Analysis
-
max time kernel
141s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2025, 06:51
Behavioral task
behavioral1
Sample
JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe
-
Size
290KB
-
MD5
17f323bec00d6f79de04fb70dfd6ae90
-
SHA1
cdae3448bc2e7fabb5bc0ef58576e0514f33a2d4
-
SHA256
d46ed842a32260bad0dd158f4aa410911fc9727a84aba5b71fa60bbc75467c26
-
SHA512
4b294c84df780101cff0201595da9def719eb932719927f77bfc0602ae0b36fee4e5a6a109b5fb6e4e28d82fc85f2b23d412ef9adf857662be55fc0ddeb439b9
-
SSDEEP
6144:k9dMlJm51TscNLaVAmv/SW2GdqB8fLyH7xOc6H5c6HcT66vlmAzP:UMu7TBNLq7FdqB8TahP
Malware Config
Signatures
-
Detect Neshta payload 4 IoCs
resource yara_rule behavioral2/files/0x0006000000020337-28.dat family_neshta behavioral2/memory/4892-140-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4892-142-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4892-145-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe -
Executes dropped EXE 4 IoCs
pid Process 1360 JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe 4092 svchost.exe 1836 JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe 1848 svchost.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\INSTAL~1\setup.exe JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\ELEVAT~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\PWAHEL~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~2\13195~1.43\MI391D~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\COOKIE~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\NOTIFI~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~2\13195~1.43\MICROS~2.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13195~1.43\MICROS~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe File opened for modification C:\Windows\svchost.com JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4892 wrote to memory of 1360 4892 JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe 85 PID 4892 wrote to memory of 1360 4892 JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe 85 PID 4892 wrote to memory of 1360 4892 JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe 85 PID 1360 wrote to memory of 4092 1360 JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe 86 PID 1360 wrote to memory of 4092 1360 JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe 86 PID 1360 wrote to memory of 4092 1360 JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe 86 PID 4092 wrote to memory of 1836 4092 svchost.exe 88 PID 4092 wrote to memory of 1836 4092 svchost.exe 88 PID 4092 wrote to memory of 1836 4092 svchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_17f323bec00d6f79de04fb70dfd6ae90.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1836
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD53b73078a714bf61d1c19ebc3afc0e454
SHA19abeabd74613a2f533e2244c9ee6f967188e4e7e
SHA256ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29
SHA51275959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4
-
Filesize
214KB
MD5c6e978cc66bce35ecd9cd1ba70f5f3b4
SHA153bafd43e80e047346613637c609900ef6b84c0b
SHA25679d0f9acd574eac776f3d2dbaf42b4f41576aadf5b6d32a194d5e36e97bbe63f
SHA512b3e4e95b657cb53c8b579aaca31ca25575acd9fa7e6d1a39cf5b1b660f268615dabe03ca9e2a9a2a97a0ac9aa4bc72222f6abf79b3117c742e70b8d44d3eb884
-
Filesize
249KB
MD5a96fca49a0acd8de537ca82bf03d4430
SHA1c5983de4c70f8117a8599f817d62527e60a1411c
SHA25660e29544974ec0a52e69f4d27e66eefe4aaec65179b122b19cc4ec34d6cd2b8a
SHA512afd960f665a7bd9beb64db604aaf7623969db79b604a03f5902285341801bbc34fe3a82ed39073c010444350c1ecab4f5a47f1cf5895682008852f354b92fffc
-
Filesize
35KB
MD5774b3bfe7e47e9f68302ac2e4a604b3c
SHA15db44cd4b34ebcc1d88eda7ec3bb3e63a0b96079
SHA256ca060e436e3978ba01140f385b23607be0a5145b281c6934eb01ad67116c63d3
SHA512796ac0cfbb52b2151dcad23d237fed4d97b379d676a1179628cc9fb6b88e8afe3dee0a29c26314e1d3a46e6d6ea08900c0a95f7acdfe0f1859a245fb380d36e9