General

  • Target

    b78011a22cc4226acf52abd21e62f47a_JaffaCakes118

  • Size

    210KB

  • Sample

    241202-jaxj9avqfv

  • MD5

    b78011a22cc4226acf52abd21e62f47a

  • SHA1

    103729da12ada8d53c9bfb36096f73eb258e3683

  • SHA256

    f57655066ebcdaf2124891f3eb14cc6e0a03b82f49343a9ce342bb8d5727df44

  • SHA512

    00ed133830a37357eea70bef9c25f885f92cb4d29bbe8a47c2a543d6c8dc4fd8a9666b70b2a00e36e29cafe25105e8c4ceda16875217ec2bc20004a1c9c6df65

  • SSDEEP

    3072:sr85CEIHIjsTee3hYzmEG69rTeQ4yMx/gfytY0ss2pn7sW7tiosehb1:k9QspRYDZ9NHa6/0sTp7sWZ/h5

Malware Config

Targets

    • Target

      b78011a22cc4226acf52abd21e62f47a_JaffaCakes118

    • Size

      210KB

    • MD5

      b78011a22cc4226acf52abd21e62f47a

    • SHA1

      103729da12ada8d53c9bfb36096f73eb258e3683

    • SHA256

      f57655066ebcdaf2124891f3eb14cc6e0a03b82f49343a9ce342bb8d5727df44

    • SHA512

      00ed133830a37357eea70bef9c25f885f92cb4d29bbe8a47c2a543d6c8dc4fd8a9666b70b2a00e36e29cafe25105e8c4ceda16875217ec2bc20004a1c9c6df65

    • SSDEEP

      3072:sr85CEIHIjsTee3hYzmEG69rTeQ4yMx/gfytY0ss2pn7sW7tiosehb1:k9QspRYDZ9NHa6/0sTp7sWZ/h5

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks