Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 12:03

General

  • Target

    57557ca4418c0bebbbaa138b08bec836_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    57557ca4418c0bebbbaa138b08bec836

  • SHA1

    122c9f7b78577dfb8aefd49616d2a951afa6200f

  • SHA256

    bf0fff255c43216e317706afeb542580b1ad1b4bc2c7b00733eed5c80ba007ec

  • SHA512

    5636338761699e6f227ab2b1335e0ce955635ef0423302a5e00d592fa989b0e326145147530ea9adc8587d5714da7e40f28bca499f928cccca4e4fa1b4f2f4c4

  • SSDEEP

    1536:JxqjQ+P04wsmJC1Qf6XSRfpBXUroNXXCLh0DYw3xaiS378xWNF2KF+RIwR3:sr85C166XSLBNXI0Qn8xWXrF+93

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    denzo.vov.ru
  • Port:
    21
  • Username:
    u403096
  • Password:
    c5n7kw4v

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57557ca4418c0bebbbaa138b08bec836_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\57557ca4418c0bebbbaa138b08bec836_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Users\Admin\AppData\Local\Temp\3582-490\57557ca4418c0bebbbaa138b08bec836_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\57557ca4418c0bebbbaa138b08bec836_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Users\Admin\AppData\Local\Temp\3582-490\57557ca4418c0bebbbaa138b08bec836_JaffaCakes118.exe

    Filesize

    1.0MB

    MD5

    6ef2241126f3785f80fa66223ba32e20

    SHA1

    4873042428c5aa10e522860038dfcc1dd515db41

    SHA256

    5de5bf585aea28ede580742bb50099ff05a96741db69f7dab79f6374a7a2b64a

    SHA512

    6921028f750141052366a39771ef53ba714e72039b3c47e69ae9561f30f102d0f3ff26fefeb564c0d3660d8bf7bbc35d8262e8f5c65605b48f4c40377d7db170

  • memory/2140-8-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/2140-83-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/2652-95-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2652-96-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2652-98-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB