General
-
Target
6b11b480c018db3d190752f413dcea34_JaffaCakes118
-
Size
207KB
-
Sample
241022-swsymatglm
-
MD5
6b11b480c018db3d190752f413dcea34
-
SHA1
c5bda4ff1039ace81893626880d0de15dafb5d24
-
SHA256
d35deac38fe5b4f3fb1bef78c8df6b894305c23d23609a9708047ed2372771fd
-
SHA512
8ce222be31cdd882b92689ac226dcd59ed1db64f944d86a3d6a299e51da055af7a760a33905decde6d89d1054cd5538f4e56d7174ca0910a0171ec33215e6453
-
SSDEEP
3072:sr85C59pKkkA7M0IrB5STqt4E3EgjP/NUCBe57LX2oqiIVYzIAa8aLapQKCxnIg9:k9UxFkOt45gjPliai5zIAara6vF
Behavioral task
behavioral1
Sample
6b11b480c018db3d190752f413dcea34_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
6b11b480c018db3d190752f413dcea34_JaffaCakes118
-
Size
207KB
-
MD5
6b11b480c018db3d190752f413dcea34
-
SHA1
c5bda4ff1039ace81893626880d0de15dafb5d24
-
SHA256
d35deac38fe5b4f3fb1bef78c8df6b894305c23d23609a9708047ed2372771fd
-
SHA512
8ce222be31cdd882b92689ac226dcd59ed1db64f944d86a3d6a299e51da055af7a760a33905decde6d89d1054cd5538f4e56d7174ca0910a0171ec33215e6453
-
SSDEEP
3072:sr85C59pKkkA7M0IrB5STqt4E3EgjP/NUCBe57LX2oqiIVYzIAa8aLapQKCxnIg9:k9UxFkOt45gjPliai5zIAara6vF
-
Detect Neshta payload
-
Modifies firewall policy service
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1