Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 14:33
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe
-
Size
368KB
-
MD5
182a26233416f1cd3249e487bec9d58d
-
SHA1
bddb9925cc64ef4955d3af8cb97952a51689e596
-
SHA256
1e8ef0b7823dcf23a99cfc4d40c34786cbd1032581d906c5adea3bba3ade0449
-
SHA512
996f6dacd765d6ae25a40c2ea4ca1e37bab8e12f817cded4075c7d200c35e623b04098da7564ca6b18ac0456cea9cf26a83177e46462bfda01a83889af2a001a
-
SSDEEP
6144:jyH7xOc6H5c6HcT66vlmrJp13452WhN+nPQ4mevjx1GVUHnthaTBaE9A1XtR4UeJ:jakp13mvNSPmUHGVmaTAEwd9eJ
Malware Config
Signatures
-
Detect Neshta payload 4 IoCs
resource yara_rule behavioral1/files/0x001600000001866f-16.dat family_neshta behavioral1/memory/2492-108-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2492-110-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x0001000000010314-116.dat family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 4 IoCs
pid Process 2336 svchost.exe 2492 JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe 1796 svchost.exe 2700 JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe -
Loads dropped DLL 6 IoCs
pid Process 2336 svchost.exe 2336 svchost.exe 2492 JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe 2492 JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe 2492 JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe 2492 JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe svchost.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe File opened for modification C:\Windows\svchost.com JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 764 wrote to memory of 2336 764 JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe 31 PID 764 wrote to memory of 2336 764 JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe 31 PID 764 wrote to memory of 2336 764 JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe 31 PID 764 wrote to memory of 2336 764 JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe 31 PID 2336 wrote to memory of 2492 2336 svchost.exe 32 PID 2336 wrote to memory of 2492 2336 svchost.exe 32 PID 2336 wrote to memory of 2492 2336 svchost.exe 32 PID 2336 wrote to memory of 2492 2336 svchost.exe 32 PID 2492 wrote to memory of 2700 2492 JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe 34 PID 2492 wrote to memory of 2700 2492 JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe 34 PID 2492 wrote to memory of 2700 2492 JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe 34 PID 2492 wrote to memory of 2700 2492 JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_182a26233416f1cd3249e487bec9d58d.exe"4⤵
- Executes dropped EXE
PID:2700
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854KB
MD59bf7da1d524b0dc6e8007ca407f489c1
SHA1419c4d1423133a2b77290c3219317c3ef76abaf2
SHA256fe3c217e6d538c00b351e433a08cb5741cde072f2db75cb0ba5334fdb6246da2
SHA5128694f630010dd63278f5557eec3ae65cefcbbffe3b10eb61928a18db5c4622dd828d2e2020c670999eeb59759800a6e1172efb98e5dabb9cb4cd7a12e157a083
-
Filesize
583KB
MD5c5c7c9ab4205dbd206d0e41a35251646
SHA1451304ee05223f4e113042da7550279136f6497f
SHA256a4e6b639611fb2404d5157f35c5016f531aa309eee1c7ebb14e6853315ed00f9
SHA512cefcba1107a1e3a72a0f23af2842e341abfb77f6ac06553f18aeeb1e80f8a79f88d45f61bc087bd38d869147bc6fe8bca40c8874389246d6fd8b6f56e7c21eac
-
Filesize
332KB
MD521457be2cadea289f89ef25a581bbf40
SHA12a7a7b0e439cc0c997be8cc76b3fd2e7b2e0620a
SHA256fcac4ab1c72efb51e5118f303422a8c9e2f35afdcfe1a6e57c6594019a21ad43
SHA512c600e4ec34aede98636f7a748c26ddb004b8e1c5a732ea4655e0762b6d89d1b3a9d295a2381371a02c4cf4f8cd9693adcd1f2870de890c05d2699572a82e0a20
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
145KB
MD59d10f99a6712e28f8acd5641e3a7ea6b
SHA1835e982347db919a681ba12f3891f62152e50f0d
SHA25670964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc
SHA5122141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
292KB
MD51a7507b7410c9b7985ee1df26fdb50ca
SHA19b0b289fe9a95fdbd037cc89e9c60e116c968b3e
SHA256d9cb9083f54312203a0dad3349a04eafc0211be6934b30e37f856b72b15f956a
SHA512c5ebb43f5f0f46eca87e1ae052b0dd972ab5200fa5bae736af60589f415ce307fa07e4e19cee9c8f2d95d538561a1182f535d16eef1b7eb05b82d0b3d64d2238