General

  • Target

    JaffaCakes118_c9040ddc80275bce629c71c50d2e42ae

  • Size

    1.5MB

  • Sample

    250209-alvelazrcp

  • MD5

    c9040ddc80275bce629c71c50d2e42ae

  • SHA1

    b01c27424e01031bdc77f56bd55d04fe791661aa

  • SHA256

    7e3e3413575bc60710db5d575851dfd46c05e596eeb7e01ead584e671fe7af62

  • SHA512

    d39e783ba908e5d5853263a28c6744c892ddd549591bb24b8da95ef219d9df5ed9c6a56645689289f263a077015681b70f3c6a4b985a5cf8afe762d9f67437ac

  • SSDEEP

    12288:DLI2nmeC1Tg13XD7tfmCnZVcorOk4X/3K63S+/9HQKGP2ZbHfUK2jRhSGakKeiSt:fnmwnECnZtR6f/OKPOAGakqKitxKMM

Malware Config

Targets

    • Target

      JaffaCakes118_c9040ddc80275bce629c71c50d2e42ae

    • Size

      1.5MB

    • MD5

      c9040ddc80275bce629c71c50d2e42ae

    • SHA1

      b01c27424e01031bdc77f56bd55d04fe791661aa

    • SHA256

      7e3e3413575bc60710db5d575851dfd46c05e596eeb7e01ead584e671fe7af62

    • SHA512

      d39e783ba908e5d5853263a28c6744c892ddd549591bb24b8da95ef219d9df5ed9c6a56645689289f263a077015681b70f3c6a4b985a5cf8afe762d9f67437ac

    • SSDEEP

      12288:DLI2nmeC1Tg13XD7tfmCnZVcorOk4X/3K63S+/9HQKGP2ZbHfUK2jRhSGakKeiSt:fnmwnECnZtR6f/OKPOAGakqKitxKMM

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks