General

  • Target

    JaffaCakes118_c0e42cf18b138205a171768f3dddf0e0

  • Size

    616KB

  • Sample

    250208-j15zbatqbw

  • MD5

    c0e42cf18b138205a171768f3dddf0e0

  • SHA1

    867ebc0dae6437916f8882192652b58986d75d3c

  • SHA256

    3ff5b8d4a80c9f631c2220c3f7ff9f1839bbd04d6eda9e57add7360a71774d1d

  • SHA512

    887bdf246e507dbfd428916489016a6a470c668be44bc981469a89dee038179a9da67601b5dc9a1e96f8d57702abc5daa43c0f66e6f05573a3f17e49aadbc8ae

  • SSDEEP

    12288:s7uII7WPIHFZQWoW1lADk6rOkEx5o7pKyskZWNCGNF+0W5iiUF:su78mZncDkYC5up6kENFfE5iiw

Malware Config

Targets

    • Target

      JaffaCakes118_c0e42cf18b138205a171768f3dddf0e0

    • Size

      616KB

    • MD5

      c0e42cf18b138205a171768f3dddf0e0

    • SHA1

      867ebc0dae6437916f8882192652b58986d75d3c

    • SHA256

      3ff5b8d4a80c9f631c2220c3f7ff9f1839bbd04d6eda9e57add7360a71774d1d

    • SHA512

      887bdf246e507dbfd428916489016a6a470c668be44bc981469a89dee038179a9da67601b5dc9a1e96f8d57702abc5daa43c0f66e6f05573a3f17e49aadbc8ae

    • SSDEEP

      12288:s7uII7WPIHFZQWoW1lADk6rOkEx5o7pKyskZWNCGNF+0W5iiUF:su78mZncDkYC5up6kENFfE5iiw

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks