Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2024, 01:47
Behavioral task
behavioral1
Sample
5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe
-
Size
8.8MB
-
MD5
5a431c261a52936fcb11d8c65d6b7838
-
SHA1
3fe7ce03fa0b4608a3808fd218dd4f1963d61aef
-
SHA256
b62cd2225131c81d38d26c5bf8e6fd600f0c87312d4cc155a489630de166f8ec
-
SHA512
61f6364e76198ba976f314afbc6e98fdcd199de80bd27583f2fbaa71636f3b02f2acb1defa330d73342dc58de7cc61a1e22779d2a357095242871774bb80166b
-
SSDEEP
49152:ohPg95YC1yRr5R+jzA66ymAu1Rx48D9d5VGoemckeh7ns3xHzX11w+XYxCjLuWVT:8gXt1yRr8zA6POQVh7n+xb11w+XYxC0
Malware Config
Signatures
-
Detect Neshta payload 1 IoCs
resource yara_rule behavioral2/files/0x000b000000023b7b-27.dat family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 1 IoCs
pid Process 1888 taskhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Task Host = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" 5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Task Host = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" 5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1888 1940 5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe 86 PID 1940 wrote to memory of 1888 1940 5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe 86 PID 1940 wrote to memory of 1888 1940 5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe 86 PID 1888 wrote to memory of 3708 1888 taskhost.exe 88 PID 1888 wrote to memory of 3708 1888 taskhost.exe 88 PID 1888 wrote to memory of 3708 1888 taskhost.exe 88 PID 3708 wrote to memory of 4936 3708 cmd.exe 90 PID 3708 wrote to memory of 4936 3708 cmd.exe 90 PID 3708 wrote to memory of 4936 3708 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5a431c261a52936fcb11d8c65d6b7838_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.execmd.exe /A /C "cmd.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\cmd.execmd.exe4⤵
- System Location Discovery: System Language Discovery
PID:4936
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.8MB
MD55a431c261a52936fcb11d8c65d6b7838
SHA13fe7ce03fa0b4608a3808fd218dd4f1963d61aef
SHA256b62cd2225131c81d38d26c5bf8e6fd600f0c87312d4cc155a489630de166f8ec
SHA51261f6364e76198ba976f314afbc6e98fdcd199de80bd27583f2fbaa71636f3b02f2acb1defa330d73342dc58de7cc61a1e22779d2a357095242871774bb80166b