Overview
overview
10Static
static
8announce.exe
windows7-x64
10announce.exe
windows10-2004-x64
1plugins/regex.so
ubuntu-18.04-amd64
1plugins/sscanf.dll
windows7-x64
3plugins/sscanf.dll
windows10-2004-x64
3plugins/sscanf.so
ubuntu-18.04-amd64
1plugins/streamer.dll
windows7-x64
3plugins/streamer.dll
windows10-2004-x64
3plugins/streamer.so
ubuntu-18.04-amd64
1samp-npc.exe
windows7-x64
10samp-npc.exe
windows10-2004-x64
10samp-server.exe
windows7-x64
10samp-server.exe
windows10-2004-x64
10scriptfile...ts.vbs
windows7-x64
1scriptfile...ts.vbs
windows10-2004-x64
1�...ts.vbs
windows7-x64
1�...ts.vbs
windows10-2004-x64
1�...ck.vbs
windows7-x64
1�...ck.vbs
windows10-2004-x64
1�...nc.dll
windows7-x64
1�...nc.dll
windows10-2004-x64
1�...cc.exe
windows7-x64
1�...cc.exe
windows10-2004-x64
1�...no.exe
windows7-x64
8�...no.exe
windows10-2004-x64
8Analysis
-
max time kernel
191s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 18:35
Behavioral task
behavioral1
Sample
announce.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
announce.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
plugins/regex.so
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral4
Sample
plugins/sscanf.dll
Resource
win7-20221111-en
Behavioral task
behavioral5
Sample
plugins/sscanf.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral6
Sample
plugins/sscanf.so
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral7
Sample
plugins/streamer.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
plugins/streamer.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
plugins/streamer.so
Resource
ubuntu1804-amd64-20221111-en
Behavioral task
behavioral10
Sample
samp-npc.exe
Resource
win7-20220812-en
Behavioral task
behavioral11
Sample
samp-npc.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral12
Sample
samp-server.exe
Resource
win7-20221111-en
Behavioral task
behavioral13
Sample
samp-server.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral14
Sample
scriptfiles/ladmin/logs/Objects.vbs
Resource
win7-20220812-en
Behavioral task
behavioral15
Sample
scriptfiles/ladmin/logs/Objects.vbs
Resource
win10v2004-20221111-en
Behavioral task
behavioral16
Sample
/pawno/include/a_objects.vbs
Resource
win7-20220812-en
Behavioral task
behavioral17
Sample
/pawno/include/a_objects.vbs
Resource
win10v2004-20221111-en
Behavioral task
behavioral18
Sample
/pawno/include/antiattack.vbs
Resource
win7-20220812-en
Behavioral task
behavioral19
Sample
/pawno/include/antiattack.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral20
Sample
/pawno/libpawnc.dll
Resource
win7-20220812-en
Behavioral task
behavioral21
Sample
/pawno/libpawnc.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral22
Sample
/pawno/pawncc.exe
Resource
win7-20221111-en
Behavioral task
behavioral23
Sample
/pawno/pawncc.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral24
Sample
/pawno/pawno.exe
Resource
win7-20221111-en
Behavioral task
behavioral25
Sample
/pawno/pawno.exe
Resource
win10v2004-20220901-en
General
-
Target
samp-npc.exe
-
Size
392KB
-
MD5
5a1e2e8b2fca5a40ab426bd3f533b3f2
-
SHA1
7f73f23a7b16aa3c8262d76fc30b1e514cfbe7de
-
SHA256
b9c417d03289754578824f61d7788c8e1967610d29c9a8a63a53fc22fa366805
-
SHA512
514e32472eac1ebdf963136e1d80f249e4c097a4926e362697d005f3100add5afd7f76a4e1b59b321800eabe5ab42f0261b318939d5c3d63f60e4ed18fc9d9e2
-
SSDEEP
6144:Pu++THBU7JnFjlJlQ8TM4r0zsaBuxtj/cjAOvP99qqDLuEnIorHSzhl6GkkakJL:9+TIvSGrOsaBuPcjwqnuqI7LaQL
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
samp-npc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" samp-npc.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 1 IoCs
Processes:
samp-npc.exepid process 4888 samp-npc.exe -
Processes:
resource yara_rule behavioral11/memory/4888-135-0x0000000002280000-0x000000000330E000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
samp-npc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation samp-npc.exe -
Drops file in Windows directory 1 IoCs
Processes:
samp-npc.exedescription ioc process File opened for modification C:\Windows\svchost.com samp-npc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
samp-npc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" samp-npc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
samp-npc.exedescription pid process target process PID 5108 wrote to memory of 4888 5108 samp-npc.exe samp-npc.exe PID 5108 wrote to memory of 4888 5108 samp-npc.exe samp-npc.exe PID 5108 wrote to memory of 4888 5108 samp-npc.exe samp-npc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\samp-npc.exe"C:\Users\Admin\AppData\Local\Temp\samp-npc.exe"1⤵
- Modifies system executable filetype association
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\samp-npc.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\samp-npc.exe"2⤵
- Executes dropped EXE
PID:4888
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD59e569f1233a9742a0562c3ac17932710
SHA1d5adb4084a72f3d535042aff65ad15933963fa8a
SHA256004d3f22807c96b01745ac4e23eb6039b7318a8aaca5c12cab9bd6a087244042
SHA512078cf2241e4e821cd7c30931efc74a965c553314a61a8b078190848fd6d6ef5be33dc3e79e27b73069d6b1560d62d8deeaf2a24d4f0c5e27ba79f4f6210e3f81
-
Filesize
352KB
MD59e569f1233a9742a0562c3ac17932710
SHA1d5adb4084a72f3d535042aff65ad15933963fa8a
SHA256004d3f22807c96b01745ac4e23eb6039b7318a8aaca5c12cab9bd6a087244042
SHA512078cf2241e4e821cd7c30931efc74a965c553314a61a8b078190848fd6d6ef5be33dc3e79e27b73069d6b1560d62d8deeaf2a24d4f0c5e27ba79f4f6210e3f81