Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 22:29
Static task
static1
Behavioral task
behavioral1
Sample
cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe
-
Size
282KB
-
MD5
cf5a4bee46486ec885a34bcc9ef5092e
-
SHA1
c77dce44f41d6310ecdb41054e7c20b8c0aec4b0
-
SHA256
5df5cd54d3d5adf1791a570d7c4436f2f4ef98c0dd08f36b2c08088fdda21734
-
SHA512
7190e34cdbe25e8373bd62d7409ea1a109e7ea71335fb041e8b309a8b50932c0d165a874d26be53e9424e64c673f2e4a9cf05d3400c2d1f7e3f99718a644a1a1
-
SSDEEP
6144:byH7xOc6H5c6HcT66vlmrX5ZQIRvRLfUePSeqpFyH7xOc6H5c6HcT66vlmrl8uyF:baA5ZvRvRIePSHaQBePSO
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 2380 svchost.exe 2068 cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe 1740 svchost.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe svchost.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe svchost.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe File opened for modification C:\Windows\svchost.com cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2380 2884 cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe 83 PID 2884 wrote to memory of 2380 2884 cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe 83 PID 2884 wrote to memory of 2380 2884 cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe 83 PID 2380 wrote to memory of 2068 2380 svchost.exe 84 PID 2380 wrote to memory of 2068 2380 svchost.exe 84 PID 2380 wrote to memory of 2068 2380 svchost.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cf5a4bee46486ec885a34bcc9ef5092e_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2068
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD503f4faf62b95458458bf7f9f99853fbf
SHA11586238cd2d8cfb8ead9d6009f0164f3dcb43480
SHA2568859a64eec279742403efaa0adfc0580d97b616ad05c9eaa139a78e4824901a8
SHA512d8f179d8b414feb16333642bd5b9b056d0357cf4ee720c8735b0b06fe7e51d8632329b32f777052f70a77735a57631472dc2bb434b67e57c141b989cb69060d4
-
Filesize
247KB
MD59810b10c26fab0862560c713bf9cd760
SHA17308d32abe1db1bbc5c5fd509f87e7ec9907981a
SHA2563d61ab5be27b57aef627faf3205c39a59dfac49ae31120ddc1c2cdaecc3bd75e
SHA51229d3d629a0758f85eb84422ee901647f21dcdafc3d98b854425f78ce5a3c589a1c271b3bc6f94585c39642b6d453c1a8fc5cc44ef898a4ca75574607e9844b22
-
Filesize
40KB
MD5e670f44a849dbb9aed35fca3199748ac
SHA115c28fdff201678ade6d03e410671b6a44a95a1e
SHA256fdef4676d98ac1b29431af4f843a9dd5268f4bc539acff19a232cfba409eef19
SHA512d76817fe47ab062dbdcaf34b393ba8c30f351eaafd32497a29fbaf4f2a2cd602417a2bd986f475a3cffdebead2ffa4466ac4ad2de23525d693d73091330500d9
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b