Analysis

  • max time kernel
    93s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-01-2025 14:19

General

  • Target

    JaffaCakes118_7a2801b71758aec43059f0083103377e.exe

  • Size

    550KB

  • MD5

    7a2801b71758aec43059f0083103377e

  • SHA1

    b5dcfb4b2f229d8b50644bb872ac1991550f4cf7

  • SHA256

    8552021656d465e82680be25a4ae3ab8cf8992381b39688f49fe24193808584e

  • SHA512

    80da76e0d8ed6b9f2ab7dddc0b70530afd165735e26fa64a437c1105cec7d0bb41cfd5410222dd5113a984fa32e78780c2cce7071f808ff65f5ab9aa5b82c876

  • SSDEEP

    12288:QP0N8Pu4xHFGx27cGrAbhfTYawhJdxLs4Kr4Tu/:QP0NNWE2zrAbhfD4Vs4n2

Malware Config

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a2801b71758aec43059f0083103377e.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a2801b71758aec43059f0083103377e.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4564
    • C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_7a2801b71758aec43059f0083103377e.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_7a2801b71758aec43059f0083103377e.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:532
      • C:\Users\Admin\AppData\Local\Temp\DM\JaffaCakes118_7a2801b71758aec43059f0083103377e.exe\u8Rxtz18b0uR6iC\Launcher.exe
        C:\Users\Admin\AppData\Local\Temp\DM\JaffaCakes118_7a2801b71758aec43059f0083103377e.exe\u8Rxtz18b0uR6iC\Launcher.exe /in="eJaffaCakes118_7a2801b71758aec43059f0083103377e.exe" /out="JaffaCakes118_7a2801b71758aec43059f0083103377e.exe" /psw="952cbe682fbe401aa537c6a61cf687b8" /typ=dec
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1068
      • C:\Users\Admin\AppData\Local\Temp\DM\JaffaCakes118_7a2801b71758aec43059f0083103377e.exe\u8Rxtz18b0uR6iC\JaffaCakes118_7a2801b71758aec43059f0083103377e.exe
        C:\Users\Admin\AppData\Local\Temp\DM\JaffaCakes118_7a2801b71758aec43059f0083103377e.exe\u8Rxtz18b0uR6iC\JaffaCakes118_7a2801b71758aec43059f0083103377e.exe /path="C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_7a2801b71758aec43059f0083103377e.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_7a2801b71758aec43059f0083103377e.exe

    Filesize

    510KB

    MD5

    c70dcb3f025a48bac174c94b986ff958

    SHA1

    710cfacb6c97915787582188606c2d2f8fa6cba5

    SHA256

    5437690d33f36b5e6292db3000872462110770dec5db5f006e3a9e1be3869017

    SHA512

    a89ebc4acc5f18b9602d2357eec072240cc424d4f9b6f1630dd730db879f806db35bb85ad987c3f8fa163e11c6b92cd4f5c81eff539ea6155b2b32e0d82e0af4

  • C:\Users\Admin\AppData\Local\Temp\DM\JaffaCakes118_7a2801b71758aec43059f0083103377e.exe\u8Rxtz18b0uR6iC\JaffaCakes118_7a2801b71758aec43059f0083103377e.exe

    Filesize

    380KB

    MD5

    0b863a091adf59a623070bf14678b0df

    SHA1

    33fb240ba289b72b2191c8a5d508627ee7239926

    SHA256

    8686bce4ff8edf25b0f928c197d727063e6e0c17e3ba2ad12d852cf0f502665c

    SHA512

    c30e705e543a98a8648ec598bc0444b79158632288d141c0720b751f437576a5a0b421948c06035d620d15eb4f3634d9a3d5985f750e3b4571327a99fe0ecd1e

  • C:\Users\Admin\AppData\Local\Temp\DM\JaffaCakes118_7a2801b71758aec43059f0083103377e.exe\u8Rxtz18b0uR6iC\JaffaCakes118_7a2801b71758aec43059f0083103377e.exe.config

    Filesize

    690B

    MD5

    bca0ea75b6940aa86960d7b9098a5998

    SHA1

    3d57f82158ac72c7eb2e72ba19a80485d8103130

    SHA256

    5a494295936d2170433864b449257bbac7b976413811a0b6339e37f83a891f8d

    SHA512

    260a05c509d874239a27798421ee75ac7e2bbc0d2a0485122740e8b8adcd8f43f98f7633cef278d9f7f4a132633b4b1cdf4b641e2233e891dce2d6eb6e75c3d3

