Analysis
-
max time kernel
148s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 22:29
Static task
static1
Behavioral task
behavioral1
Sample
cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe
-
Size
282KB
-
MD5
cf5a4bee46486ec885a34bcc9ef5092e
-
SHA1
c77dce44f41d6310ecdb41054e7c20b8c0aec4b0
-
SHA256
5df5cd54d3d5adf1791a570d7c4436f2f4ef98c0dd08f36b2c08088fdda21734
-
SHA512
7190e34cdbe25e8373bd62d7409ea1a109e7ea71335fb041e8b309a8b50932c0d165a874d26be53e9424e64c673f2e4a9cf05d3400c2d1f7e3f99718a644a1a1
-
SSDEEP
6144:byH7xOc6H5c6HcT66vlmrX5ZQIRvRLfUePSeqpFyH7xOc6H5c6HcT66vlmrl8uyF:baA5ZvRvRIePSHaQBePSO
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 3 IoCs
pid Process 1772 svchost.exe 2376 cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe 2508 svchost.exe -
Loads dropped DLL 5 IoCs
pid Process 1772 svchost.exe 1772 svchost.exe 2376 cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe 2376 cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe 2376 cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE svchost.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Windows\svchost.com cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1452 wrote to memory of 1772 1452 cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe 30 PID 1452 wrote to memory of 1772 1452 cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe 30 PID 1452 wrote to memory of 1772 1452 cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe 30 PID 1452 wrote to memory of 1772 1452 cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe 30 PID 1772 wrote to memory of 2376 1772 svchost.exe 31 PID 1772 wrote to memory of 2376 1772 svchost.exe 31 PID 1772 wrote to memory of 2376 1772 svchost.exe 31 PID 1772 wrote to memory of 2376 1772 svchost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2376
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD515e2192b38b8c6162f477113b8ce027d
SHA1673074054a49a25e9baf6fe2fc7cf8cfc8ae110a
SHA2564a20c212912cb30990048b595bb1bd396672200f97518e01cc810d4566bb3a52
SHA512d2427b1c786c13723697f55377a12be0a9cf097d01fd6ec16ec5777e79cc0a1234d5f82d52705e7a9b4a73815e0ce097d2ee39d90317b9fc776cffb15736065a
-
Filesize
894KB
MD5f7d9ee5b08e86d51f8fe8afd7011b86f
SHA19c87138e009c692ee3bce15c88c1b9e8acacefd0
SHA25696040f390167ae9818001a022d666c38799aed314c45f9e124113d235c901470
SHA51293a492c335b07484b78c6a7500af46c1748efa52695c337202fbf93506fbb34a1161c489aac9fd4d0a13d09bbb9c50e94fc6c8acabb89a74a766681c8f0820db
-
Filesize
542KB
MD55edcee2be2fc514bab6a5fd3de3a1aa6
SHA1d823abdeebbeef3cb280338ffdb3abc2f7102a33
SHA256f4c92b8b49285faea48d7267222631c117ae0f5f822b8ed9cac0161fca14abd6
SHA5123281e91bb6ac66baf1a1d47336473935382ac081a5f1f82c683e1ca4d76e6cf73ec9b5496dcb9314df4293f7c39b465ff117be9b2a1e37272f5649d92118e2fc
-
Filesize
583KB
MD5f67c4e29f4253d997621dcc0754ff716
SHA1abf046bae1a925baa7e15559de12da615fb0aec1
SHA256da2d0decf516879ccd5edb041b2134759bf4baf4f518bf99b32c1a9af83efc13
SHA5128cb61ab1e327b1d8826981bf67de6307e5c2c73387a5fc7ff13ee1d0172509add336f1756b45f65988ca69e31faceb12899b78b5de59ead8c5e09a3a9baff422
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
145KB
MD59d10f99a6712e28f8acd5641e3a7ea6b
SHA1835e982347db919a681ba12f3891f62152e50f0d
SHA25670964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc
SHA5122141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
247KB
MD59810b10c26fab0862560c713bf9cd760
SHA17308d32abe1db1bbc5c5fd509f87e7ec9907981a
SHA2563d61ab5be27b57aef627faf3205c39a59dfac49ae31120ddc1c2cdaecc3bd75e
SHA51229d3d629a0758f85eb84422ee901647f21dcdafc3d98b854425f78ce5a3c589a1c271b3bc6f94585c39642b6d453c1a8fc5cc44ef898a4ca75574607e9844b22