Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/10/2024, 01:47
Behavioral task
behavioral1
Sample
5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe
-
Size
8.8MB
-
MD5
5a431c261a52936fcb11d8c65d6b7838
-
SHA1
3fe7ce03fa0b4608a3808fd218dd4f1963d61aef
-
SHA256
b62cd2225131c81d38d26c5bf8e6fd600f0c87312d4cc155a489630de166f8ec
-
SHA512
61f6364e76198ba976f314afbc6e98fdcd199de80bd27583f2fbaa71636f3b02f2acb1defa330d73342dc58de7cc61a1e22779d2a357095242871774bb80166b
-
SSDEEP
49152:ohPg95YC1yRr5R+jzA66ymAu1Rx48D9d5VGoemckeh7ns3xHzX11w+XYxCjLuWVT:8gXt1yRr8zA6POQVh7n+xb11w+XYxC0
Malware Config
Signatures
-
Detect Neshta payload 1 IoCs
resource yara_rule behavioral1/files/0x000800000001211b-26.dat family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 1 IoCs
pid Process 2360 taskhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1700 5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe 1700 5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Task Host = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" 5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Task Host = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" 5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2360 1700 5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe 30 PID 1700 wrote to memory of 2360 1700 5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe 30 PID 1700 wrote to memory of 2360 1700 5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe 30 PID 1700 wrote to memory of 2360 1700 5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe 30 PID 2360 wrote to memory of 3028 2360 taskhost.exe 31 PID 2360 wrote to memory of 3028 2360 taskhost.exe 31 PID 2360 wrote to memory of 3028 2360 taskhost.exe 31 PID 2360 wrote to memory of 3028 2360 taskhost.exe 31 PID 3028 wrote to memory of 2748 3028 cmd.exe 33 PID 3028 wrote to memory of 2748 3028 cmd.exe 33 PID 3028 wrote to memory of 2748 3028 cmd.exe 33 PID 3028 wrote to memory of 2748 3028 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\cmd.execmd.exe /A /C "cmd.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\cmd.execmd.exe4⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.8MB
MD55a431c261a52936fcb11d8c65d6b7838
SHA13fe7ce03fa0b4608a3808fd218dd4f1963d61aef
SHA256b62cd2225131c81d38d26c5bf8e6fd600f0c87312d4cc155a489630de166f8ec
SHA51261f6364e76198ba976f314afbc6e98fdcd199de80bd27583f2fbaa71636f3b02f2acb1defa330d73342dc58de7cc61a1e22779d2a357095242871774bb80166b