General
-
Target
7a5304e464f29292e92597fbc49fa957_JaffaCakes118
-
Size
183KB
-
Sample
240527-ymhzyshb77
-
MD5
7a5304e464f29292e92597fbc49fa957
-
SHA1
6aac79050f83135826a67d78b1eb7a0622868ab9
-
SHA256
6399aaa0089894ebfeab0d021997ee534fe8def4d398940c14e42ee18998f6ce
-
SHA512
19048f6263876771f9a22c4167f98f1df6218839b1de9b3275be301ed3bbae557cbca5432e8370d355c38f3ec2ed92d60b87a6002e65cc0b002f0b15c3906a1d
-
SSDEEP
1536:JxqjQ+P04wsmJCLSwjOAbDLy+y8FqAxh41a//PCczhrR1Culo/D:sr85CLXCAbDO+fi4iczhrRYulo7
Behavioral task
behavioral1
Sample
7a5304e464f29292e92597fbc49fa957_JaffaCakes118.exe
Resource
win7-20240508-en
Malware Config
Extracted
njrat
0.7d
PC
waynegriffin.linkpc.net:4867
b5cc29546a1aa0eeedcb4b72f8d650c8
-
reg_key
b5cc29546a1aa0eeedcb4b72f8d650c8
-
splitter
|'|'|
Targets
-
-
Target
7a5304e464f29292e92597fbc49fa957_JaffaCakes118
-
Size
183KB
-
MD5
7a5304e464f29292e92597fbc49fa957
-
SHA1
6aac79050f83135826a67d78b1eb7a0622868ab9
-
SHA256
6399aaa0089894ebfeab0d021997ee534fe8def4d398940c14e42ee18998f6ce
-
SHA512
19048f6263876771f9a22c4167f98f1df6218839b1de9b3275be301ed3bbae557cbca5432e8370d355c38f3ec2ed92d60b87a6002e65cc0b002f0b15c3906a1d
-
SSDEEP
1536:JxqjQ+P04wsmJCLSwjOAbDLy+y8FqAxh41a//PCczhrR1Culo/D:sr85CLXCAbDO+fi4iczhrRYulo7
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1