB

    • memory/2904-189-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2904-191-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB