Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-02-2025 00:47

General

  • Target

    JaffaCakes118_8e39ddc4dcea638cc3ce10c7c9e4666b.exe

  • Size

    227KB

  • MD5

    8e39ddc4dcea638cc3ce10c7c9e4666b

  • SHA1

    06a532c9059b15466e0e0de7a2f78a101d3bee00

  • SHA256

    8fdbf538b7650efb41fb65269578af86c679cc0577399057f7385931c77075fb

  • SHA512

    dcac3b07b076cccf3a3b998376038683d64939116e3d99539a8a6870a235cd40d8e0a611febac82481975cd7f599827fbe3476c2ce94db867c13a241927b91eb

  • SSDEEP

    3072:Rr8WDrC8PkADIRnrxSuyJ1gjuYUEHjE2YKHMq8gus0ccntpQQDO+41YmbQy4tpQ2:tuDcIRouWgi0LDZoQ1VY7y+Q1VY7yw

Malware Config

Signatures

  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e39ddc4dcea638cc3ce10c7c9e4666b.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e39ddc4dcea638cc3ce10c7c9e4666b.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_8e39ddc4dcea638cc3ce10c7c9e4666b.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_8e39ddc4dcea638cc3ce10c7c9e4666b.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe

    Filesize

    2.4MB

    MD5

    644fd42f8199d1e407d58785a9c8c7d1

    SHA1

    e9302e4de73124554a63e96b1bc078819fd5c7e5

    SHA256

    859dd22745d751ba2e9a199e538c7e868b93374a63544e2feab24fb07607607e

    SHA512

    b49b2aec01371be504dd8eb7fcb1cbd31ce52cce7a8d5923ed2c48c89530d83dde65c96a54ab40be5f017f6a7b1ce051bbb2940978d8073a34b9ccaaaadb0bb2

  • C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_8e39ddc4dcea638cc3ce10c7c9e4666b.exe

    Filesize

    187KB

    MD5

    4bb925a6cb23abe798c26d97df059912

    SHA1

    cab0aef795bb41eab5f7efdc7a02ec76582ddb0b

    SHA256

    1fb3441c3f3d7cdd590687b1545fc0582e143d357e8cfa10f269fa223554a93f

    SHA512

    0a306752a33c52272ed5de94ec2c272989c1633c5886862bdb6605a47ed09ef2c3ba17c7da6ecd6dbf0c46f0af33cc3b334e4b0dbba1b1ed4c329ab6269247a9

  • memory/1928-96-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1928-97-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1928-99-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB