Overview
overview
10Static
static
10JaffaCakes...1a.exe
windows7-x64
10JaffaCakes...1a.exe
windows10-2004-x64
10$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 20:40
Behavioral task
behavioral1
Sample
JaffaCakes118_d1de04534ff3457bfb7efd36a9f6fb1a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d1de04534ff3457bfb7efd36a9f6fb1a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_d1de04534ff3457bfb7efd36a9f6fb1a.exe
-
Size
318KB
-
MD5
d1de04534ff3457bfb7efd36a9f6fb1a
-
SHA1
377b95d97e31a7f41baa9bcddd639913437863dd
-
SHA256
0cd908ecf19baa32f59f374f76f4eff074d85ec13ee0a7081eae7232718a5621
-
SHA512
1b95a1b9d6dcef3100bab56405059b77cced3662064a06eb706423c409ab277a06b8cfb2ea4e699ad67fcbc18bc5d3fb5754515895ecffa7b52df05dbdf2329d
-
SSDEEP
6144:N740IAIWrHZ/6wApVbWRemViBq6fZosBs2t0EyL+taO9r740Io:t51NQyeq6f+RKEo7
Malware Config
Signatures
-
Detect Neshta payload 1 IoCs
resource yara_rule behavioral1/files/0x000900000001660b-5.dat family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 1 IoCs
pid Process 1504 Un_A.exe -
Loads dropped DLL 7 IoCs
pid Process 2732 JaffaCakes118_d1de04534ff3457bfb7efd36a9f6fb1a.exe 1504 Un_A.exe 1504 Un_A.exe 1504 Un_A.exe 1504 Un_A.exe 1504 Un_A.exe 1504 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d1de04534ff3457bfb7efd36a9f6fb1a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Un_A.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1504 Un_A.exe 1504 Un_A.exe 1504 Un_A.exe 1504 Un_A.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 1504 2732 JaffaCakes118_d1de04534ff3457bfb7efd36a9f6fb1a.exe 30 PID 2732 wrote to memory of 1504 2732 JaffaCakes118_d1de04534ff3457bfb7efd36a9f6fb1a.exe 30 PID 2732 wrote to memory of 1504 2732 JaffaCakes118_d1de04534ff3457bfb7efd36a9f6fb1a.exe 30 PID 2732 wrote to memory of 1504 2732 JaffaCakes118_d1de04534ff3457bfb7efd36a9f6fb1a.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d1de04534ff3457bfb7efd36a9f6fb1a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d1de04534ff3457bfb7efd36a9f6fb1a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
318KB
MD5d1de04534ff3457bfb7efd36a9f6fb1a
SHA1377b95d97e31a7f41baa9bcddd639913437863dd
SHA2560cd908ecf19baa32f59f374f76f4eff074d85ec13ee0a7081eae7232718a5621
SHA5121b95a1b9d6dcef3100bab56405059b77cced3662064a06eb706423c409ab277a06b8cfb2ea4e699ad67fcbc18bc5d3fb5754515895ecffa7b52df05dbdf2329d
-
Filesize
100KB
MD5c6a6e03f77c313b267498515488c5740
SHA13d49fc2784b9450962ed6b82b46e9c3c957d7c15
SHA256b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
SHA5129870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
Filesize
3KB
MD51cc7c37b7e0c8cd8bf04b6cc283e1e56
SHA10b9519763be6625bd5abce175dcc59c96d100d4c
SHA2569be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
SHA5127acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7