General

  • Target

    JaffaCakes118_ec99191a86cf84844ed7bf77c7e404b2

  • Size

    81KB

  • Sample

    250212-dl2qfsxpdk

  • MD5

    ec99191a86cf84844ed7bf77c7e404b2

  • SHA1

    f69e7b91a341a7401dc83e1055d2b42f8338f5a5

  • SHA256

    13df7493ad9c328a21e7917abb6f4208c7c1b880e28d6750d1b0c60a27aa0e76

  • SHA512

    df31b924f6c9690c76c1ce94824ff89b668dbf6afbca7ff1c97f4c925092a208f23d530d1f5044b6152b913d46b8ac514ecfbb45acc56dc55f497e1a022e835b

  • SSDEEP

    1536:yxqjQ+P04wsZLnDrCYAcLMNA7/utGgvdsaFOqJ75Bw:zr8WDrCfcLMyyMmWa15m

Malware Config

Targets

    • Target

      JaffaCakes118_ec99191a86cf84844ed7bf77c7e404b2

    • Size

      81KB

    • MD5

      ec99191a86cf84844ed7bf77c7e404b2

    • SHA1

      f69e7b91a341a7401dc83e1055d2b42f8338f5a5

    • SHA256

      13df7493ad9c328a21e7917abb6f4208c7c1b880e28d6750d1b0c60a27aa0e76

    • SHA512

      df31b924f6c9690c76c1ce94824ff89b668dbf6afbca7ff1c97f4c925092a208f23d530d1f5044b6152b913d46b8ac514ecfbb45acc56dc55f497e1a022e835b

    • SSDEEP

      1536:yxqjQ+P04wsZLnDrCYAcLMNA7/utGgvdsaFOqJ75Bw:zr8WDrCfcLMyyMmWa15m

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks