Analysis
-
max time kernel
165s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 05:00
Behavioral task
behavioral1
Sample
0f6181ddbcd053e6b7f391abbcdc27c5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0f6181ddbcd053e6b7f391abbcdc27c5.exe
Resource
win10v2004-20231215-en
General
-
Target
0f6181ddbcd053e6b7f391abbcdc27c5.exe
-
Size
233KB
-
MD5
0f6181ddbcd053e6b7f391abbcdc27c5
-
SHA1
5aae26bc5792ff2015251552c5fbf0a77dce1dca
-
SHA256
3c33d10e5a6aaa86c69f0740de2ac08bb92aa3d715454b94438d217098bb1ad1
-
SHA512
a0d935ffc87eb5d4a708995d11c9cb141c8783a9e619479e991d67182326694e065f364d62584e8c51a459c52756bda44c874297d6203cc54ac8f851c91818da
-
SSDEEP
3072:sr85C1d96HM0XU+aDe5UEjmIlmijI7rUGimM+M4MCimr4O7OAGBuHvsesf3nW:k9bn+aC1meyUGimM+wCimFOAzA3W
Malware Config
Signatures
-
Detect Neshta payload 13 IoCs
resource yara_rule behavioral2/memory/1816-0-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1816-2-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1816-19-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1816-21-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1816-22-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1816-23-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1816-24-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1816-25-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1816-26-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1816-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1816-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1816-29-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1816-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 0f6181ddbcd053e6b7f391abbcdc27c5.exe -
Executes dropped EXE 1 IoCs
pid Process 2584 0f6181ddbcd053e6b7f391abbcdc27c5.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 0f6181ddbcd053e6b7f391abbcdc27c5.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 0f6181ddbcd053e6b7f391abbcdc27c5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 47 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ED6430AB-420A-C3AB-64C0-A8FE920DBC6A}\1.0\ 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ED6430AB-420A-C3AB-64C0-A8FE920DBC6A}\1.0\0\win32\ = "C:\\Windows\\SysWOW64\\wbem\\wbemcntl.dll" 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\TypeLib\ = "{ED6430AB-420A-C3AB-64C0-A8FE920DBC6A}" 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\VersionIndependentProgID\ = "MsRDP.MsRDP" 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\Control\ 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\ProgID\ = "MsRDP.MsRDP.7" 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\Programmable\ 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ED6430AB-420A-C3AB-64C0-A8FE920DBC6A}\1.0\HELPDIR\ 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\Version\ 0f6181ddbcd053e6b7f391abbcdc27c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\VersionIndependentProgID 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\VersionIndependentProgID\ 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\InprocServer32\ 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\MiscStatus\ 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ED6430AB-420A-C3AB-64C0-A8FE920DBC6A}\1.0\FLAGS\ 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ED6430AB-420A-C3AB-64C0-A8FE920DBC6A}\ 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ED6430AB-420A-C3AB-64C0-A8FE920DBC6A}\1.0\0\win32\ 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ED6430AB-420A-C3AB-64C0-A8FE920DBC6A}\1.0\0\win64\ 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 0f6181ddbcd053e6b7f391abbcdc27c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\MiscStatus 0f6181ddbcd053e6b7f391abbcdc27c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\ProgID 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\ProgID\ 0f6181ddbcd053e6b7f391abbcdc27c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ED6430AB-420A-C3AB-64C0-A8FE920DBC6A}\1.0\0 0f6181ddbcd053e6b7f391abbcdc27c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\TypeLib 0f6181ddbcd053e6b7f391abbcdc27c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\Version 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\ = "Erobexi Bacax" 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\InprocServer32\ = "%systemroot%\\SysWow64\\mstscax.dll" 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ED6430AB-420A-C3AB-64C0-A8FE920DBC6A}\1.0\0\win64\ = "C:\\Windows\\SysWow64\\wbem\\wbemcntl.dll" 0f6181ddbcd053e6b7f391abbcdc27c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ED6430AB-420A-C3AB-64C0-A8FE920DBC6A}\1.0 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ED6430AB-420A-C3AB-64C0-A8FE920DBC6A}\1.0\ = "WMICntl 1.0 Type Library" 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ED6430AB-420A-C3AB-64C0-A8FE920DBC6A}\1.0\0\ 0f6181ddbcd053e6b7f391abbcdc27c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ED6430AB-420A-C3AB-64C0-A8FE920DBC6A}\1.0\0\win32 0f6181ddbcd053e6b7f391abbcdc27c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ED6430AB-420A-C3AB-64C0-A8FE920DBC6A}\1.0\0\win64 0f6181ddbcd053e6b7f391abbcdc27c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C} 0f6181ddbcd053e6b7f391abbcdc27c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\InprocServer32 0f6181ddbcd053e6b7f391abbcdc27c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ED6430AB-420A-C3AB-64C0-A8FE920DBC6A} 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ED6430AB-420A-C3AB-64C0-A8FE920DBC6A}\1.0\FLAGS\ = "0" 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\TypeLib\ 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ED6430AB-420A-C3AB-64C0-A8FE920DBC6A}\1.0\HELPDIR\ = "%SystemRoot%\\SysWow64\\wbem\\" 0f6181ddbcd053e6b7f391abbcdc27c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 0f6181ddbcd053e6b7f391abbcdc27c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\Control 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\MiscStatus\ = "0" 0f6181ddbcd053e6b7f391abbcdc27c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ED6430AB-420A-C3AB-64C0-A8FE920DBC6A}\1.0\HELPDIR 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\Version\ = "1.0" 0f6181ddbcd053e6b7f391abbcdc27c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 0f6181ddbcd053e6b7f391abbcdc27c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8DB32A59-B93E-4911-E2AC-8356656B2C0C}\Programmable 0f6181ddbcd053e6b7f391abbcdc27c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ED6430AB-420A-C3AB-64C0-A8FE920DBC6A}\1.0\FLAGS 0f6181ddbcd053e6b7f391abbcdc27c5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1816 wrote to memory of 2584 1816 0f6181ddbcd053e6b7f391abbcdc27c5.exe 96 PID 1816 wrote to memory of 2584 1816 0f6181ddbcd053e6b7f391abbcdc27c5.exe 96 PID 1816 wrote to memory of 2584 1816 0f6181ddbcd053e6b7f391abbcdc27c5.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f6181ddbcd053e6b7f391abbcdc27c5.exe"C:\Users\Admin\AppData\Local\Temp\0f6181ddbcd053e6b7f391abbcdc27c5.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0f6181ddbcd053e6b7f391abbcdc27c5.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\0f6181ddbcd053e6b7f391abbcdc27c5.exe"2⤵
- Executes dropped EXE
- Modifies registry class
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5b2c168fd95e5a9f02bd66b46f16c9138
SHA181270014e44a7624f2e983667a85cf794e6a75b3
SHA256701b6ed1712f12edbb9ab7660e7d5e8b92900ef57c90b8c15483781fc3d74674
SHA512747d888fc6dfea7f2a1f4300bfe469225cec1e6acdd1140693ba47816b32270f8fb949749d7f5cda988eb7df50a57bb5c7e1a21bdd622dc9e7f46c83d9703f01