Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-02-2025 00:59

General

  • Target

    JaffaCakes118_a591eba4913791142ed2740704efbbd6.exe

  • Size

    3.5MB

  • MD5

    a591eba4913791142ed2740704efbbd6

  • SHA1

    1d913f45cdc29762ea0cee6f1fd4ef605dc3888c

  • SHA256

    1038e6565302e50191d1fe423c0f8c4d6d866be4e39449f86b30e3f4b67cd0a4

  • SHA512

    509b8c13fde8f9ce83038ddd7537fafce2061b6becf51eee28169e4c729709d96eb2e8e74e2be3f6ae8df8de0c5736e49f877fb3b4eff8f97cc998ad4ea1c908

  • SSDEEP

    98304:Sgy8kDbkIrrNRiaZ67lnQhMDDMbfjR/s6DKvjXPVf:SF8kDbpnBenk6bP5

Malware Config

Signatures

  • Detect Neshta payload 5 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a591eba4913791142ed2740704efbbd6.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a591eba4913791142ed2740704efbbd6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a591eba4913791142ed2740704efbbd6.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a591eba4913791142ed2740704efbbd6.exe
      2⤵
      • Modifies system executable filetype association
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe

    Filesize

    547KB

    MD5

    01d5e801c34633655d78b1b89883f72c

    SHA1

    f8dba7cff703ab68d94ac1070f180202016f1efd

    SHA256

    dd953f9f859432a222d876f9556dcd108c4a430078594790c1efee7e374a09ed

    SHA512

    cf9a547552635750e2fad78d6843b90e0a602cb71b568aace7a58d844b77357a5261b44d976ec121556d73787406c11e6a9afa82d32a02c8dac858c8fa2a0a37

  • memory/2992-20-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2992-12-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2992-10-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2992-22-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2992-8-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2992-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2992-4-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2992-18-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2992-16-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2992-14-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2992-7-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2992-19-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2992-95-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB