Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2024, 21:11
Static task
static1
Behavioral task
behavioral1
Sample
676cc53b7a5a82fae31a378d21a81bb5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
676cc53b7a5a82fae31a378d21a81bb5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
676cc53b7a5a82fae31a378d21a81bb5_JaffaCakes118.exe
-
Size
13.2MB
-
MD5
676cc53b7a5a82fae31a378d21a81bb5
-
SHA1
e29470049a2a57409990e9b8d6c84f59f915647a
-
SHA256
44e8a04b410256c9201da884a6582771e0c0394729f85ac6a7cc1ae96a4ab8fa
-
SHA512
745b80524c2a2bb829e5aff480ef27c777b8d13848f08c3764a4b7a7468c46417094bd571b73987e364ee19ed0eacd27610d724f130de2d136c91540059e5800
-
SSDEEP
393216:5wk1j7BMh3WP+vBXKvPcZe9DGHpld97fapVZBX:vfBMh3Z0M6OlWpVZBX
Malware Config
Signatures
-
Detect Neshta payload 4 IoCs
resource yara_rule behavioral2/files/0x0007000000023ca8-190.dat family_neshta behavioral2/memory/900-324-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/900-373-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/900-380-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 676cc53b7a5a82fae31a378d21a81bb5_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation WindowsDoctor.exe -
Executes dropped EXE 2 IoCs
pid Process 900 WindowsDoctor.exe 4116 WindowsDoctor.exe -
Loads dropped DLL 15 IoCs
pid Process 4116 WindowsDoctor.exe 4116 WindowsDoctor.exe 4116 WindowsDoctor.exe 4116 WindowsDoctor.exe 4116 WindowsDoctor.exe 4116 WindowsDoctor.exe 4116 WindowsDoctor.exe 4116 WindowsDoctor.exe 4116 WindowsDoctor.exe 4116 WindowsDoctor.exe 4116 WindowsDoctor.exe 4116 WindowsDoctor.exe 4116 WindowsDoctor.exe 4116 WindowsDoctor.exe 4116 WindowsDoctor.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" WindowsDoctor.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe WindowsDoctor.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe WindowsDoctor.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe WindowsDoctor.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe WindowsDoctor.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe WindowsDoctor.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe WindowsDoctor.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe WindowsDoctor.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe WindowsDoctor.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe WindowsDoctor.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe WindowsDoctor.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe WindowsDoctor.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe WindowsDoctor.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe WindowsDoctor.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe WindowsDoctor.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe WindowsDoctor.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe WindowsDoctor.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe WindowsDoctor.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe WindowsDoctor.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe WindowsDoctor.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe WindowsDoctor.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE WindowsDoctor.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe WindowsDoctor.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com WindowsDoctor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 676cc53b7a5a82fae31a378d21a81bb5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsDoctor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsDoctor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language WindowsDoctor.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage WindowsDoctor.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" WindowsDoctor.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4116 WindowsDoctor.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4116 WindowsDoctor.exe 4116 WindowsDoctor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2112 wrote to memory of 900 2112 676cc53b7a5a82fae31a378d21a81bb5_JaffaCakes118.exe 87 PID 2112 wrote to memory of 900 2112 676cc53b7a5a82fae31a378d21a81bb5_JaffaCakes118.exe 87 PID 2112 wrote to memory of 900 2112 676cc53b7a5a82fae31a378d21a81bb5_JaffaCakes118.exe 87 PID 900 wrote to memory of 4116 900 WindowsDoctor.exe 89 PID 900 wrote to memory of 4116 900 WindowsDoctor.exe 89 PID 900 wrote to memory of 4116 900 WindowsDoctor.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\676cc53b7a5a82fae31a378d21a81bb5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\676cc53b7a5a82fae31a378d21a81bb5_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\WindowsDoctor.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\WindowsDoctor.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\WindowsDoctor.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\WindowsDoctor.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4116
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.7MB
MD5115b0f9604aae86ad1bcccf037ce21bc
SHA1ecba2c9221ad930a979f3a2c1627de89581a5bd7
SHA256bc693dead66949834bead259e2076fca6fc2ee3405228eb0c793d7b7b6bb3d0f
SHA512fa91ec2020d461ce7c8fcae91c0d542ad06ae9a16662e95756d75964f44ada2c30eb5c9b37d9a45814b8fd514648c5667128817548758f8fcbf1088faf93ca37
-
Filesize
624KB
MD54ed3bb75a1f78f8afabeedfaeb37c7a7
SHA134f36856c2a0f7974bf64cdc4a566125003da290
SHA25699a09c3532875e89d4c1a414a98b967debba667068a08f3d948d13cfd079fabc
SHA51290b683172e3f9d74bef51c5be088bedbc101ff17aaf76799790264db90bf30e46955cea6d716dd761c9e7dcba78e664f94f759c0a0df410ca929b9bd55cd3be6
-
Filesize
670KB
MD58862e6ffad755d3e988068ad27131689
SHA16b6bfcf83f9401cb10e4c0e907d08b930bc02d4f
SHA2567b8fd72598d854fbbf7227529e0cd4b9e1eabc2008c34d9d0d1c758c959f3147
SHA5129738f8202a744f6d7ec3af5d2be42b9f3d0efa1617e3d02417c3a68d8437ad477c59e40677c3ee19bfe258cda4b1ee9638af1f31b28a8800954c947b074e3c0a
-
Filesize
212KB
MD5afd2cca9d569691e070ebc9efd0e2495
SHA1e86d4bc885665ac149acc2c4dd8f5fe2b5e2645c
SHA2568271f5207fe344fe24a051796efad9eec85d9873a7e360c6a85206a3f4e3e1e9
SHA512c324f674879da42a66de311b602e9b92f481c863b40f2ee7add2bf78d6dd73c6507eacc94cadc5271880c3d938717a0099709f5bdda75e1fa7ee26569999047a
-
Filesize
469KB
MD599c96614b68cfe9e4a7857c7fbea44bd
SHA10c5635f5db15190b0aae1dab471f4c6455d5779b
SHA2563e4f391415804c2bf628e61bea5f4db82aa56652d4c4c36634ccae1ed9623495
SHA51283d98f1146389748f3142e28810cf319d4c8cbaf67a3a57ca633fbd869ce4b926175af3541a00191794852c29b469ec0b4df70db9d8082f79c44b576249221ba
-
Filesize
528KB
MD5ed42a565477ec8a86cb89ef2f758d725
SHA1737d6a64d99859b64e2a3c338f7a750dee9a0558
SHA256cd0739510d104d9c655963612d817ca9901bf16088f1cc5361a2324d800fe0c3
SHA512502c1442c00a220523a6b6aab514501854f6fe3617016dc6a894ec214657c7923c635e31fe33b89ad6dbb20203fa417f6841915ca407fdf6eeff4c08fbee50cb
-
Filesize
396KB
MD55d7d5d96a066f50c1b077ade316a0eae
SHA1fef636900828a2b1887cb3b5a11c6802d4a62b0d
SHA256dba672c5c35835aa12a9146289de086cb928a2c7ea91ff9338a5fd7e02b3f02e
SHA51292a38dabfdbea0329aec0a78cedbd54760e19fb1d8934d530a648bb1c7b6237b501dd35f34beaaaf967df40165bbd2ec18ee735a587dad6878d5d74b34759da2
-
Filesize
5.7MB
MD54df91e23f166d05bb2a1cf0733324659
SHA1eccb99b86233876b43724abb787336bde3872186
SHA256b47a23642d4d4f0b485ee1875322f00536f8db587e4f3a2de85242c0af33a746
SHA512b44fe2618ce03df3c4c84054e30cc7de37255bea4d295915faa5419b2b93bde2a67a3f187342f4d7d4ef1fb9d4f8a6ce882b9f8dc1b26db848f64c0b5575e6b3
-
Filesize
277KB
MD5b67e3f8474ec139fc500e60536b85ac8
SHA1e7acdbf1796ccee497058e94d301903348f593cc
SHA25697778cd760976dd2d5dc3e518468c7930b9ee142ed019d19822f7ffd6189975e
SHA512765f441936ead9e9981982df027ea05260c62d208e942a5574fa8c196f4c0e31c596c4713811c38469cae7794be1537cce5c48732ced6fbe97c690efdb463bb4
-
Filesize
640KB
MD5175d1c7ad2e5e666f5c008f016675c7b
SHA119496b86550e2277359b0d18e65d8816ad564a50
SHA2569c3d290d98f1b078b7bbe7aa512d2d589bf19d14c542287a89076b0704fd77f7
SHA5121911126e68b8c75a4a9239d96b2661f8e5be0e3834e0bd5419ea5ce824e14685c781e3c750d79ec1ca23398b99def74a7657289c7822d5e16ba9ef798b814983