General
-
Target
JaffaCakes118_7a93711b9e43bf3592afa82d08a39183
-
Size
1.0MB
-
Sample
250104-thlg3aymbk
-
MD5
7a93711b9e43bf3592afa82d08a39183
-
SHA1
31002d95ede8024a4391250c4f52c9639efb47a4
-
SHA256
4d9592240ba9b45e0926420620c3d3edfbb1eb628c9dbb40d47769455301bc1c
-
SHA512
a62360cfc580051b6980f47619a9008b29d9ff3986923838e0d19fd3dfab9e69e43b5f308021605084360f184170ffc0e4a1a215cea417a36ec514a6e1bcf8f7
-
SSDEEP
24576:lKT4+OyYLf9lVvCNkFNXCaSUsGSY/Dwyw8rGaF:lKE+6BlFCNkFNXCaSdVN8JF
Behavioral task
behavioral1
Sample
JaffaCakes118_7a93711b9e43bf3592afa82d08a39183.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_7a93711b9e43bf3592afa82d08a39183
-
Size
1.0MB
-
MD5
7a93711b9e43bf3592afa82d08a39183
-
SHA1
31002d95ede8024a4391250c4f52c9639efb47a4
-
SHA256
4d9592240ba9b45e0926420620c3d3edfbb1eb628c9dbb40d47769455301bc1c
-
SHA512
a62360cfc580051b6980f47619a9008b29d9ff3986923838e0d19fd3dfab9e69e43b5f308021605084360f184170ffc0e4a1a215cea417a36ec514a6e1bcf8f7
-
SSDEEP
24576:lKT4+OyYLf9lVvCNkFNXCaSUsGSY/Dwyw8rGaF:lKE+6BlFCNkFNXCaSdVN8JF
-
Detect Neshta payload
-
Modifies firewall policy service
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Sality family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1