  • C:\Users\Admin\AppData\Local\Temp\DM\JaffaCakes118_7a2801b71758aec43059f0083103377e.exe\u8Rxtz18b0uR6iC\Launcher.exe

    Filesize

    104KB

    MD5

    59160334f00327274ae72fb674d80f9f

    SHA1

    adfa4abda4e90321a8ee1acee15b5f6899a2489b

    SHA256

    7364476ff2ce59a2bb878eb09efe51e0bea948ef0ea7344410777d43feff8a70

    SHA512

    4a5594903e9ca0e9fcaf55a3a3ddc8895134bcada923dddf4f9d1d47b9bebd75a3e83a5bdcc97dfba19aff11b14c0fac8529bdc71c2f0ccdc2a48e1f31fc749d

  • C:\Users\Admin\AppData\Local\Temp\DM\JaffaCakes118_7a2801b71758aec43059f0083103377e.exe\u8Rxtz18b0uR6iC\Launcher.exe.config

    Filesize

    340B

    MD5

    91629f6b28cbe2b52bb86cb5af3bdbca

    SHA1

    35fb57ac58c9eb0668f5832a588d9f81e040568b

    SHA256

    589c122996fadc118731c6f983c5d3b498c4b4b59700ea548f4cfb79e4eaaeeb

    SHA512

    f08382296696173784841a163c73c19e7bd674a08a053c0434d55696f45039721925e5d829e4bbbf71b07385d1b88c5ea241b8247eb0d81bf381205977bd14c5

  • C:\Users\Admin\AppData\Local\Temp\DM\JaffaCakes118_7a2801b71758aec43059f0083103377e.exe\u8Rxtz18b0uR6iC\eJaffaCakes118_7a2801b71758aec43059f0083103377e.exe

    Filesize

    380KB

    MD5

    3a9a176d410d4c6a510af88d2e0a2fa1

    SHA1

    4893510bde239d2c3bd5f8a57184889b4033710b

    SHA256

    b9e84b9bf1eb47466678d80109d1d43838bb788d5b82a3c6ab484806e0c4d134

    SHA512

    310f1f05645ec1ae402940e5dbffe9c3e57022310b1d27e82bb9e37cc14b68b3245696cda7a4a8f4d6d9cda57116e12fc553b7dcc4d2a2047eae36e5bc407b2e

  • C:\Users\Admin\AppData\Local\Temp\nsj90F7.tmp\pwgen.dll

    Filesize

    16KB

    MD5

    a555472395178ac8c733d90928e05017

    SHA1

    f44b192d66473f01a6540aaec4b6c9ac4c611d35

    SHA256

    82ae08fced4a1f9a7df123634da5f4cb12af4593a006bef421a54739a2cbd44e

    SHA512

    e6d87b030c45c655d93b2e76d7437ad900df5da2475dd2e6e28b6c872040491e80f540b00b6091d16bc8410bd58a1e82c62ee1b17193ef8500a153d4474bb80a

  • memory/1068-24-0x0000000073282000-0x0000000073283000-memory.dmp

    Filesize

    4KB

  • memory/1068-25-0x0000000073280000-0x0000000073831000-memory.dmp

    Filesize

    5.7MB

  • memory/1068-29-0x0000000073280000-0x0000000073831000-memory.dmp

    Filesize

    5.7MB

  • memory/1068-30-0x0000000073280000-0x0000000073831000-memory.dmp

    Filesize

    5.7MB

  • memory/1912-39-0x000000001C270000-0x000000001C73E000-memory.dmp

    Filesize

    4.8MB

  • memory/1912-40-0x000000001BEA0000-0x000000001BF3C000-memory.dmp

    Filesize

    624KB

  • memory/1912-41-0x0000000001620000-0x0000000001628000-memory.dmp

    Filesize

    32KB

  • memory/1912-38-0x00000000015F0000-0x00000000015FE000-memory.dmp

    Filesize

    56KB

  • memory/1912-127-0x0000000020720000-0x0000000020782000-memory.dmp

    Filesize

    392KB

  • memory/4564-129-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4564-130-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4564-132-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB