Analysis

  • max time kernel
    139s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-02-2025 00:59

General

  • Target

    JaffaCakes118_a591eba4913791142ed2740704efbbd6.exe

  • Size

    3.5MB

  • MD5

    a591eba4913791142ed2740704efbbd6

  • SHA1

    1d913f45cdc29762ea0cee6f1fd4ef605dc3888c

  • SHA256

    1038e6565302e50191d1fe423c0f8c4d6d866be4e39449f86b30e3f4b67cd0a4

  • SHA512

    509b8c13fde8f9ce83038ddd7537fafce2061b6becf51eee28169e4c729709d96eb2e8e74e2be3f6ae8df8de0c5736e49f877fb3b4eff8f97cc998ad4ea1c908

  • SSDEEP

    98304:Sgy8kDbkIrrNRiaZ67lnQhMDDMbfjR/s6DKvjXPVf:SF8kDbpnBenk6bP5

Malware Config

Signatures

  • Detect Neshta payload 8 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a591eba4913791142ed2740704efbbd6.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a591eba4913791142ed2740704efbbd6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a591eba4913791142ed2740704efbbd6.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a591eba4913791142ed2740704efbbd6.exe
      2⤵
      • Checks computer location settings
      • Modifies system executable filetype association
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:3676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    6d51f694e71f126db3084b23c4d34d61

    SHA1

    6ac0a07c9c2b5d591e3ad8e0536752c0f1ea9a38

    SHA256

    046a61f02b9ac4657bd74254a07c4e1466dce65c550449075a9d1479465c9e26

    SHA512

    822bfd037c89d32f468102625dff1443722db93c40952be1336e4bf22ca4f98c49f627c078d8cdff83951468f83f0cf7538aa62bda8352ce097a43062220f176

  • C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_a591eba4913791142ed2740704efbbd6.exe

    Filesize

    3.4MB

    MD5

    56b1663fcb10e1b71734a86ab8f7d4ae

    SHA1

    df7ff6e8322bf58147365baa4b3341e3a2665fea

    SHA256

    7e12296503b6faac855e9aa8f1bbf5938bb97ac593e411917a94ff22fd69e646

    SHA512

    b98bed9bd7674c849b847d32c01a610d47780bba67d13b4b09a6856011fedac829b60ee4fed219693415d9801b07dffc7b3b7e567379484b58553f7f83a870f0

  • memory/3676-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3676-3-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3676-4-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3676-5-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3676-99-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3676-100-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3676-101-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3676-105-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB