Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2024 14:09
Static task
static1
Behavioral task
behavioral1
Sample
5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe
-
Size
235KB
-
MD5
5d02893481bbd7a7cf0be949532e45bb
-
SHA1
d68e6e40e484a5688195ab3bb90a1050806ce37f
-
SHA256
d9a2a4eae9292fc6782abf67b158706bee53503370c46751f21d62b3694054e5
-
SHA512
7de51392e20056b12afdda240234fe23eb8e12bc1ddf441ff0fcba51a4de21b64e425f6153705b5f93c270f077f8d01b39446fa479cafdff8556c9917fc17a75
-
SSDEEP
6144:jyH7xOc6H5c6HcT66vlmrASraT1D8rgzPDkAVHSyH7xOc6H5c6HcT66vlmqAjUei:jazT1LMxa0Ieni
Malware Config
Signatures
-
Detect Neshta payload 5 IoCs
Processes:
resource yara_rule behavioral2/files/0x000a000000023b55-8.dat family_neshta behavioral2/files/0x000400000002035f-33.dat family_neshta behavioral2/memory/1880-116-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1880-118-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1880-121-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe -
Executes dropped EXE 6 IoCs
Processes:
svchost.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exesvchost.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exesvchost.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exepid Process 3808 svchost.exe 1880 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 5108 svchost.exe 3352 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 4308 svchost.exe 812 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
svchost.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exedescription ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe svchost.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe svchost.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe svchost.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
Processes:
5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exedescription ioc Process File opened for modification C:\Windows\svchost.com 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File created C:\Windows\svchost.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File created C:\Windows\svchost.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exesvchost.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe -
Modifies registry class 1 IoCs
Processes:
5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exepid Process 812 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exesvchost.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exesvchost.exedescription pid Process procid_target PID 4716 wrote to memory of 3808 4716 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 84 PID 4716 wrote to memory of 3808 4716 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 84 PID 4716 wrote to memory of 3808 4716 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 84 PID 3808 wrote to memory of 1880 3808 svchost.exe 85 PID 3808 wrote to memory of 1880 3808 svchost.exe 85 PID 3808 wrote to memory of 1880 3808 svchost.exe 85 PID 1880 wrote to memory of 3352 1880 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 89 PID 1880 wrote to memory of 3352 1880 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 89 PID 1880 wrote to memory of 3352 1880 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 89 PID 3352 wrote to memory of 4308 3352 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 90 PID 3352 wrote to memory of 4308 3352 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 90 PID 3352 wrote to memory of 4308 3352 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 90 PID 4308 wrote to memory of 812 4308 svchost.exe 92 PID 4308 wrote to memory of 812 4308 svchost.exe 92 PID 4308 wrote to memory of 812 4308 svchost.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3582-490\5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:812
-
-
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD539c8a4c2c3984b64b701b85cb724533b
SHA1c911f4c4070dfe9a35d9adcb7de6e6fb1482ce00
SHA256888a1dd0033e5d758a4e731e3e55357de866e80d03b1b194375f714e1fd4351d
SHA512f42ca2962fe60cff1a13dea8b81ff0647b317c785ee4f5159c38487c34d33aecba8478757047d31ab2ee893fbdcb91a21655353456ba6a018fc71b2278db4db2
-
Filesize
159KB
MD54c1366320f27ddfcf6aa1b4266fc16fe
SHA11d14dfaba4495d77e99f1d4c0773177247dfce1d
SHA256cd36df160a464ba3abcfc3d010aae9cc913f29f76878ae38e75eefe1e49c593e
SHA512126b8edf27d9908b13cf90487fd66d3031dde842f5bc1063b6c57f3894c4ac1281f9b54614e75031be77dc9c6b149749003e9b568df9e5dd6bd15b41324cb149
-
Filesize
124KB
MD552cc826a4cf23d5bbf7534f1b30d0bab
SHA1663b42d847db8ee8ca4d23c7a6f7a5357e055a52
SHA2567cfdae4ec5b8c4ab16ff1433fcc1a82d925dd79e36c5a01d24b47ca277f1ef55
SHA512fc03d351cda0e7e5f6112b8a6b4e061df02b7117d0a4f5dcefe12fe5908b0c0c660338055d59ee8cfe70d82f55aa981dbe02dd5d14a70cc813426af6f7fa4eac
-
Filesize
200KB
MD538eead83b531a5b5f22d7ddc2264546a
SHA133548c66f43f4eb79e1abef0c9b132c55ca91b40
SHA2564393a0032b1f3aed3c70947c79894132f5f5a85214d8bac9dfac90ee1a9ad13a
SHA5122a73045ff2685789cbbc176169c9e54c67012b25f479cbea56395c25f11887ff7bd238a0a4ef17554aa3c73e537bbf3308e0b86322571094337dd701dab4f1cc
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b