General
-
Target
JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067
-
Size
155KB
-
Sample
250102-fneptavkat
-
MD5
62ce8428d80fbef08b1c6356afe2d067
-
SHA1
bdc9d3fc8e8d89d551ffc5640133f3bbe6390e4e
-
SHA256
5a43af1d5fb9b918e141c63a1feca4e8c8d12eba6ac5df639c3733f8c8cb49db
-
SHA512
8d16b6b094ab8b9374f45b06d5fcf730bef3d37faf2e3d5cd122311e8e5292a43b89bd2f6763ef352b4dc36b5b77bc7f6cc03ba9e33f29f9ce17c2b0a9b06b9d
-
SSDEEP
3072:zr8WDrCAGRXr7F3QE5GfijJKcOfolfyIx0hijJKcOfolfyIx00:PuB7JZ2ijJKcFlfyIKijJKcFlfyIJ
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067
-
Size
155KB
-
MD5
62ce8428d80fbef08b1c6356afe2d067
-
SHA1
bdc9d3fc8e8d89d551ffc5640133f3bbe6390e4e
-
SHA256
5a43af1d5fb9b918e141c63a1feca4e8c8d12eba6ac5df639c3733f8c8cb49db
-
SHA512
8d16b6b094ab8b9374f45b06d5fcf730bef3d37faf2e3d5cd122311e8e5292a43b89bd2f6763ef352b4dc36b5b77bc7f6cc03ba9e33f29f9ce17c2b0a9b06b9d
-
SSDEEP
3072:zr8WDrCAGRXr7F3QE5GfijJKcOfolfyIx0hijJKcOfolfyIx00:PuB7JZ2ijJKcFlfyIKijJKcFlfyIJ
-
Modifies firewall policy service
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1