General
-
Target
JaffaCakes118_813224d4b14fbe6b2579eb3052ec75a9
-
Size
141KB
-
Sample
250202-1qlala1qcr
-
MD5
813224d4b14fbe6b2579eb3052ec75a9
-
SHA1
7446d40aab75de3288667941795eb08cec01a74a
-
SHA256
29fb962061a2dc06e0c8bf06a9cd00562ce275d15e21f94d4c3e35eef282bccb
-
SHA512
0bcca420506eb3ba631842fdc40037c69f22fd9e6ca77dc9ed782b0270ca474657ef889ee0858adf0a74892b1fce307763e97107289d112e2fb278b656423786
-
SSDEEP
1536:JxqjQ+P04wsmJCUvw3AlwF8oodD+6jNX6e2/mGbo+7IuB7YLPrKyON3lPWgC/xXG:sr85CQw3A+cxV2p37zgrvoF3O4T7oYB
Behavioral task
behavioral1
Sample
JaffaCakes118_813224d4b14fbe6b2579eb3052ec75a9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_813224d4b14fbe6b2579eb3052ec75a9.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_813224d4b14fbe6b2579eb3052ec75a9
-
Size
141KB
-
MD5
813224d4b14fbe6b2579eb3052ec75a9
-
SHA1
7446d40aab75de3288667941795eb08cec01a74a
-
SHA256
29fb962061a2dc06e0c8bf06a9cd00562ce275d15e21f94d4c3e35eef282bccb
-
SHA512
0bcca420506eb3ba631842fdc40037c69f22fd9e6ca77dc9ed782b0270ca474657ef889ee0858adf0a74892b1fce307763e97107289d112e2fb278b656423786
-
SSDEEP
1536:JxqjQ+P04wsmJCUvw3AlwF8oodD+6jNX6e2/mGbo+7IuB7YLPrKyON3lPWgC/xXG:sr85CQw3A+cxV2p37zgrvoF3O4T7oYB
-
Detect Neshta payload
-
Modifies firewall policy service
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1