Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 02:55
Behavioral task
behavioral1
Sample
cc356545c3804c811c007ed5235d2aca.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cc356545c3804c811c007ed5235d2aca.exe
Resource
win10v2004-20231215-en
General
-
Target
cc356545c3804c811c007ed5235d2aca.exe
-
Size
139KB
-
MD5
cc356545c3804c811c007ed5235d2aca
-
SHA1
68239396dd04d70324e34709725a7fc8cf3af42b
-
SHA256
05e3af4fd7d70b843680c4b5b6fe251407a84b0dbea17ec04834f77cdd6dd241
-
SHA512
3829e0e218b75e5fbabc5bd30fdc7fcdc36bd534379963be0fd68e00a5cb311679b0967c788a08594ba004325d71afc5f12af4320c8cf1276cd68dc1f1e85d50
-
SSDEEP
1536:9xqjQ+P04wsmJCamVpgM+Wf3VkPVfT48Jnit4dXJlViN1U3/edr7QvQt3WpOck/t:wr85CaRMJ/cPiq5bVin8/edz+92mhTY
Malware Config
Signatures
-
Detect Neshta payload 12 IoCs
resource yara_rule behavioral1/memory/1992-0-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral1/files/0x000100000001031e-13.dat family_neshta behavioral1/memory/1992-95-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral1/memory/1992-97-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral1/memory/1992-96-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral1/memory/1992-99-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral1/memory/1992-100-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral1/memory/1992-101-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral1/memory/1992-102-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral1/memory/1992-103-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral1/memory/1992-104-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral1/memory/1992-106-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 1 IoCs
pid Process 2488 cc356545c3804c811c007ed5235d2aca.exe -
Loads dropped DLL 2 IoCs
pid Process 1992 cc356545c3804c811c007ed5235d2aca.exe 1992 cc356545c3804c811c007ed5235d2aca.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" cc356545c3804c811c007ed5235d2aca.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe cc356545c3804c811c007ed5235d2aca.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com cc356545c3804c811c007ed5235d2aca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main cc356545c3804c811c007ed5235d2aca.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" cc356545c3804c811c007ed5235d2aca.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2488 cc356545c3804c811c007ed5235d2aca.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2488 cc356545c3804c811c007ed5235d2aca.exe 2488 cc356545c3804c811c007ed5235d2aca.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2488 1992 cc356545c3804c811c007ed5235d2aca.exe 28 PID 1992 wrote to memory of 2488 1992 cc356545c3804c811c007ed5235d2aca.exe 28 PID 1992 wrote to memory of 2488 1992 cc356545c3804c811c007ed5235d2aca.exe 28 PID 1992 wrote to memory of 2488 1992 cc356545c3804c811c007ed5235d2aca.exe 28 PID 1992 wrote to memory of 2488 1992 cc356545c3804c811c007ed5235d2aca.exe 28 PID 1992 wrote to memory of 2488 1992 cc356545c3804c811c007ed5235d2aca.exe 28 PID 1992 wrote to memory of 2488 1992 cc356545c3804c811c007ed5235d2aca.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc356545c3804c811c007ed5235d2aca.exe"C:\Users\Admin\AppData\Local\Temp\cc356545c3804c811c007ed5235d2aca.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cc356545c3804c811c007ed5235d2aca.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\cc356545c3804c811c007ed5235d2aca.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5e0f2257e0ad4b04429c932673ead4884
SHA1352fcc1fe1019cd069ab52b409b31bbd0a08ea9a
SHA2566e11a49479c1d2b35f15901b0700e307712338f343e1c03fcfe715946fab5969
SHA512d77e790e63b1b2307df2ef0bb774bcbfa5cdc716764050dfa055a23449cffa5c6f61759b0819712f3e3be06037cbc3469082ba2b02af990017f28658f0103763
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
99KB
MD5eff25086b1367be1c11a523a37b4a5e1
SHA1146ba77646254aa1f8847749c9893a7bf40d7a7c
SHA2560c67baf01b1f2421f39a2a6ae3023cf1add734b60ca9d49de0e62f5711f25273
SHA5125087f363c3f6dbd0b8c4eda733419c654987836dd40dcc4c8fc297d0edf1a16446ad5dcd520b35f2afbf57deaf60e80b40d28826dd2d6932429181d205a183b0