Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-01-2025 21:44

General

  • Target

    JaffaCakes118_6866eee9cb71f0f645d6f2272d96c760.exe

  • Size

    887KB

  • MD5

    6866eee9cb71f0f645d6f2272d96c760

  • SHA1

    b21e9aafefe4075105c57fbe29ffd0a265aed363

  • SHA256

    8a07690ab92973d54e970c0e2ca59e2dc6b25558c5d055ea7f095237cb6119e1

  • SHA512

    9c7137d87ac57936b03e330da8492b09fa4b52e7ac1d54812054ce22a41a6eef23da8e2c005b9ac33b8a1924a7fc2e72c8bd11c5f225309fbbff7384df90cd04

  • SSDEEP

    24576:RBtolXsxkvJu9WAF+QCJifGz9g0AksafgEHEjE7:VoFAF+zJifGzi0AksQHq

Malware Config

Signatures

  • Detect Neshta payload 6 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    PID:3464
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6866eee9cb71f0f645d6f2272d96c760.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6866eee9cb71f0f645d6f2272d96c760.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Users\Admin\AppData\Roaming\fingSTAT\certcher.exe
        "C:\Users\Admin\AppData\Roaming\fingSTAT"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2632
        • C:\Users\Admin\AppData\Local\Temp\~8388.tmp
          3464 249352 2632 1
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2600
      • C:\Users\Admin\AppData\Local\Temp\~83B7.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\~83B7.tmp.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system executable filetype association
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3192
  • C:\Windows\SysWOW64\cleaysvr.exe
    C:\Windows\SysWOW64\cleaysvr.exe -s
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\~83B7.tmp.exe

    Filesize

    1.1MB

    MD5

    fb07be5b6ccee14e86467e496ab0897a

    SHA1

    62fd9a19766e933505bb854e5eccd1b170c48cda

    SHA256

    1f52e2a86e7da624c350397c099c51bd5b885a3875adcc3f6c354d1b68abcf4c

    SHA512

    821634d26378f1af0c470eed726db87c5147e0eb9cd4b0411e85ab2180ec625a5bba2c457dd333d3dfb07a872e8542eae5c3fa576ef29fc6a7188718df17443b

  • C:\Users\Admin\AppData\Local\Temp\zni84FF.tmp

    Filesize

    172KB

    MD5

    685f1cbd4af30a1d0c25f252d399a666

    SHA1

    6a1b978f5e6150b88c8634146f1406ed97d2f134

    SHA256

    0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

    SHA512

    6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

  • C:\Users\Admin\AppData\Local\Temp\~8388.tmp

    Filesize

    8KB

    MD5

    aac3165ece2959f39ff98334618d10d9

    SHA1

    020a191bfdc70c1fbd3bf74cd7479258bd197f51

    SHA256

    96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974

    SHA512

    9eb876812a6a13dd4b090788c2b1d9e9a2e25370598ed5c040f82e6f378edc4b78d58bc8f60d5a559ea57b1edcf3a144bfe09454a9928997173db8279d5b40cf

  • C:\Users\Admin\AppData\Local\Temp\~83B7.tmp.exe

    Filesize

    1.1MB

    MD5

    2a552a0bb277dc4adc5f24873b825f0e

    SHA1

    54121dd4e6280fc9084e83cf7405dd32a1f9c629

    SHA256

    0ada262345e4a4d82f7c2e3a612a16ac67628e4f8acd5d6d9ccc2ec49a2afb53

    SHA512

    8b077cd7543b3cd1f7c2fa78bf0fd02c392da2c4c78e590db12b0f7c4348ba75a6c2b3fe27fae38d273c8a3a4ecca6ac9e8426be287199abad6da12aec8c66dc

  • C:\Users\Admin\AppData\Roaming\fingSTAT\certcher.exe

    Filesize

    243KB

    MD5

    435513984dbe9a93b9609bbf69fea707

    SHA1

    5836e60c0441c7a8dbb426a78639f3e8a88f43e6

    SHA256

    80421f33a143bf310ff292cd4a2e1cfe0a7d997f28ac8532bbab7c6f7314aa0c

    SHA512

    e8d1165d0e10897acaa9d9f6af078b6237b2781c2286f835091c99bfc0b08e613ebe1cfa3519ee3717ae903a6ac7bd323db22ab63e9fdc840d5f7029f12a9659

  • memory/1732-54-0x0000000001420000-0x0000000001426000-memory.dmp

    Filesize

    24KB

  • memory/1732-22-0x0000000000F80000-0x0000000000FC6000-memory.dmp

    Filesize

    280KB

  • memory/1732-29-0x00000000014B0000-0x00000000014B6000-memory.dmp

    Filesize

    24KB

  • memory/1732-28-0x0000000001420000-0x0000000001426000-memory.dmp

    Filesize

    24KB

  • memory/1732-24-0x0000000001420000-0x0000000001426000-memory.dmp

    Filesize

    24KB

  • memory/2632-9-0x0000000000BB0000-0x0000000000BB6000-memory.dmp

    Filesize

    24KB

  • memory/2632-8-0x0000000000800000-0x0000000000846000-memory.dmp

    Filesize

    280KB

  • memory/3192-37-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/3192-42-0x0000000002090000-0x0000000002103000-memory.dmp

    Filesize

    460KB

  • memory/3192-141-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/3192-142-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/3192-143-0x0000000002090000-0x0000000002103000-memory.dmp

    Filesize

    460KB

  • memory/3192-144-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/3192-147-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/3192-149-0x0000000002090000-0x0000000002103000-memory.dmp

    Filesize

    460KB

  • memory/3464-14-0x0000000003000000-0x000000000304C000-memory.dmp

    Filesize

    304KB

  • memory/3464-26-0x00000000030C0000-0x00000000030CD000-memory.dmp

    Filesize

    52KB

  • memory/3464-23-0x0000000003000000-0x000000000304C000-memory.dmp

    Filesize

    304KB

  • memory/3464-25-0x0000000003060000-0x0000000003066000-memory.dmp

    Filesize

    24KB

  • memory/4464-0-0x0000000000D10000-0x0000000000DF7000-memory.dmp

    Filesize

    924KB