Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2023, 07:36
Behavioral task
behavioral1
Sample
server.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
server.exe
Resource
win10v2004-20230221-en
General
-
Target
server.exe
-
Size
149KB
-
MD5
6f2e1c1cb75be2e41c2e584ad9519185
-
SHA1
091930c27a0515907848c3ff639f3f9342584e26
-
SHA256
540a9949b24402819b69c2e701ac9a28d8a1f2e6c58fbf7abc63bbc1dc5ce53d
-
SHA512
6c8fc29b79b273785edecefd4fb6f314e9b6780e7c6a7616ff954cab7a1faf47cc5eab2ebdd9df536da45425c9f0249e98a6bda8e65ed5f591de706d82d55a70
-
SSDEEP
1536:JxqjQ+P04wsmJCDcQlwJdMgxHJaAoHoc2x7bZoYBMHJaAoHoc2x7bZoYBS:sr85CDkPJQITxyYoQITxyY0
Malware Config
Signatures
-
Detect Neshta payload 11 IoCs
resource yara_rule behavioral2/files/0x000700000001f009-156.dat family_neshta behavioral2/memory/2348-229-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2348-230-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2348-231-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2348-232-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2348-233-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2348-234-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2348-235-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2348-236-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2348-237-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2348-239-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
RunningRat
RunningRat is a remote access trojan first seen in 2018.
-
RunningRat payload 4 IoCs
resource yara_rule behavioral2/files/0x0009000000023142-137.dat family_runningrat behavioral2/files/0x0009000000023142-139.dat family_runningrat behavioral2/files/0x0009000000023142-141.dat family_runningrat behavioral2/memory/4304-143-0x0000000010000000-0x000000001000F000-memory.dmp family_runningrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation server.exe -
Executes dropped EXE 1 IoCs
pid Process 4304 server.exe -
Loads dropped DLL 2 IoCs
pid Process 4304 server.exe 4304 server.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" server.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\240545937.dll server.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe server.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE server.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE server.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13173~1.45\MI9C33~1.EXE server.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe server.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe server.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe server.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe server.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE server.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE server.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE server.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe server.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE server.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13173~1.45\MIA062~1.EXE server.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13173~1.45\MICROS~1.EXE server.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE server.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE server.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13173~1.45\MICROS~3.EXE server.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE server.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE server.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe server.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13173~1.45\MICROS~2.EXE server.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe server.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE server.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe server.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe server.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE server.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe server.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE server.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE server.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE server.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe server.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE server.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE server.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE server.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE server.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe server.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE server.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe server.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE server.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe server.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE server.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe server.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE server.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE server.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe server.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE server.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE server.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe server.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13173~1.45\MI391D~1.EXE server.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe server.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE server.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE server.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe server.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe server.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe server.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE server.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13173~1.45\MICROS~1.EXE server.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13173~1.45\MICROS~4.EXE server.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe server.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE server.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE server.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE server.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe server.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5104 4304 WerFault.exe 82 -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" server.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2348 wrote to memory of 4304 2348 server.exe 82 PID 2348 wrote to memory of 4304 2348 server.exe 82 PID 2348 wrote to memory of 4304 2348 server.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\3582-490\server.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\server.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:4304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 4643⤵
- Program crash
PID:5104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4304 -ip 43041⤵PID:3656
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD58ffc3bdf4a1903d9e28b99d1643fc9c7
SHA1919ba8594db0ae245a8abd80f9f3698826fc6fe5
SHA2568268d3fefe8ca96a25a73690d14bacf644170ab5e9e70d2f8eeb350a4c83f9f6
SHA5120b94ead97374d74eaee87e7614ddd3911d2cf66d4c49abbfd06b02c03e5dd56fd00993b4947e8a4bcd9d891fa39cab18cc6b61efc7d0812e91eb3aea9cd1a427
-
Filesize
108KB
MD50476e0ff19dc008b1d02758d9a926b62
SHA131aa40a2030671d5104eea4aeb56ec1932334b52
SHA25688c48fd936aed853b3d1b2a98ce73230318e571056e7341ba4d620ac78f0dae7
SHA512f4f4e49c203ee2cf4fd5b26523b696947eb0c2761b5f3e10fcf29c21a16c6201b6047851829ce108350b8d9ee7bd2837242a6948f605cd2e0e0f9e143c2b43c6
-
Filesize
108KB
MD50476e0ff19dc008b1d02758d9a926b62
SHA131aa40a2030671d5104eea4aeb56ec1932334b52
SHA25688c48fd936aed853b3d1b2a98ce73230318e571056e7341ba4d620ac78f0dae7
SHA512f4f4e49c203ee2cf4fd5b26523b696947eb0c2761b5f3e10fcf29c21a16c6201b6047851829ce108350b8d9ee7bd2837242a6948f605cd2e0e0f9e143c2b43c6
-
Filesize
108KB
MD50476e0ff19dc008b1d02758d9a926b62
SHA131aa40a2030671d5104eea4aeb56ec1932334b52
SHA25688c48fd936aed853b3d1b2a98ce73230318e571056e7341ba4d620ac78f0dae7
SHA512f4f4e49c203ee2cf4fd5b26523b696947eb0c2761b5f3e10fcf29c21a16c6201b6047851829ce108350b8d9ee7bd2837242a6948f605cd2e0e0f9e143c2b43c6
-
Filesize
37KB
MD54103032917619dcc7106b44c7e352896
SHA1408b944b675bc32d4b4f179c62a1f4fb4afbecc4
SHA256ebf8697f5794258807543aa65ee24c44d7a705f4696e993c403425dacd7b2986
SHA512178f9816a1e8467fdce2fab4f188c0e897ddec82eb101696b3af49bcaed93942746f9a3ade5718d7d47477e415beaf0ad638751dca87adb99c425d409cde9c56
-
Filesize
37KB
MD54103032917619dcc7106b44c7e352896
SHA1408b944b675bc32d4b4f179c62a1f4fb4afbecc4
SHA256ebf8697f5794258807543aa65ee24c44d7a705f4696e993c403425dacd7b2986
SHA512178f9816a1e8467fdce2fab4f188c0e897ddec82eb101696b3af49bcaed93942746f9a3ade5718d7d47477e415beaf0ad638751dca87adb99c425d409cde9c56