Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    31-10-2024 02:59

General

  • Target

    81555d120344163daa24d0242ac75d18_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    81555d120344163daa24d0242ac75d18

  • SHA1

    17e3a6f2eb281d5818dccc73f381f99b99c0d578

  • SHA256

    6a26268020115aa0c16fc5a95641a708bbdc1bdcd672a84a642ad0e0ef82304c

  • SHA512

    360f7a2c6176796be001fcd1fda9d96821bf9a1e5be21a97ab15faa54b3a2de8df57a6d9b179c4e87f168eeea861041ecf587ca465c9b9dafa12df35b20fd21f

  • SSDEEP

    12288:zajhG8acPbGRvhEazknKZjbpUwhBMy+49U+pnz15n:zajhhavF2yZvuAzXn

Malware Config

Signatures

  • Detect Neshta payload 6 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81555d120344163daa24d0242ac75d18_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\81555d120344163daa24d0242ac75d18_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Users\Admin\AppData\Local\Temp\ESLWireSetup-1.11.1.7324.exe
      "C:\Users\Admin\AppData\Local\Temp\ESLWireSetup-1.11.1.7324.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Users\Admin\AppData\Local\Temp\3582-490\ESLWireSetup-1.11.1.7324.exe
        "C:\Users\Admin\AppData\Local\Temp\3582-490\ESLWireSetup-1.11.1.7324.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\ESLWireSetup-1.11.1.7324.exe

    Filesize

    774KB

    MD5

    7b01774d6a69ba05c68e3c1fb81cf558

    SHA1

    6338504b843ba7efc91eabe9e473d45d8bc9a4c7

    SHA256

    2e3fbf06a011aa2cba62866d7d2a64567f3e3e8073a22272bdababe4910230b4

    SHA512

    5e7f2ff359536073a67cca7e23f90bd827ac07d4612fdee8dc7db18bf4bb7fccbaf604a4ab07beca2ded625b7285db2bc7d1bd6ed54ce7ec5e018c8102a59fbd

  • C:\Users\Admin\AppData\Local\Temp\ufr_reports\NO_PWDS_report_31-10-2024_03-21-13-747666BA-EJLG.bin

    Filesize

    1KB

    MD5

    4ad5ea20fcbe72a1a989983dfced012b

    SHA1

    9c986e04c9687b533bbccf23e0d221b1a7d03edb

    SHA256

    e36ec7707b17cd56bd109a1e7d12ed785554a5665d91d3db0c96a36359d0c303

    SHA512

    5ce3b1666fc192fe43f675fd0139dc29590ceeea42704c190dba4217ec16f021f3fb2348070cf5b68d1357dbfafa769aaa665444bf67063515df4263fe420380

  • C:\Windows\svchost.com

    Filesize

    40KB

    MD5

    eaf09f196bb4285ecfa6f14f2f639a75

    SHA1

    a3d4b012aa604d0d89654db84d4a48232f30f2c4

    SHA256

    9e09bdc7ed532b5eeeeb54c0d3b92406ec4e31e783079bbe1b09ba885d32b4ec

    SHA512

    76dae06e2618f278653684713af5bb87a02e03c609c86b71c560d863529d30e3d84ababc0ee234e0e86a5f9f0eb972d6cd2a38a4a765cfeafa4d3cd55e348df8

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\ESLWireSetup-1.11.1.7324.exe

    Filesize

    814KB

    MD5

    f040339eb9ddf194b45093319f151567

    SHA1

    18e87072f7a900c873320fecce54c355460b03d7

    SHA256

    290f7201434f550ca6276550f1c10bab543fa7454775cf2f5817328e91beba8b

    SHA512

    adbae3836a101bac87a3a79b6a0cc548555aa85efee218c66e38c3a351f20da3975fa2cf2228fee4d134e2e1575060db5dfc08fd665803161171d773ba42a5d8

  • memory/2860-113-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2860-115-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2992-0-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/2992-5-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/2992-111-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB