Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
16-12-2023 05:08
Behavioral task
behavioral1
Sample
2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe
Resource
win10v2004-20231215-en
General
-
Target
2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe
-
Size
82KB
-
MD5
f346aad7f24a9ab3442b802e0ef42cf3
-
SHA1
9b13e49b407a0fd3b558881e389458871180219b
-
SHA256
13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb
-
SHA512
74559ac477f7dbd050b8778ca09ef6c58db3fd680b994069ed3413b68b45a542e109daad0abe8c16bf35ba35e61f9fa49387b5ab483c92fad2660f00ecfeb49e
-
SSDEEP
1536:JxqjQ+P04wsmJCOXjlS1FKnDtkuImg61iF:sr85COXBS1FqtkuImgmiF
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\+README-WARNING+.txt
Signatures
-
Detect Neshta payload 3 IoCs
resource yara_rule behavioral1/files/0x000100000001030c-13.dat family_neshta behavioral1/memory/1960-481-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1960-489-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
MAKOP ransomware payload 1 IoCs
resource yara_rule behavioral1/files/0x000c000000013a83-2.dat family_makop -
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8323) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 1528 wbadmin.exe -
Executes dropped EXE 2 IoCs
pid Process 1760 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe 1028 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe -
Loads dropped DLL 3 IoCs
pid Process 1960 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe 1960 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe 1960 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6A97.tmp.bmp" 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrdeslm.dat 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_performance_Thumbnail.bmp 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.w3c.css.sac_1.3.1.v200903091627.jar 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-modules.xml 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\+README-WARNING+.txt 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Access.en-us\SETUP.XML 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\SKY.INF 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\NVBELL.NET.XML 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.COM.XML 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\COUPON.POC 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+11 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\calendar.css 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\add_over.png 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\webbase.xml 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Shades of Blue.htm 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN01545_.WMF 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME07.CSS 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\+README-WARNING+.txt 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-core-kit_ja.jar 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\Folder-48.png 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\gadget.xml 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\TipBand.dll.mui 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01743_.GIF 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Modern.dotx 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\DESKSAM.SAM 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\REMOTE.CFG 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BS53BOXS.POC 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainBackground_PAL.wmv 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\+README-WARNING+.txt 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Common Files\System\it-IT\wab32res.dll.mui 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0240189.WMF 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSO0127.ACL 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\eclipse.inf 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\curl-hot.png 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\distribute_form.gif 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0285808.WMF 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SMIMES.CFG 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\RTC.der.[34B3744A].[[email protected]].mkp 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02448_.WMF 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02116_.GIF 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\bg_GreenTea.gif 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\weather.js 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH03425I.JPG 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18199_.WMF 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-attach_zh_CN.jar 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\+README-WARNING+.txt 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\background.gif 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\msdaprsr.dll.mui 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\WMM2CLIP.dll.mui 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Boa_Vista 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-javahelp_ja.jar 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02750U.BMP 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21505_.GIF 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL012.XML 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\org-openide-util-lookup.jar 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-print_ja.jar 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0296277.WMF 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\PLANNERS.ONE 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationUp_ButtonGraphic.png 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01039_.WMF 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00938_.WMF 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2360 vssadmin.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 908 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1760 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 2776 vssvc.exe Token: SeRestorePrivilege 2776 vssvc.exe Token: SeAuditPrivilege 2776 vssvc.exe Token: SeBackupPrivilege 1712 wbengine.exe Token: SeRestorePrivilege 1712 wbengine.exe Token: SeSecurityPrivilege 1712 wbengine.exe Token: SeIncreaseQuotaPrivilege 1772 WMIC.exe Token: SeSecurityPrivilege 1772 WMIC.exe Token: SeTakeOwnershipPrivilege 1772 WMIC.exe Token: SeLoadDriverPrivilege 1772 WMIC.exe Token: SeSystemProfilePrivilege 1772 WMIC.exe Token: SeSystemtimePrivilege 1772 WMIC.exe Token: SeProfSingleProcessPrivilege 1772 WMIC.exe Token: SeIncBasePriorityPrivilege 1772 WMIC.exe Token: SeCreatePagefilePrivilege 1772 WMIC.exe Token: SeBackupPrivilege 1772 WMIC.exe Token: SeRestorePrivilege 1772 WMIC.exe Token: SeShutdownPrivilege 1772 WMIC.exe Token: SeDebugPrivilege 1772 WMIC.exe Token: SeSystemEnvironmentPrivilege 1772 WMIC.exe Token: SeRemoteShutdownPrivilege 1772 WMIC.exe Token: SeUndockPrivilege 1772 WMIC.exe Token: SeManageVolumePrivilege 1772 WMIC.exe Token: 33 1772 WMIC.exe Token: 34 1772 WMIC.exe Token: 35 1772 WMIC.exe Token: SeIncreaseQuotaPrivilege 1772 WMIC.exe Token: SeSecurityPrivilege 1772 WMIC.exe Token: SeTakeOwnershipPrivilege 1772 WMIC.exe Token: SeLoadDriverPrivilege 1772 WMIC.exe Token: SeSystemProfilePrivilege 1772 WMIC.exe Token: SeSystemtimePrivilege 1772 WMIC.exe Token: SeProfSingleProcessPrivilege 1772 WMIC.exe Token: SeIncBasePriorityPrivilege 1772 WMIC.exe Token: SeCreatePagefilePrivilege 1772 WMIC.exe Token: SeBackupPrivilege 1772 WMIC.exe Token: SeRestorePrivilege 1772 WMIC.exe Token: SeShutdownPrivilege 1772 WMIC.exe Token: SeDebugPrivilege 1772 WMIC.exe Token: SeSystemEnvironmentPrivilege 1772 WMIC.exe Token: SeRemoteShutdownPrivilege 1772 WMIC.exe Token: SeUndockPrivilege 1772 WMIC.exe Token: SeManageVolumePrivilege 1772 WMIC.exe Token: 33 1772 WMIC.exe Token: 34 1772 WMIC.exe Token: 35 1772 WMIC.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1760 1960 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe 28 PID 1960 wrote to memory of 1760 1960 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe 28 PID 1960 wrote to memory of 1760 1960 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe 28 PID 1960 wrote to memory of 1760 1960 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe 28 PID 1760 wrote to memory of 1788 1760 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe 30 PID 1760 wrote to memory of 1788 1760 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe 30 PID 1760 wrote to memory of 1788 1760 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe 30 PID 1760 wrote to memory of 1788 1760 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe 30 PID 1788 wrote to memory of 2360 1788 cmd.exe 32 PID 1788 wrote to memory of 2360 1788 cmd.exe 32 PID 1788 wrote to memory of 2360 1788 cmd.exe 32 PID 1788 wrote to memory of 1528 1788 cmd.exe 35 PID 1788 wrote to memory of 1528 1788 cmd.exe 35 PID 1788 wrote to memory of 1528 1788 cmd.exe 35 PID 1788 wrote to memory of 1772 1788 cmd.exe 39 PID 1788 wrote to memory of 1772 1788 cmd.exe 39 PID 1788 wrote to memory of 1772 1788 cmd.exe 39 PID 1760 wrote to memory of 280 1760 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe 46 PID 1760 wrote to memory of 280 1760 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe 46 PID 1760 wrote to memory of 280 1760 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe 46 PID 1760 wrote to memory of 280 1760 2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe 46 PID 280 wrote to memory of 908 280 cmd.exe 48 PID 280 wrote to memory of 908 280 cmd.exe 48 PID 280 wrote to memory of 908 280 cmd.exe 48 PID 280 wrote to memory of 908 280 cmd.exe 48 PID 280 wrote to memory of 1452 280 cmd.exe 49 PID 280 wrote to memory of 1452 280 cmd.exe 49 PID 280 wrote to memory of 1452 280 cmd.exe 49 PID 280 wrote to memory of 1452 280 cmd.exe 49 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe"C:\Users\Admin\AppData\Local\Temp\2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe"2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe" n17603⤵
- Executes dropped EXE
PID:1028
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2360
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:1528
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping 1.1.1.1 -n 5 & fsutil file setZeroData offset=0 length=131072 "C:\Users\Admin\AppData\Local\Temp\3582-490\2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe" & del /q /f "C:\Users\Admin\AppData\Local\Temp\3582-490\2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 54⤵
- Runs ping.exe
PID:908
-
-
C:\Windows\SysWOW64\fsutil.exefsutil file setZeroData offset=0 length=131072 "C:\Users\Admin\AppData\Local\Temp\3582-490\2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe"4⤵PID:1452
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:628
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:852
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5cf6c595d3e5e9667667af096762fd9c4
SHA19bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80
-
Filesize
1KB
MD55d377addd5fb119f9d200838847ff087
SHA18cdf851e8945d590a672a594cbce8fa354e4542e
SHA256dd62f39b01cf2120c9e21add9e80396b44704d3d9e5499de2ef26fa5824c10bb
SHA512c2779f2e5b30bd6d8337e6663cf17d4ae972f758a894d481b01b3d4f7336734259615592fb7a975b134f5cbc5db19647d26a32f7938c975c361c264d36eeae0c
-
Filesize
24B
MD5f6731655163698a1c30f016bdf7aa5cb
SHA113fb583bffe3faa4b8fa3b196ccd7c35a67bce3e
SHA2568e0c69dc08694e5c314861bda9300866cffc05c707556cdb022038cf9014da0b
SHA512e51a62c0df3099d14c72c89af06a8c45a9c0fdc960952b9268c1949e81af468a890d17df443fb2498d79bc1f01e433b97e0f6b25111ca097a8e9ba020f1d3ff5
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
\Users\Admin\AppData\Local\Temp\3582-490\2023-12-12_f346aad7f24a9ab3442b802e0ef42cf3_makop_neshta.exe
Filesize42KB
MD56096dec7644520ba1a4fdc04183bb62f
SHA1f0eae70b15d663787858a5cc24d8fdf21b67f225
SHA25668dd91e49256ee61ca05a5309db255e9ffe23e8df680ace95d48346e2a39c260
SHA5123680248b7ef0e7304268fa8b277f5c9d823c82185d0137bfa9d756ce9fb6406b1af0be5f4dfb73199a6ba4b175dbca97ac61600f140043a645279110750c8f05