Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-01-2025 03:05

General

  • Target

    JaffaCakes118_773eb17f7dba6b359affa8dd353b389f.exe

  • Size

    434KB

  • MD5

    773eb17f7dba6b359affa8dd353b389f

  • SHA1

    584c03e869ccd34ccc4f3611594b107a9e08533c

  • SHA256

    6db8d3ce0c8918b208a4e6da0066fa073717954910cb8562f9d6878833a3ab8d

  • SHA512

    867c6f2bdbdcf35ba40a2a7dc162c503c074db88ffc2eafd471c805eab0529460b8032ff2651d994524daa5b2f20cf12dbb942f76b1c7a581ca2109149cdfb90

  • SSDEEP

    12288:8ftlPJjSZCXWEAQLQV+EVUL/kbEIKL1wTNu+MAqy:8ftlPJjSEnAQLQV+EqL/GEIKL1l+Jqy

Malware Config

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_773eb17f7dba6b359affa8dd353b389f.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_773eb17f7dba6b359affa8dd353b389f.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3204
    • C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_773eb17f7dba6b359affa8dd353b389f.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_773eb17f7dba6b359affa8dd353b389f.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3136
      • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe
        javaw.exe -version
        3⤵
          PID:3540
        • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe
          javaw.exe -classpath ";C:\Users\Admin\AppData\Local\Temp\3582-490\.\PGDDIMOB.jar;C:\Users\Admin\AppData\Local\Temp\3582-490\.\jhall.jar;" serpro.dimob.app.PgdDimob -Xmx128m
          3⤵
            PID:2312

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

        Filesize

        86KB

        MD5

        3b73078a714bf61d1c19ebc3afc0e454

        SHA1

        9abeabd74613a2f533e2244c9ee6f967188e4e7e

        SHA256

        ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

        SHA512

        75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

      • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

        Filesize

        46B

        MD5

        a58e9ab36581f6250eaa84752ca2576f

        SHA1

        071805a739ff9c2159f7a2e9033ee0c68890de92

        SHA256

        576fad5060424f76182d274b21ab5d85b97dea858f52eadebab8dbd51b6ccc42

        SHA512

        a38b8b83d697d7e37b8377507ddce199645fe66b346bbbfc847c9e03acb9550d6b03c1e8a0d408504b38da40360301f47b626b8c64ff9d89c6493ecc40456a7a

      • C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_773eb17f7dba6b359affa8dd353b389f.exe

        Filesize

        394KB

        MD5

        60a7450602350b525884fab1ae0df349

        SHA1

        e0bb4503c385fdf10fb65b84255cf0cd60b81f27

        SHA256

        c81540d14590f3e70f9db6f6143e795542f9ff622a8f174537b5322c9c266abb

        SHA512

        fb77c9e3a3ecae9a432aa7536023ba0198ca3f4a19bb9d492b16e726bece757a370b99ab496acab8d2d3b9731992847aa6dabef2ea6e181ff81668bd09faaeaf

      • memory/2312-38-0x000002A5A3F20000-0x000002A5A3F21000-memory.dmp

        Filesize

        4KB

      • memory/2312-30-0x000002A5A3F40000-0x000002A5A41B0000-memory.dmp

        Filesize

        2.4MB

      • memory/2312-39-0x000002A5A3F40000-0x000002A5A41B0000-memory.dmp

        Filesize

        2.4MB

      • memory/3136-40-0x0000000000400000-0x000000000046A000-memory.dmp

        Filesize

        424KB

      • memory/3204-124-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/3204-125-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/3204-127-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/3540-22-0x0000027150F70000-0x00000271511E0000-memory.dmp

        Filesize

        2.4MB

      • memory/3540-21-0x000002714F720000-0x000002714F721000-memory.dmp

        Filesize

        4KB

      • memory/3540-11-0x0000027150F70000-0x00000271511E0000-memory.dmp

        Filesize

        2.4MB