Analysis

  • max time kernel
    148s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2024 22:29

General

  • Target

    cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe

  • Size

    282KB

  • MD5

    cf5a4bee46486ec885a34bcc9ef5092e

  • SHA1

    c77dce44f41d6310ecdb41054e7c20b8c0aec4b0

  • SHA256

    5df5cd54d3d5adf1791a570d7c4436f2f4ef98c0dd08f36b2c08088fdda21734

  • SHA512

    7190e34cdbe25e8373bd62d7409ea1a109e7ea71335fb041e8b309a8b50932c0d165a874d26be53e9424e64c673f2e4a9cf05d3400c2d1f7e3f99718a644a1a1

  • SSDEEP

    6144:byH7xOc6H5c6HcT66vlmrX5ZQIRvRLfUePSeqpFyH7xOc6H5c6HcT66vlmrl8uyF:baA5ZvRvRIePSHaQBePSO

Malware Config

Signatures

  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Users\Admin\AppData\Local\Temp\cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system executable filetype association
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:2376
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe

    Filesize

    1.1MB

    MD5

    15e2192b38b8c6162f477113b8ce027d

    SHA1

    673074054a49a25e9baf6fe2fc7cf8cfc8ae110a

    SHA256

    4a20c212912cb30990048b595bb1bd396672200f97518e01cc810d4566bb3a52

    SHA512

    d2427b1c786c13723697f55377a12be0a9cf097d01fd6ec16ec5777e79cc0a1234d5f82d52705e7a9b4a73815e0ce097d2ee39d90317b9fc776cffb15736065a

  • C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE

    Filesize

    894KB

    MD5

    f7d9ee5b08e86d51f8fe8afd7011b86f

    SHA1

    9c87138e009c692ee3bce15c88c1b9e8acacefd0

    SHA256

    96040f390167ae9818001a022d666c38799aed314c45f9e124113d235c901470

    SHA512

    93a492c335b07484b78c6a7500af46c1748efa52695c337202fbf93506fbb34a1161c489aac9fd4d0a13d09bbb9c50e94fc6c8acabb89a74a766681c8f0820db

  • C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe

    Filesize

    542KB

    MD5

    5edcee2be2fc514bab6a5fd3de3a1aa6

    SHA1

    d823abdeebbeef3cb280338ffdb3abc2f7102a33

    SHA256

    f4c92b8b49285faea48d7267222631c117ae0f5f822b8ed9cac0161fca14abd6

    SHA512

    3281e91bb6ac66baf1a1d47336473935382ac081a5f1f82c683e1ca4d76e6cf73ec9b5496dcb9314df4293f7c39b465ff117be9b2a1e37272f5649d92118e2fc

  • C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe

    Filesize

    583KB

    MD5

    f67c4e29f4253d997621dcc0754ff716

    SHA1

    abf046bae1a925baa7e15559de12da615fb0aec1

    SHA256

    da2d0decf516879ccd5edb041b2134759bf4baf4f518bf99b32c1a9af83efc13

    SHA512

    8cb61ab1e327b1d8826981bf67de6307e5c2c73387a5fc7ff13ee1d0172509add336f1756b45f65988ca69e31faceb12899b78b5de59ead8c5e09a3a9baff422

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • \MSOCache\ALLUSE~1\{9A861~1\ose.exe

    Filesize

    145KB

    MD5

    9d10f99a6712e28f8acd5641e3a7ea6b

    SHA1

    835e982347db919a681ba12f3891f62152e50f0d

    SHA256

    70964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc

    SHA512

    2141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe

    Filesize

    247KB

    MD5

    9810b10c26fab0862560c713bf9cd760

    SHA1

    7308d32abe1db1bbc5c5fd509f87e7ec9907981a

    SHA256

    3d61ab5be27b57aef627faf3205c39a59dfac49ae31120ddc1c2cdaecc3bd75e

    SHA512

    29d3d629a0758f85eb84422ee901647f21dcdafc3d98b854425f78ce5a3c589a1c271b3bc6f94585c39642b6d453c1a8fc5cc44ef898a4ca75574607e9844b22

  • memory/1452-5-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1772-20-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2376-107-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2376-104-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2508-105-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2508-121-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB