Analysis

  • max time kernel
    141s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/02/2025, 06:51

General

  • Target

    JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe

  • Size

    290KB

  • MD5

    17f323bec00d6f79de04fb70dfd6ae90

  • SHA1

    cdae3448bc2e7fabb5bc0ef58576e0514f33a2d4

  • SHA256

    d46ed842a32260bad0dd158f4aa410911fc9727a84aba5b71fa60bbc75467c26

  • SHA512

    4b294c84df780101cff0201595da9def719eb932719927f77bfc0602ae0b36fee4e5a6a109b5fb6e4e28d82fc85f2b23d412ef9adf857662be55fc0ddeb439b9

  • SSDEEP

    6144:k9dMlJm51TscNLaVAmv/SW2GdqB8fLyH7xOc6H5c6HcT66vlmAzP:UMu7TBNLq7FdqB8TahP

Malware Config

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4892
    • C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1360
      • C:\Windows\svchost.exe
        "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4092
        • C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe
          "C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1836
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:1848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe

    Filesize

    214KB

    MD5

    c6e978cc66bce35ecd9cd1ba70f5f3b4

    SHA1

    53bafd43e80e047346613637c609900ef6b84c0b

    SHA256

    79d0f9acd574eac776f3d2dbaf42b4f41576aadf5b6d32a194d5e36e97bbe63f

    SHA512

    b3e4e95b657cb53c8b579aaca31ca25575acd9fa7e6d1a39cf5b1b660f268615dabe03ca9e2a9a2a97a0ac9aa4bc72222f6abf79b3117c742e70b8d44d3eb884

  • C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe

    Filesize

    249KB

    MD5

    a96fca49a0acd8de537ca82bf03d4430

    SHA1

    c5983de4c70f8117a8599f817d62527e60a1411c

    SHA256

    60e29544974ec0a52e69f4d27e66eefe4aaec65179b122b19cc4ec34d6cd2b8a

    SHA512

    afd960f665a7bd9beb64db604aaf7623969db79b604a03f5902285341801bbc34fe3a82ed39073c010444350c1ecab4f5a47f1cf5895682008852f354b92fffc

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    774b3bfe7e47e9f68302ac2e4a604b3c

    SHA1

    5db44cd4b34ebcc1d88eda7ec3bb3e63a0b96079

    SHA256

    ca060e436e3978ba01140f385b23607be0a5145b281c6934eb01ad67116c63d3

    SHA512

    796ac0cfbb52b2151dcad23d237fed4d97b379d676a1179628cc9fb6b88e8afe3dee0a29c26314e1d3a46e6d6ea08900c0a95f7acdfe0f1859a245fb380d36e9

  • memory/1360-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1848-141-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1848-151-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4092-22-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4892-140-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4892-142-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4892-145-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB