Analysis

  • max time kernel
    141s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-02-2025 14:41

General

  • Target

    JaffaCakes118_a0a434abece1bdc69420b5fda0ea1a53.exe

  • Size

    1.1MB

  • MD5

    a0a434abece1bdc69420b5fda0ea1a53

  • SHA1

    3dc3876e19dab542f0d2b3a629965e6b2ed41dbb

  • SHA256

    50da5c1c2f6d54077043ff6ac57cee5a10617b8855d62b591c64848024526f5f

  • SHA512

    8c8fa0d42c9301894ae6fd90b2fca133db8cabeefde4c3493c762df2108ba37684b4f4c28f0fbae0442ad2b77be36396f738f13627079b138c4b1b80c60a8674

  • SSDEEP

    24576:5ykiMICeww7nyoYi0HqF+WceO5REk6Fw/f9Y7bVRsd5FV9De:vF+Fqe23Ywy5kf9De

Malware Config

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0a434abece1bdc69420b5fda0ea1a53.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0a434abece1bdc69420b5fda0ea1a53.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4628
    • C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_a0a434abece1bdc69420b5fda0ea1a53.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_a0a434abece1bdc69420b5fda0ea1a53.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4256
      • \??\c:\ee771a11f4eee320c2276664277ccf62\update\update.exe
        c:\ee771a11f4eee320c2276664277ccf62\update\update.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Enumerates system info in registry
        PID:1992
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 1420
      2⤵
      • Program crash
      PID:4432
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4628 -ip 4628
    1⤵
      PID:4536

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

      Filesize

      86KB

      MD5

      0c3c153868005aba5bd10dc164078ad1

      SHA1

      e47e574aa0d6d9bb88e00eb28d02df24735166ea

      SHA256

      909748f3fc8c433c2cfa19465858a98a163a30676e3e94de56a9364dba02c739

      SHA512

      82dc76a67eb6952b1446f5705f35ec6e45d5f4f4fcdc893ff39e3b0103a8884070ac8f30fe8c24ce97a0c2541ed1b349f4f4b95dac8d4736c185e887b21496dd

    • C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_a0a434abece1bdc69420b5fda0ea1a53.exe

      Filesize

      1.1MB

      MD5

      0b757f6f12d8d95b2e4194d9f922a70e

      SHA1

      680ec904c6e256f04756736872d21980c5952af6

      SHA256

      2e4ddd73b74f7bcb24325a69cadba99f824acea342f222f718c8380e9e178850

      SHA512

      3cfc1d3e9caa8c3252796dcbbb0fa0618c1a086286bafc75882dbc6d3452ac4d4e5767d941b85c201cd07b30698c27f6c336ddb25eb28613d8534bee7bd75c58

    • C:\ee771a11f4eee320c2276664277ccf62\update\update.exe

      Filesize

      270KB

      MD5

      8a337ef84139089cb726e414412c7e3c

      SHA1

      f36f33b11fd384d656df355cf70c5b0852da79c4

      SHA256

      6b7bfad25078e1a53e3a3ae2b1824b40d9b27bc67d45fef606bbbebe9d359c87

      SHA512

      4a83ee8a1053ad2fd2bab7bbf02051910596fe74743b62a4a5c31aa87786e9a3c2577e4c9ae1880757d273abf1a8314e3ecd2f3a3a71cf34a7ad4e90d718c6c3

    • \??\c:\ee771a11f4eee320c2276664277ccf62\update\update.inf

      Filesize

      6KB

      MD5

      8878656191bdc46374d9f914c1b8582b

      SHA1

      6b45cb7fb2e2040e5e8343318c0032b5acf597c1

      SHA256

      00262bd370da9bd72aa440f3c9e7f2e7ba33dcd08edb21909c7a80112a79b0bc

      SHA512

      fdc9c4210501bc993a31ac6b83b8a9d127376c6f8e3a529d8524a37c4e4ee3a391b17c558d5a08a75b67d2727e116c516be7b6c932be4c8c6e5552d7360d8448

    • memory/4628-197-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/4628-198-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/4628-200-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB