General
-
Target
fd7db905ab900759fa495e8bf037c3e4_JaffaCakes118
-
Size
380KB
-
Sample
240929-bbsnpatcpr
-
MD5
fd7db905ab900759fa495e8bf037c3e4
-
SHA1
5ff36850290b1cfe38465534e7455a0b207bff78
-
SHA256
6547177b230c2b33c7f699afbee2a11a08e7201d94c93621e51f75c8780534e7
-
SHA512
b49a33e54a9674ab0a8ab2bfe3d4609a15c8481aa4605c61d611f1aa688768636596b82a0897f3e2204b8425fdaa1412f1a9e2832d58fe1d464d354c843d494c
-
SSDEEP
6144:s9eh7r3r9panVwDnCZYnjiCb1VMoQz95t6TknxqbtkMQGb1/QH1:R7DMoQz954TkopkMQGbKV
Behavioral task
behavioral1
Sample
fd7db905ab900759fa495e8bf037c3e4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd7db905ab900759fa495e8bf037c3e4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
xXxMrMo0MeNxXx
google32.sytes.net:8888
786911771d8dc9df40e00fd12ea1d0ce
-
reg_key
786911771d8dc9df40e00fd12ea1d0ce
-
splitter
|'|'|
Targets
-
-
Target
fd7db905ab900759fa495e8bf037c3e4_JaffaCakes118
-
Size
380KB
-
MD5
fd7db905ab900759fa495e8bf037c3e4
-
SHA1
5ff36850290b1cfe38465534e7455a0b207bff78
-
SHA256
6547177b230c2b33c7f699afbee2a11a08e7201d94c93621e51f75c8780534e7
-
SHA512
b49a33e54a9674ab0a8ab2bfe3d4609a15c8481aa4605c61d611f1aa688768636596b82a0897f3e2204b8425fdaa1412f1a9e2832d58fe1d464d354c843d494c
-
SSDEEP
6144:s9eh7r3r9panVwDnCZYnjiCb1VMoQz95t6TknxqbtkMQGb1/QH1:R7DMoQz954TkopkMQGbKV
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1