General
-
Target
9c123a09cb57f3b95f8e51a9fc2579a9_JaffaCakes118
-
Size
976KB
-
Sample
241125-rsv35sxnbm
-
MD5
9c123a09cb57f3b95f8e51a9fc2579a9
-
SHA1
8db03484918b05e7c7b0d000aab2220dd4490564
-
SHA256
d1da6ec1ad358e81b983f7fd9aefd36fcdbbd8beaee7b0b81827de2596fa9f2a
-
SHA512
b1937ed3c182794d03292f76eb76deb4bc5bb1428462ded1675be8d0abdd140e9216e2e828dd514884c61ad794583f56f58aede0b96e70f242e56ca1eaa51c0b
-
SSDEEP
24576:Ngc1riyXHE/S1GNiLNjlGDcw30bboJ4ZHPTV9XF7A7:Ngc1uMHB1SiLNpGDcjYJ4ZvPF
Static task
static1
Behavioral task
behavioral1
Sample
9c123a09cb57f3b95f8e51a9fc2579a9_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9c123a09cb57f3b95f8e51a9fc2579a9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
9c123a09cb57f3b95f8e51a9fc2579a9_JaffaCakes118
-
Size
976KB
-
MD5
9c123a09cb57f3b95f8e51a9fc2579a9
-
SHA1
8db03484918b05e7c7b0d000aab2220dd4490564
-
SHA256
d1da6ec1ad358e81b983f7fd9aefd36fcdbbd8beaee7b0b81827de2596fa9f2a
-
SHA512
b1937ed3c182794d03292f76eb76deb4bc5bb1428462ded1675be8d0abdd140e9216e2e828dd514884c61ad794583f56f58aede0b96e70f242e56ca1eaa51c0b
-
SSDEEP
24576:Ngc1riyXHE/S1GNiLNjlGDcw30bboJ4ZHPTV9XF7A7:Ngc1uMHB1SiLNpGDcjYJ4ZvPF
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4