Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2023, 18:53
Behavioral task
behavioral1
Sample
818133edf6333d7ce79b0e4c40ce56f0.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
818133edf6333d7ce79b0e4c40ce56f0.exe
Resource
win10v2004-20231020-en
General
-
Target
818133edf6333d7ce79b0e4c40ce56f0.exe
-
Size
1.5MB
-
MD5
818133edf6333d7ce79b0e4c40ce56f0
-
SHA1
ba6c27234fcbcbc12766418edbc149c5807b0202
-
SHA256
c7a2482c7743d0b5a18d6c2b135d6d13153caf163906e11d0adf26ac693f9eac
-
SHA512
0408be8e9516c4d7ac42e8c2413b0238c77e5914bc86628699b211b300b2425ac6f8f64584cad293afc499ae4d57253a9d59389a29f8a80a96bce2abc922a339
-
SSDEEP
12288:mLJa+7PGqmyXvaO+Ow51+ktKjxZyu7qroycqYgIQG3G:mLh/HXvr+7d8jxZPyonQGW
Malware Config
Signatures
-
Detect Neshta payload 9 IoCs
resource yara_rule behavioral2/files/0x000700000001effc-20.dat family_neshta behavioral2/memory/892-102-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/892-103-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/892-104-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/892-105-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/892-106-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/892-107-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/892-108-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/892-110-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation 818133edf6333d7ce79b0e4c40ce56f0.exe -
Executes dropped EXE 1 IoCs
pid Process 2580 818133edf6333d7ce79b0e4c40ce56f0.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 818133edf6333d7ce79b0e4c40ce56f0.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13177~1.11\MICROS~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13177~1.11\MI391D~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13177~1.11\MIA062~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13177~1.11\MICROS~3.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13177~1.11\MICROS~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13177~1.11\MI9C33~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13177~1.11\MICROS~4.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 818133edf6333d7ce79b0e4c40ce56f0.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 818133edf6333d7ce79b0e4c40ce56f0.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 818133edf6333d7ce79b0e4c40ce56f0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 818133edf6333d7ce79b0e4c40ce56f0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 892 wrote to memory of 2580 892 818133edf6333d7ce79b0e4c40ce56f0.exe 86 PID 892 wrote to memory of 2580 892 818133edf6333d7ce79b0e4c40ce56f0.exe 86 PID 892 wrote to memory of 2580 892 818133edf6333d7ce79b0e4c40ce56f0.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\818133edf6333d7ce79b0e4c40ce56f0.exe"C:\Users\Admin\AppData\Local\Temp\818133edf6333d7ce79b0e4c40ce56f0.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\818133edf6333d7ce79b0e4c40ce56f0.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\818133edf6333d7ce79b0e4c40ce56f0.exe"2⤵
- Executes dropped EXE
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD58ffc3bdf4a1903d9e28b99d1643fc9c7
SHA1919ba8594db0ae245a8abd80f9f3698826fc6fe5
SHA2568268d3fefe8ca96a25a73690d14bacf644170ab5e9e70d2f8eeb350a4c83f9f6
SHA5120b94ead97374d74eaee87e7614ddd3911d2cf66d4c49abbfd06b02c03e5dd56fd00993b4947e8a4bcd9d891fa39cab18cc6b61efc7d0812e91eb3aea9cd1a427
-
Filesize
1.5MB
MD58785d840d29c3ff362fd37a6c004f448
SHA1f1979ee7e7de177a95a119a27e777df75d2618ed
SHA256c362dff4dc26c9d2e8fecf949997914c0c5f19bf4ec9160ead5ccbf49d11a8ee
SHA512145da2a0862fadd0f77fb6fff9aa8c6086d3750d671f729da60d0192e887006799d0a62201e6c9ae116d95108e8d032ec1e4e0caa2a51af9a52edffcc2c7358f
-
Filesize
1.5MB
MD58785d840d29c3ff362fd37a6c004f448
SHA1f1979ee7e7de177a95a119a27e777df75d2618ed
SHA256c362dff4dc26c9d2e8fecf949997914c0c5f19bf4ec9160ead5ccbf49d11a8ee
SHA512145da2a0862fadd0f77fb6fff9aa8c6086d3750d671f729da60d0192e887006799d0a62201e6c9ae116d95108e8d032ec1e4e0caa2a51af9a52edffcc2c7358f
-
Filesize
1.5MB
MD58785d840d29c3ff362fd37a6c004f448
SHA1f1979ee7e7de177a95a119a27e777df75d2618ed
SHA256c362dff4dc26c9d2e8fecf949997914c0c5f19bf4ec9160ead5ccbf49d11a8ee
SHA512145da2a0862fadd0f77fb6fff9aa8c6086d3750d671f729da60d0192e887006799d0a62201e6c9ae116d95108e8d032ec1e4e0caa2a51af9a52edffcc2c7358f