Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 20:50

General

  • Target

    3c023fe3610175309e314dce46858a49_JaffaCakes118.exe

  • Size

    4.5MB

  • MD5

    3c023fe3610175309e314dce46858a49

  • SHA1

    b581f1d07deae9622dfff5c956f5b0741d92c46a

  • SHA256

    d8e35bebda7d6e36a75fddd67dc1f471f0cbe7dbd49f0020a6f3f057b95dd9f1

  • SHA512

    46d7d1d8c51b48e55aa7f7af04b81e6217b1f1eb2d80d8c8d712105618fc0d91e2136f4b545508820416cf19c74542dfdc25865eeef7dc2f877f72307e9fe262

  • SSDEEP

    49152:Fl/ijN5j2Xsl3RJ3LHobUQDgok30f51qkyHIVaqeZkYce4OyCPOQm9F8v:FlerjesRJ8YQU/e51q0V8ZdPOQW8v

Malware Config

Signatures

  • Detect Neshta payload 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c023fe3610175309e314dce46858a49_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3c023fe3610175309e314dce46858a49_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • NTFS ADS
    • Suspicious use of SetWindowsHookEx
    PID:1928
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4744,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=4372 /prefetch:8
    1⤵
      PID:3628

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Initial Access

    Replication Through Removable Media

    1
    T1091

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Lateral Movement

    Replication Through Removable Media

    1
    T1091

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\905c0769f9a06c95a24ddf945\patcher.exe$
      Filesize

      4.5MB

      MD5

      3c023fe3610175309e314dce46858a49

      SHA1

      b581f1d07deae9622dfff5c956f5b0741d92c46a

      SHA256

      d8e35bebda7d6e36a75fddd67dc1f471f0cbe7dbd49f0020a6f3f057b95dd9f1

      SHA512

      46d7d1d8c51b48e55aa7f7af04b81e6217b1f1eb2d80d8c8d712105618fc0d91e2136f4b545508820416cf19c74542dfdc25865eeef7dc2f877f72307e9fe262

    • memory/1928-0-0x0000000000400000-0x000000000040D000-memory.dmp
      Filesize

      52KB