General
-
Target
JaffaCakes118_c9040ddc80275bce629c71c50d2e42ae
-
Size
1.5MB
-
Sample
250209-alvelazrcp
-
MD5
c9040ddc80275bce629c71c50d2e42ae
-
SHA1
b01c27424e01031bdc77f56bd55d04fe791661aa
-
SHA256
7e3e3413575bc60710db5d575851dfd46c05e596eeb7e01ead584e671fe7af62
-
SHA512
d39e783ba908e5d5853263a28c6744c892ddd549591bb24b8da95ef219d9df5ed9c6a56645689289f263a077015681b70f3c6a4b985a5cf8afe762d9f67437ac
-
SSDEEP
12288:DLI2nmeC1Tg13XD7tfmCnZVcorOk4X/3K63S+/9HQKGP2ZbHfUK2jRhSGakKeiSt:fnmwnECnZtR6f/OKPOAGakqKitxKMM
Behavioral task
behavioral1
Sample
JaffaCakes118_c9040ddc80275bce629c71c50d2e42ae.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c9040ddc80275bce629c71c50d2e42ae.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
JaffaCakes118_c9040ddc80275bce629c71c50d2e42ae
-
Size
1.5MB
-
MD5
c9040ddc80275bce629c71c50d2e42ae
-
SHA1
b01c27424e01031bdc77f56bd55d04fe791661aa
-
SHA256
7e3e3413575bc60710db5d575851dfd46c05e596eeb7e01ead584e671fe7af62
-
SHA512
d39e783ba908e5d5853263a28c6744c892ddd549591bb24b8da95ef219d9df5ed9c6a56645689289f263a077015681b70f3c6a4b985a5cf8afe762d9f67437ac
-
SSDEEP
12288:DLI2nmeC1Tg13XD7tfmCnZVcorOk4X/3K63S+/9HQKGP2ZbHfUK2jRhSGakKeiSt:fnmwnECnZtR6f/OKPOAGakqKitxKMM
Score10/10-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Modify Registry
3Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1