Analysis

  • max time kernel
    138s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/10/2024, 03:57

General

  • Target

    818d19a283654fc28837b37384b76644_JaffaCakes118.exe

  • Size

    2.5MB

  • MD5

    818d19a283654fc28837b37384b76644

  • SHA1

    a73de417eb2abe8a33fa32923e65bdb0b0119d12

  • SHA256

    e9bf55e92d9135320416a67d7a90ff616a55b325141f4d792fc64000d679d070

  • SHA512

    70d958d4cddb552a3a9c710474a01aa399a5c62283d6622641956491a9d9a42a3b704e65179ce430c33b3becb317daef4016a900d1e43a77d62d3a4a017ce03b

  • SSDEEP

    49152:/iC/rk62xWNol+5gOsLO66qJ6021cJjLtk4pWGNG5VGFPNqJyoTs9:hrZ23AbsK6Ro022JjL2WEiVqJZy

Malware Config

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\818d19a283654fc28837b37384b76644_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\818d19a283654fc28837b37384b76644_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4336
    • C:\Users\Admin\AppData\Local\Temp\3582-490\818d19a283654fc28837b37384b76644_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\818d19a283654fc28837b37384b76644_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1076
      • \??\c:\77b6283e68248d2b0d5910b9a4334591\UPDATE\update.exe
        c:\77b6283e68248d2b0d5910b9a4334591\UPDATE\update.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:3300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\77b6283e68248d2b0d5910b9a4334591\update\update.exe

    Filesize

    701KB

    MD5

    3b5eaaedb8a9d3f98debbdb0cfd214d5

    SHA1

    c9e09f6f6026f928d3d6d9056af868df83bd44ef

    SHA256

    2e2e9f1ea41d8673bcf69c8c97fc16c22932e2b7807fc87c556516261ea33d99

    SHA512

    26dbaefdedf9ba0094714f65d78b7c68fefc6afbd937cb0322ac698cbf3d104c4ccfbfb671314d6ea98bce2b0c090e2d4a19441d1abc2acb6b143e05818c2b75

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Users\Admin\AppData\Local\Temp\3582-490\818d19a283654fc28837b37384b76644_JaffaCakes118.exe

    Filesize

    2.5MB

    MD5

    342f79337765760ad4e392eb67d5ed2c

    SHA1

    8318455b36ba0a748307459279d46f2f4cdb5a0e

    SHA256

    69b61b2c00323cea3686315617d0f452e205dae10c47e02cbe1ea96fea38f582

    SHA512

    70f32d415c70a97eecf0280ee9e6b10db8f367eecfedd92fca6155a7db19a776d2a96d5fcdbde847036f4d7cf2e69b1d6df6c073025582097f28c71f607b7e12

  • \??\c:\77b6283e68248d2b0d5910b9a4334591\UPDATE\UPDSPAPI.dll

    Filesize

    363KB

    MD5

    ebdb17c673b090a949f17c9e6486aaf3

    SHA1

    2231731f56f803662e0f1d537b22cba7625ef433

    SHA256

    f484cf06e20996e1887b4304b33444f3ee1c03fb912f5ec8d5327c4074a97abb

    SHA512

    b05b2e548c507c2bce556acd43174c2a2743d46ba816896e97a475089237020208c710e25aa204aee40be36cc3c8480da0dc6c383cadf2c619268b48f5e8fe40

  • \??\c:\77b6283e68248d2b0d5910b9a4334591\update\update_win2k.inf

    Filesize

    26KB

    MD5

    6e0bea7e95f32f24524f437396294160

    SHA1

    c18165182e5aa71bf5dc5401357570c54b48a1e9

    SHA256

    249f235710df38dcf59ee7d04fb14e460cd0ce41abd487387ff8cea336eb5b7b

    SHA512

    ec3a1a4cea3e63fc3b61bab9b08fe4a0a6be2f622bcb6fe99ba838fc2bb1cf5f71098776c383fd9cc7f0a9851b8190c6f280914ee54788d13c10613e97cd5f97

  • \??\c:\77b6283e68248d2b0d5910b9a4334591\update\updatebr.inf

    Filesize

    287B

    MD5

    7338506092eba55bd27963ad322cfeae

    SHA1

    0d80de1a2e27128d27bc12c5f9f7a938ef8cb817

    SHA256

    c5b64cce66182b9f35b670be6620dabd2f42ee3c8892eb9ef69bc75b52e5ee81

    SHA512

    bd4632d18b78b5742d428e6acb6a6b6196649cf323f7f4f4eb8d12cdbf4e9a358c93637ea2556cef83fa8e188e1ef1696743b6a25cd0feea5520bf924aa24eca

  • memory/3300-38-0x00000000005C0000-0x000000000061C000-memory.dmp

    Filesize

    368KB

  • memory/4336-124-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4336-142-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4336-144-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB