Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2023, 09:37
Static task
static1
Behavioral task
behavioral1
Sample
CI.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
CI.exe
Resource
win10v2004-20230703-en
General
-
Target
CI.exe
-
Size
884KB
-
MD5
ce27430516a6f6d69371c99490f2e555
-
SHA1
085b6cfecb803a8afeef3ea65aedd5845fb06591
-
SHA256
7cf16fa9b84052ebac0f1752fd4cb2a9ffc8ffafc757f785376f2bde6fb554a5
-
SHA512
9327b737d518eddc865e8f238b2cbb892294fe756f5623cdf00fb04888dcccc3d4a26069dd9a5ad811327f20a04ac04d4561d8c66ec06d600ddb72c20a5d1d63
-
SSDEEP
24576:A6gCs3Mqx+4V4Yp0bHTABN2Qno2WbPZTj:A6Bs3MqA3sBno2
Malware Config
Signatures
-
Detect Neshta payload 6 IoCs
resource yara_rule behavioral2/memory/4964-151-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4964-152-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4964-154-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4964-157-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4964-282-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4964-284-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" CI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3700 set thread context of 4964 3700 CI.exe 95 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE CI.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe CI.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe CI.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe CI.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE CI.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe CI.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE CI.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe CI.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE CI.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE CI.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE CI.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE CI.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE CI.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13175~1.29\MICROS~4.EXE CI.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE CI.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe CI.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE CI.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13175~1.29\MICROS~2.EXE CI.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe CI.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE CI.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe CI.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE CI.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE CI.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE CI.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE CI.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE CI.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe CI.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE CI.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13175~1.29\MIA062~1.EXE CI.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe CI.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe CI.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE CI.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe CI.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE CI.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe CI.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe CI.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE CI.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe CI.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE CI.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe CI.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe CI.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE CI.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE CI.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe CI.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe CI.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE CI.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE CI.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE CI.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13175~1.29\MICROS~1.EXE CI.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE CI.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE CI.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE CI.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe CI.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe CI.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE CI.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13175~1.29\MI391D~1.EXE CI.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13175~1.29\MICROS~3.EXE CI.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE CI.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE CI.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE CI.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe CI.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe CI.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE CI.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe CI.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com CI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3612 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" CI.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3700 CI.exe 3700 CI.exe 3684 powershell.exe 3684 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3700 CI.exe Token: SeDebugPrivilege 3684 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3700 wrote to memory of 3684 3700 CI.exe 91 PID 3700 wrote to memory of 3684 3700 CI.exe 91 PID 3700 wrote to memory of 3684 3700 CI.exe 91 PID 3700 wrote to memory of 3612 3700 CI.exe 93 PID 3700 wrote to memory of 3612 3700 CI.exe 93 PID 3700 wrote to memory of 3612 3700 CI.exe 93 PID 3700 wrote to memory of 4964 3700 CI.exe 95 PID 3700 wrote to memory of 4964 3700 CI.exe 95 PID 3700 wrote to memory of 4964 3700 CI.exe 95 PID 3700 wrote to memory of 4964 3700 CI.exe 95 PID 3700 wrote to memory of 4964 3700 CI.exe 95 PID 3700 wrote to memory of 4964 3700 CI.exe 95 PID 3700 wrote to memory of 4964 3700 CI.exe 95 PID 3700 wrote to memory of 4964 3700 CI.exe 95 PID 3700 wrote to memory of 4964 3700 CI.exe 95 PID 3700 wrote to memory of 4964 3700 CI.exe 95 PID 3700 wrote to memory of 4964 3700 CI.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\CI.exe"C:\Users\Admin\AppData\Local\Temp\CI.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\SQdare.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SQdare" /XML "C:\Users\Admin\AppData\Local\Temp\tmp35C1.tmp"2⤵
- Creates scheduled task(s)
PID:3612
-
-
C:\Users\Admin\AppData\Local\Temp\CI.exe"C:\Users\Admin\AppData\Local\Temp\CI.exe"2⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
PID:4964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
843KB
MD5be30a004ac6ac5f8ecf0c52c0d21bfc3
SHA13de76284db11c9765b3233a655bd70016b15183d
SHA256d4da93062b4ba35de60487c347d9843352743ac380750ee25cdd7eae43a9ef59
SHA5129c4f5b7745dd94b92a30cf194c09d56ddf5d1feb5dcc1ffe3192720f69d751b728d4e87a55ebe5df14c6ca87441cf996939523a3f9396f0de9a844741f9a0fb1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5746b055357c6831b4593eee5839a79d0
SHA18d88e651c97ad7c7b02a4d3708d5109cc7c576f1
SHA25689ffa8dc384f355564ebb30a363d90e67927f4fe432f11691760b2d31dd9df16
SHA512b6da1bf88a193a6803ac61968871606d4a46098ebb214362e9d8f16cd8da5b4ca346bb09bf7d43579948e018409746fd940cabba2f1cf5c91ff675b9357d2fb3
-
Filesize
884KB
MD5ce27430516a6f6d69371c99490f2e555
SHA1085b6cfecb803a8afeef3ea65aedd5845fb06591
SHA2567cf16fa9b84052ebac0f1752fd4cb2a9ffc8ffafc757f785376f2bde6fb554a5
SHA5129327b737d518eddc865e8f238b2cbb892294fe756f5623cdf00fb04888dcccc3d4a26069dd9a5ad811327f20a04ac04d4561d8c66ec06d600ddb72c20a5d1d63
-
Filesize
5.1MB
MD5e25bd42634286c180233d3cb82dc6ce4
SHA188d9363bfd376d55c68f08fc65642fb111e5d214
SHA256f15f7eeff7ef269632f56058309d3aed8bef8a6011554a92d6ccdf41f5475fbe
SHA512204540189ff350621bcde931effb1d25e870c91760d5e8973bdffb307dc697913e9070782c325034966d526d4c3dadfe15f02514fcf800b3db51e9d5555669da