Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2022, 12:00
Static task
static1
Behavioral task
behavioral1
Sample
675d64751eefe9a2af4254a4f6957ac5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
675d64751eefe9a2af4254a4f6957ac5.exe
Resource
win10v2004-20220901-en
General
-
Target
675d64751eefe9a2af4254a4f6957ac5.exe
-
Size
384KB
-
MD5
675d64751eefe9a2af4254a4f6957ac5
-
SHA1
6f96c406bb3acb1f7af7b120f43fcd8f526cb321
-
SHA256
cfa59023a6820fccfcd995c92427f3052bd161586efdc8aced27a2fa30dfbfeb
-
SHA512
6c7c140de71f7dbe292243c8d4c99a673b73e0852eafd7a083e410eeafd1c31216fa19528965d37079932d87ea9ac7e789fa77915f06c27d327925c10f204d64
-
SSDEEP
6144:jyH7xOc6H5c6HcT66vlmrbAFM9TXR1SHOCW4gGrPP5PbwL54jl59TBWAzNhALap7:ja74XTfCWTGrPxbs54x59TkVLapjj8M7
Malware Config
Signatures
-
Detect Neshta payload 2 IoCs
resource yara_rule behavioral2/files/0x0002000000022dec-139.dat family_neshta behavioral2/files/0x0002000000022dec-141.dat family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 675d64751eefe9a2af4254a4f6957ac5.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 4 IoCs
pid Process 5036 svchost.exe 3136 675d64751eefe9a2af4254a4f6957ac5.exe 1416 svchost.exe 1408 675d64751eefe9a2af4254a4f6957ac5.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 675d64751eefe9a2af4254a4f6957ac5.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javah.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jrunscript.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdb.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstack.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\extcheck.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdeps.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmap.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MI9C33~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\idlj.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe svchost.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javac.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jhat.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MICROS~4.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13167~1.21\MICROS~1.EXE 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 675d64751eefe9a2af4254a4f6957ac5.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe 675d64751eefe9a2af4254a4f6957ac5.exe File opened for modification C:\Windows\svchost.com 675d64751eefe9a2af4254a4f6957ac5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 675d64751eefe9a2af4254a4f6957ac5.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1912 wrote to memory of 5036 1912 675d64751eefe9a2af4254a4f6957ac5.exe 84 PID 1912 wrote to memory of 5036 1912 675d64751eefe9a2af4254a4f6957ac5.exe 84 PID 1912 wrote to memory of 5036 1912 675d64751eefe9a2af4254a4f6957ac5.exe 84 PID 5036 wrote to memory of 3136 5036 svchost.exe 85 PID 5036 wrote to memory of 3136 5036 svchost.exe 85 PID 5036 wrote to memory of 3136 5036 svchost.exe 85 PID 3136 wrote to memory of 1408 3136 675d64751eefe9a2af4254a4f6957ac5.exe 87 PID 3136 wrote to memory of 1408 3136 675d64751eefe9a2af4254a4f6957ac5.exe 87 PID 3136 wrote to memory of 1408 3136 675d64751eefe9a2af4254a4f6957ac5.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\675d64751eefe9a2af4254a4f6957ac5.exe"C:\Users\Admin\AppData\Local\Temp\675d64751eefe9a2af4254a4f6957ac5.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\675d64751eefe9a2af4254a4f6957ac5.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\675d64751eefe9a2af4254a4f6957ac5.exe"C:\Users\Admin\AppData\Local\Temp\675d64751eefe9a2af4254a4f6957ac5.exe"3⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\3582-490\675d64751eefe9a2af4254a4f6957ac5.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\675d64751eefe9a2af4254a4f6957ac5.exe"4⤵
- Executes dropped EXE
PID:1408
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1416
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD53800a751f42521cef0dcbb71cfc3d751
SHA1e440644ff9153259e8b75dc847959fe4d05deb14
SHA2564711a133dd40644509ff34dd24b5710bfe014c29a4c57bf80b2b5b3a5efae57d
SHA5127d87e213afa5d9121ade09731b6c46cdb0b659b38e95b46890cc4818a3d8d3fffa7c0a257bad24300f6c7dd978045c3fddd7498386a6a935a39aac1120db06e5
-
Filesize
308KB
MD53800a751f42521cef0dcbb71cfc3d751
SHA1e440644ff9153259e8b75dc847959fe4d05deb14
SHA2564711a133dd40644509ff34dd24b5710bfe014c29a4c57bf80b2b5b3a5efae57d
SHA5127d87e213afa5d9121ade09731b6c46cdb0b659b38e95b46890cc4818a3d8d3fffa7c0a257bad24300f6c7dd978045c3fddd7498386a6a935a39aac1120db06e5
-
Filesize
348KB
MD57261d4747ef2cdf19a79deb39a1b7ace
SHA1b64ec1a2e39fbea735ca434154ea9f3e1ad1d70d
SHA256be9b998016024ccd05b7aae335dc4fbca32ed54dfb6087b9cdf75b1e6f72a004
SHA5128b046efb4fc5c679ab476011fb97b055ac23a464cf31fdf055a9bc784e6092c37e2f160aa511744457b0a72de80b071ff7dc74f9805a5049cd6f1d44dd32cd0b
-
Filesize
348KB
MD57261d4747ef2cdf19a79deb39a1b7ace
SHA1b64ec1a2e39fbea735ca434154ea9f3e1ad1d70d
SHA256be9b998016024ccd05b7aae335dc4fbca32ed54dfb6087b9cdf75b1e6f72a004
SHA5128b046efb4fc5c679ab476011fb97b055ac23a464cf31fdf055a9bc784e6092c37e2f160aa511744457b0a72de80b071ff7dc74f9805a5049cd6f1d44dd32cd0b
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b