Analysis

  • max time kernel
    150s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    14-02-2025 14:58

General

  • Target

    JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe

  • Size

    1013KB

  • MD5

    f92359062dc66a57f6ab00e784f1e495

  • SHA1

    4c95214e1399b27d56872d6ec719f6118f12e569

  • SHA256

    13c915b6798a47b5dd873b24b1c276eb5ffb190e62d12efe3d0d6a580eb65da3

  • SHA512

    dce4035fffd6b3a2cdd5f4b5384448339537853defdc3466e039eb4073b6ce07c73b60f7d8b9420afc5a28d215287b8b1caa75b369f460dca0411438f5368c35

  • SSDEEP

    12288:7ng2XY3mqzJFrTjSWPob/0TuvRUpHdc709aWbFUBfo5Tvraiam3xPaqGhE/fjuSm:7g2XY3mqTjMvRUpCA9PTTn3NaBMf

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    fan-games.do.am
  • Port:
    21
  • Username:
    8fan-games
  • Password:
    16069812s

Signatures

  • Detect Neshta payload 3 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\Ingektor.exe
      "C:\Users\Admin\AppData\Local\Temp\Ingektor.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1236
      • C:\Users\Admin\AppData\Local\Temp\3582-490\Ingektor.exe
        "C:\Users\Admin\AppData\Local\Temp\3582-490\Ingektor.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2020
        • C:\Windows\svchost.com
          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\PE1.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2924
          • C:\Users\Admin\AppData\Local\Temp\PE1.exe
            C:\Users\Admin\AppData\Local\Temp\PE1.exe
            5⤵
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:2252
        • C:\Windows\svchost.com
          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\PE2.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2980
          • C:\Users\Admin\AppData\Local\Temp\PE2.exe
            C:\Users\Admin\AppData\Local\Temp\PE2.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE

    Filesize

    859KB

    MD5

    754309b7b83050a50768236ee966224f

    SHA1

    10ed7efc2e594417ddeb00a42deb8fd9f804ed53

    SHA256

    acd32dd903e5464b0ecd153fb3f71da520d2e59a63d4c355d9c1874c919d04e6

    SHA512

    e5aaddf62c08c8fcc1ae3f29df220c5c730a2efa96dd18685ee19f5a9d66c4735bb4416c4828033661990604669ed345415ef2dc096ec75e1ab378dd804b1614

  • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe

    Filesize

    547KB

    MD5

    ad98b20199243808cde0b5f0fd14b98f

    SHA1

    f95ce4c4c1bb507da8ed379503b7f597ee2016cd

    SHA256

    214f478e94658fa2bd7f0bc17022831baee707756798addb41d9c5bee050e70b

    SHA512

    ee1251c62530b3027e2cd5669533c633577ffbcf854e137a551148fc0de3ee6cc34253a0bdefdbd4843929843b0790f1de893aa6fbae1c969f057b9f8486afef

  • C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe

    Filesize

    186KB

    MD5

    248a8df8e662dfca1db4f7160e1a972b

    SHA1

    dca22df5bca069f90d84d59988abe73a24704304

    SHA256

    6c7abeebd50487ca33315f5e507c9a5346e6e7a4b732103b35b8006ed58d7bb2

    SHA512

    0042e806d50c938fb1f08506327c87cd99e4f5f9520636b20695d94a696bb8b3f500f6d9507cb46fdba27c60cc0cb9e3c1e7c35dcfb7fcf4dadac3270e654f75

  • C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe

    Filesize

    1.1MB

    MD5

    dc6114cf663ccdb1e55d37e6501c54cc

    SHA1

    8007df78476f6e723ddcb3ad6d515e558dcb97c9

    SHA256

    d566164c874ef66149b493e3220616cdb9090a8cebb4a1325c48c705aea5c348

    SHA512

    677464e6dab367f9158655533cade6e1ec4b39c4e64b05395e72e4099ca7f8fa82b8e49846932956da5fef760cc109a348e1c599d986166998e4d2623022a28c

  • C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe

    Filesize

    381KB

    MD5

    2352318f01171370a31048e3ef80a4a9

    SHA1

    aeca009b93c80a3a51eaefa035b09f8a5aa6d252

    SHA256

    88b241c269c0b657ed4a2b09b0835f15f4dee77d0bb8fec3240bb14d93ba0b62

    SHA512

    7783abcc2a0e448ea476c53d70b8d04f4c90c3b30b72a1b89310fb6f9f05efcc7e511276cc045c3e3f476e932874c3aef30366872b408fa257561aba2d907b3b

  • C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE

    Filesize

    140KB

    MD5

    efa16affa5bb0cd11601b66850e36fd8

    SHA1

    fc6e8f93e0caf43ace7d297bdd9fe430cfa10a67

    SHA256

    ceb004f43a4edc51ce5f3f4e51c67df5569da17c4ce189509973cce27050d92a

    SHA512

    90a36edf39606fc30cda1da07cbdf4b9399377a00f59904a97b87ee41ee443a570231c79432155aea08a5d20bcbfd0e897b682d736a873547acdbeb5b259cd90

  • C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE

    Filesize

    155KB

    MD5

    6e2056a06a20c59fa9bfdef3490accf0

    SHA1

    4f84138c0c61e1c37e7c0b316c77b48a6401c3e1

    SHA256

    3ec70e2e58fc40e7031e37af2ea1f0ed1202d9608b91b29d5cef568a8900d387

    SHA512

    191a9a19d2eee3af36571177109a394a5f0582fc5c763c38b4490253c7f58329bb391981bf1702dda672e5a6b908585ddb92cf4ece71c082311b1e096430bd3d

  • C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE

    Filesize

    230KB

    MD5

    94a6f89a6391389a41d4ab2f660ccbad

    SHA1

    61a95366a8fee5c11120f25d5d2f5202f4a550da

    SHA256

    da4ac3ca15fae5fa60717bf9a20e113d4108c7be883be4fe39d9e1fa91059325

    SHA512

    cf27c8767ebedb492a4f3eff73ac2884cde945eadc1c75ea20df5e981770423b0b5a7b76083c8d0499469d33f83d61c2c5608ff0b618d1fd420cf9e3163ad39d

  • C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE

    Filesize

    207KB

    MD5

    137088e3f14337e7dd22e79ad53bf6bd

    SHA1

    fa12820a19d300a11e839457c4db2c4f9b19a93b

    SHA256

    d10e2f064a6beac6affab5cb5e7105961f5671f73dc22e2ab4a0a23dd91e0e21

    SHA512

    52056afdc54c16f8db18ea10769d44a98df8a2974edf9d0abf6e7677dd4b5505183d5d472142ec8998ce69da3471df940f424383a572d23ccfee11105dd33646

  • C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE

    Filesize

    265KB

    MD5

    f38304be865a9f773dcac807b42684a4

    SHA1

    5dfb3d4424b20bec9a93cac785c4d6b65ec847d9

    SHA256

    0cd50ff5ddf00cdcf95370e5f169038293b1f4783380f88d2ce12e14eb73eafd

    SHA512

    ec81d5b8859937281e0018ba9ee9874e1de59f1f413440b5a3115662154c71546433efacf7e51d71c2893f81ebb41cd2268134849b07625e9861ba1d370ed3a0

  • C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE

    Filesize

    439KB

    MD5

    e9228ebf8b765c170034519a798bc2a3

    SHA1

    a28837f4aca4e86450ed38557f5f9dd4bec7eee0

    SHA256

    6a7e5d2f0c486637a27014308bb90944b571b3b1b09d70d37cfbfbc56ff575c9

    SHA512

    3139cf9ff431a5091512919718da45e86517c63511d90f1643897369d95af0bddaadb00a51bc3da82ebab6c76616d3ee9d3ee7f9f29e98802bf0b28737102423

  • C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe

    Filesize

    170KB

    MD5

    bcb3a4cfb104d4640666022cb8f25f31

    SHA1

    9be06951a98f46fe08c815a04ea65a87a552f581

    SHA256

    eb8026666033365e44ba6a474f6c8495c73ef7418e8d524b7b633f278d25f2b8

    SHA512

    ce787c3dc0133a9b6ddc229ec57b0756d527ee1b285142194d03c9ed5d944e3c182304bd25e0e14bb38af9b61136aea1deaa4e8464d35e96c6aca3441378af11

  • C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE

    Filesize

    109KB

    MD5

    e7453c1dd4fed00fef5b207154b1865c

    SHA1

    d564582f8ee7a0995724cd6ca0e05f77833344e6

    SHA256

    a4681090000fda2fefe58adab06039ba2fc21d58226f93230be5a19a46eff6a7

    SHA512

    4a4df1d30264afec9a81c92e5563daa5417863553f1ab159bc90d1e67e7de894af138ac4dc1df87fab835e6c033a07e838144b1cefe983afdfff7b43369d5305

  • C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE

    Filesize

    392KB

    MD5

    62070adb54d3d6be66cf523a2dabdc9d

    SHA1

    db079cf6656b3f743b4d5844fd292aab090a0f09

    SHA256

    352d8b4010e648b5839b25c3d97edad29741577b773c54a0de6fcc98f6186f37

    SHA512

    571d435555e5e4d8b0ec5c49377a190d2926616519408a475191b4b5b73da20dded3f2ddf15934ef66ffd4c1fb7c9a45d0eeeec761156038afa32dd5face1212

  • C:\Users\ALLUSE~1\PACKAG~1\{33D1F~1\VCREDI~1.EXE

    Filesize

    485KB

    MD5

    048da0aced67fe14cbc1801a057b8cef

    SHA1

    9ddac6ad86b54d0b7e1d22fbc1ff75ccfa9c17ea

    SHA256

    2f37cac4a1dbf7944d43f1154ce293311c3f9d44317276a06b49cd41123d9d96

    SHA512

    1d2b23dc25ea03002a3ccbcdf08a7ebf47ee2158bf9211b71830a92dfa4bef584529c1804148ebe2cb662e579cc97e9f702a6a42071f2600a129c642a6b92c16

  • C:\Users\ALLUSE~1\PACKAG~1\{4D8DC~1\VC_RED~1.EXE

    Filesize

    714KB

    MD5

    6686e6b195120668e21177aff058e81e

    SHA1

    a56f0d0e942b2b657e0dd7848e78d53c6740880e

    SHA256

    ca99df46bb3b85ee7be086eaf3b10eee8abc4c8dbeef690ca8c0bfc9eec845d9

    SHA512

    de1b827b645740f6d7895e6333fa73b2b0b4af500a5457740d810580a67f327e5bdd98ccf1e1cce44a64869b0ef3c52b224dd148fe37976d58f66e0823215559

  • C:\Users\ALLUSE~1\PACKAG~1\{57A73~1\VC_RED~1.EXE

    Filesize

    674KB

    MD5

    80c124900fe2a6955fa8ef8e317da894

    SHA1

    4a6224f6b9344261cd8d373b572dc5a89f9e1ae7

    SHA256

    244efc6b493b0e65285259a2c1755d5fc84e3622b2487bd8d89dbc077654fdd8

    SHA512

    5a1a34a6e6179ab3a690e8186abf5b7e2407126632758e127b55f5af6af5eb7657629472bf4898b1883e7d725f03e7e8e45337687ebed19f6204b74593d8b047

  • C:\Users\ALLUSE~1\PACKAG~1\{61087~1\VCREDI~1.EXE

    Filesize

    536KB

    MD5

    a4520658cdbf168d2c320e37bb9dfdba

    SHA1

    519f1e681069148ffd29d1043d6f815b37797572

    SHA256

    fbd2d02523b9729e8cf84435700ab889b0648e9c367a889b765479b35e5409bc

    SHA512

    b9fb491858ee8cf42cabc7ceefb8c00a543cebbf59e1e7d0c659de2488886e354183f4d00b87c023bf59b29a4904c76d42c3507254aed6505ad368c4ec73100e

  • C:\Users\ALLUSE~1\PACKAG~1\{CA675~1\VCREDI~1.EXE

    Filesize

    485KB

    MD5

    f8090e8496b322fd6dd512c484f10b3c

    SHA1

    4ca215ba4ffe3dc657081da15e66f1494378e1bc

    SHA256

    9625759a71f257480d6c5956adaf86eb178ecbe62521ed91d2ad2a45813d1e00

    SHA512

    9c2eae3b34504dc2e4fafc3e08cce8ed240de871a6d47d57ac84da2e0fb7a4d445a9f2bbb4f2844eb4112a8e9b4ac9c226daeadfc14fe568bafe2d7659560a2b

  • C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE

    Filesize

    536KB

    MD5

    07e2e5e4db50a75a4bbfe44dbdc1f5aa

    SHA1

    c25f3772cbc726f82ea206b2462360cf29156dce

    SHA256

    0a978dbd27bf909ed5df411f963d44eac3ccebb493740e1fdbbb59801fb783c5

    SHA512

    3ad076f0c2cf3bf1bc51e292275f85387beeaae4984af597186f4821ec5c85b2a6118342e85340609d0248cce21a6b585c2e21c48534dec568fa2a0fbf09badc

  • C:\Users\Admin\AppData\Local\Temp\PE1.exe

    Filesize

    26KB

    MD5

    be686ea0e2b57294fb4b0578341613b4

    SHA1

    c86068b25721456e79a67748883ac5889881c45b

    SHA256

    abfaf3015363fcd4e22e46582dfcdeaf22cb2a5946509bc0424912390f5f3a79

    SHA512

    6d1486f3c665021ece38353c34a26662e5c40ef129cfeb33edf3a6fe7b98006808f06fb68a233a188d59b3a96a371abd130ef4eccdc02364fc2c6348d4cf44b6

  • C:\Users\Admin\AppData\Local\Temp\PE2.exe

    Filesize

    579KB

    MD5

    b9940c6838debd2a4118bac000958a69

    SHA1

    5ae0388a8f557d805d5fbbdbeb61ba38dce41b41

    SHA256

    d59e99796805e6773f7d2e7ab23c200d104401121b2345f6def90fa01732a3be

    SHA512

    e95e9074b4e0edfb58cbc280d0cd8e9ab015fcada40914f2bc4f023629a419e2dc7752e0507d20038aca966f1d8d879bb77b870c4773c16b7501fb53cfbda0c2

  • C:\Users\Admin\AppData\Local\Temp\tmp5023.tmp

    Filesize

    8B

    MD5

    b0bb716aeb29434c89466b52d0197ba4

    SHA1

    bbf5b34e56ec01dfbb06b07d08783b096863d8c2

    SHA256

    beb5e2717e701c7dffd829f6aa695cdd7d2a0401cb864fdfabf4db4cf82fcedc

    SHA512

    23236cf8b56b99da16ffb98cb1f8e17e2790e2e258a79085f954cecaa5f6b9fb63d32eb1b1e47da24333056ef1d55e69eef2970e66266a4575380521a581999d

  • C:\Windows\directx.sys

    Filesize

    43B

    MD5

    90653a16a90c8ab4e5ebbadb75a4aa74

    SHA1

    1be2d311bbb06ccd61ed1c58aa18adfc7a61a1c7

    SHA256

    f453097b9fbbae95f533e63f912165b7071b2a3e365a715582e3f6e622947e66

    SHA512

    ec9c520cacefa06d672d295966409b750470b8a30d960c1ef25f14368a3c7c5a0f57347651f44bbcfecad259896cd878bcf234116cfc208b84de7269b3fd82da

  • C:\Windows\svchost.com

    Filesize

    40KB

    MD5

    43fc4929871d14a18f2b3cff223b3aa9

    SHA1

    3a88de51da5bc9396042b14f39ecf192ee961251

    SHA256

    8a92655b90065f6e17165c09de1e045dcedcf05f335aa25e1d3d7acd057f9e47

    SHA512

    c7b6daeb476805e03f07cf24bb113d74601628afd3831fec3c8f5a8a02b0a5784a864576240f6d7674e7ba4ecf525132bf88c9044133bff244e1662dd1332a35

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\Ingektor.exe

    Filesize

    652KB

    MD5

    023fe8eda5c78704631d2bed34f13617

    SHA1

    41e355629590f0c46e206553b734b2b493c85736

    SHA256

    c0e47754f65040feeba68633a138d6bc86a4d1673749e33b88ad58e541f0ecde

    SHA512

    b5ac5b65c8211cef0133592b55f0abc9a324032a02e590898ad67cbe4c3f4dd7cd078d6bb803d9c9c9045103e8381247e1d562de1c0de328fbd7f207a7dcc770

  • \Users\Admin\AppData\Local\Temp\Ingektor.exe

    Filesize

    693KB

    MD5

    e122a745429bbe9429528392cf2f64fc

    SHA1

    b27cf1d499d32b569c765ff74f38278b08675d9c

    SHA256

    fe4e03644a5e1a8da8c2b7ad61eb350165f5c1d797bb5257f5a3a49ebb8df11f

    SHA512

    8be1b16c28e7a1183896f0edaf414fd797cb15b476bde5fdc5275b3d8c83636e5a0fae27847f62c0428ed3b6a358db5c9654572051bffcdd0f68d421f8ca5134

  • memory/1236-191-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1236-178-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1236-184-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1236-175-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1236-181-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1736-153-0x0000000000400000-0x00000000004FF000-memory.dmp

    Filesize

    1020KB

  • memory/1736-0-0x0000000000400000-0x00000000004FF000-memory.dmp

    Filesize

    1020KB

  • memory/2020-38-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2252-53-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2252-59-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2572-177-0x0000000000400000-0x0000000000497000-memory.dmp

    Filesize

    604KB

  • memory/2572-193-0x0000000000400000-0x0000000000497000-memory.dmp

    Filesize

    604KB

  • memory/2572-195-0x0000000000400000-0x0000000000497000-memory.dmp

    Filesize

    604KB

  • memory/2572-198-0x0000000000400000-0x0000000000497000-memory.dmp

    Filesize

    604KB

  • memory/2924-179-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2924-176-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2924-182-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2924-185-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2924-188-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2924-51-0x0000000001C70000-0x0000000001CC2000-memory.dmp

    Filesize

    328KB

  • memory/2924-52-0x0000000001C70000-0x0000000001CC2000-memory.dmp

    Filesize

    328KB

  • memory/2980-67-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB