Behavioral task
behavioral1
Sample
1ec3e31ba760a21130583265ed66f8c2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ec3e31ba760a21130583265ed66f8c2.exe
Resource
win10v2004-20231215-en
General
-
Target
1ec3e31ba760a21130583265ed66f8c2
-
Size
145KB
-
MD5
1ec3e31ba760a21130583265ed66f8c2
-
SHA1
bfa0f097659438cab51184bf42c105feba60ebd1
-
SHA256
99acd15996087765b7ea8ecfa600baef8758c755c7b4e1048e6101f45acf5135
-
SHA512
c4ebc2ba99e96a5f7b3a118f9a379cdb7d312f3e6b9ba81c737413b84af261c08af45dc13438ce0fe795944763744da312315cf7f27ab16399c51e161ec03203
-
SSDEEP
1536:j5OG3AtjCHVWF8gqI3RQNCF0ECahv8YeRO6fNCz5FI6k8Cy/jtOxqjQ+P04wsmJC:tOQAZCHVDyawx+/Ne5FI6k8Cy/lr85C
Malware Config
Signatures
-
Detect Neshta payload 1 IoCs
resource yara_rule sample family_neshta -
Neshta family
Files
-
1ec3e31ba760a21130583265ed66f8c2.exe windows:5 windows x86 arch:x86
57e5d898d86ffa019486545823bf0785
Code Sign
c1:00:8b:3c:3c:88:11:d1:3e:f6:63:ec:df:40Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before10/01/1997, 07:00Not After31/12/2020, 07:00SubjectCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft Corporationc1:00:8b:3c:3c:88:11:d1:3e:f6:63:ec:df:40Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before10/01/1997, 07:00Not After31/12/2020, 07:00SubjectCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft Corporation2e:ab:11:dc:50:ff:5c:9d:cb:c0Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before22/08/2007, 22:31Not After25/08/2012, 07:00SubjectCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:0f:78:4d:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before23/08/2007, 00:23Not After23/02/2009, 00:33SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
61:47:52:ba:00:00:00:00:00:04Certificate
IssuerCN=Microsoft Timestamping PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before16/09/2006, 01:53Not After16/09/2011, 02:03SubjectCN=Microsoft Timestamping Service,OU=nCipher DSE ESN:D8A9-CFCC-579C,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
61:49:7c:ed:00:00:00:00:00:05Certificate
IssuerCN=Microsoft Timestamping PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before16/09/2006, 01:55Not After16/09/2011, 02:05SubjectCN=Microsoft Timestamping Service,OU=nCipher DSE ESN:10D8-5847-CBF8,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
6a:0b:99:4f:c0:00:25:ab:11:db:45:1f:58:7a:67:a2Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before16/09/2006, 01:04Not After15/09/2019, 07:00SubjectCN=Microsoft Timestamping PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
9f:8b:93:2e:32:ed:f7:a1:0b:a3:2e:be:1b:43:d3:d2:c1:2a:1f:efSigner
Actual PE Digest9f:8b:93:2e:32:ed:f7:a1:0b:a3:2e:be:1b:43:d3:d2:c1:2a:1f:efDigest Algorithmsha1PE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExW
RegOpenKeyExW
GetTokenInformation
OpenProcessToken
EqualSid
OpenThreadToken
RegCloseKey
kernel32
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetCurrentProcessId
CloseHandle
GetCommandLineW
WaitForMultipleObjects
GetVersion
ExpandEnvironmentStringsW
MapViewOfFile
CreateFileMappingW
GetLastError
GetCurrentProcess
CancelWaitableTimer
SetWaitableTimer
UnmapViewOfFile
ReleaseMutex
SetEvent
WaitForSingleObject
CreateProcessW
GetCurrentThreadId
DuplicateHandle
CreateMutexW
CreateEventW
GetCurrentThread
CreateWaitableTimerW
SetPriorityClass
OpenEventW
GetModuleFileNameW
VirtualQuery
SetErrorMode
SetUnhandledExceptionFilter
HeapSetInformation
OpenProcess
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
InterlockedCompareExchange
Sleep
InterlockedExchange
IsDebuggerPresent
msvcr90
_time64
wcschr
_wcsdup
free
wcstoul
_wcsicmp
memmove
iswspace
_wfopen_s
fclose
_wdupenv_s
_snwprintf_s
_wctime64
swprintf_s
memcpy_s
_wpgmptr
memset
memcpy
malloc
strncpy_s
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
__winitenv
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
?terminate@@YAXXZ
_invoke_watson
_controlfp_s
_crt_debugger_hook
_purecall
??2@YAPAXI@Z
??3@YAXPAX@Z
wcsncpy_s
fflush
vfwprintf
fwprintf
__iob_func
exit
mspdbcore
?FOpen@MREngine@@SGHPAPAU1@PAUMreToPdb@@HH@Z
?FOpenW@MREngine@@SGHPAPAU1@PBGAAJPAGIHH@Z
?open@NameMap@@SAHPAUPDB@@HPAPAU1@@Z
?OpenEx2W@PDB@@SAHPBGPBDJPAJPAGIPAPAU1@@Z
?OpenValidate4@PDB@@SAHPBGPBDPBU_GUID@@KKPAJPAGIPAPAU1@@Z
?CloseAllTimeoutPDB@PDB@@SAHXZ
?SetErrorHandlerAPI@PDB@@SAHP6APAUIPDBError@@PAU1@@Z@Z
?SetPDBCloseTimeout@PDB@@SAH_K@Z
?ShutDownTimeoutManager@PDB@@SAHXZ
?FOpen@MREngine@@SGHPAPAU1@PAUPDB@@PAUNameMap@@HH@Z
rpcrt4
RpcMgmtInqStats
NdrServerCall2
NdrClientCall2
RpcImpersonateClient
RpcRevertToSelf
RpcServerUnregisterIf
RpcMgmtStopServerListening
RpcBindingInqAuthClientW
RpcServerListen
RpcServerRegisterIf2
RpcServerUseProtseqEpW
RpcMgmtStatsVectorFree
Sections
.text Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