Analysis
-
max time kernel
146s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 02:55
Behavioral task
behavioral1
Sample
cc356545c3804c811c007ed5235d2aca.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cc356545c3804c811c007ed5235d2aca.exe
Resource
win10v2004-20231215-en
General
-
Target
cc356545c3804c811c007ed5235d2aca.exe
-
Size
139KB
-
MD5
cc356545c3804c811c007ed5235d2aca
-
SHA1
68239396dd04d70324e34709725a7fc8cf3af42b
-
SHA256
05e3af4fd7d70b843680c4b5b6fe251407a84b0dbea17ec04834f77cdd6dd241
-
SHA512
3829e0e218b75e5fbabc5bd30fdc7fcdc36bd534379963be0fd68e00a5cb311679b0967c788a08594ba004325d71afc5f12af4320c8cf1276cd68dc1f1e85d50
-
SSDEEP
1536:9xqjQ+P04wsmJCamVpgM+Wf3VkPVfT48Jnit4dXJlViN1U3/edr7QvQt3WpOck/t:wr85CaRMJ/cPiq5bVin8/edz+92mhTY
Malware Config
Signatures
-
Detect Neshta payload 13 IoCs
resource yara_rule behavioral2/memory/3780-0-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral2/files/0x0006000000020041-13.dat family_neshta behavioral2/memory/3780-96-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral2/memory/3780-97-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral2/memory/3780-98-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral2/memory/3780-99-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral2/memory/3780-101-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral2/memory/3780-102-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral2/memory/3780-103-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral2/memory/3780-104-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral2/memory/3780-108-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral2/memory/3780-109-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral2/memory/3780-110-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation cc356545c3804c811c007ed5235d2aca.exe -
Executes dropped EXE 1 IoCs
pid Process 3564 cc356545c3804c811c007ed5235d2aca.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" cc356545c3804c811c007ed5235d2aca.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13181~1.5\MICROS~4.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13181~1.5\MICROS~3.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13181~1.5\MIA062~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13181~1.5\MICROS~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~3\PACKAG~1\{FB050~1\WINDOW~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13181~1.5\MICROS~2.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13181~1.5\MI391D~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~3\PACKAG~1\{17316~1\WINDOW~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE cc356545c3804c811c007ed5235d2aca.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe cc356545c3804c811c007ed5235d2aca.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com cc356545c3804c811c007ed5235d2aca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" cc356545c3804c811c007ed5235d2aca.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3564 cc356545c3804c811c007ed5235d2aca.exe 3564 cc356545c3804c811c007ed5235d2aca.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3780 wrote to memory of 3564 3780 cc356545c3804c811c007ed5235d2aca.exe 91 PID 3780 wrote to memory of 3564 3780 cc356545c3804c811c007ed5235d2aca.exe 91 PID 3780 wrote to memory of 3564 3780 cc356545c3804c811c007ed5235d2aca.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc356545c3804c811c007ed5235d2aca.exe"C:\Users\Admin\AppData\Local\Temp\cc356545c3804c811c007ed5235d2aca.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cc356545c3804c811c007ed5235d2aca.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\cc356545c3804c811c007ed5235d2aca.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD5eb1472fd0361cbcbcd720096e0ce508d
SHA1672d0210443e0a6bcca330bf93c0cdec7dbd288f
SHA2562b9778a21865eccea1965edd8aace8d9407985fa4fb308f5f879f0fee1b716c4
SHA512699edd73618719b999de025ada17acf634ae69682620c3f39c8fe6eb470eb740f3abcd8cbf3172032e36255d4c394f00e251edc276e86515f8a817e6af053ced
-
Filesize
92KB
MD5b3d89dac6682adcb8bf734380e073159
SHA169fa0c768d34632eeba44936986d28f14a2ee493
SHA2563a8dd70143018e233ef25626fc42e71669790c25087cecc12df42dde67745bc6
SHA512eba30d8c4c32ed1a07d9c5928848aa6e9d389496ca311142c785334f91377bebffc4203e2d53e672da5c4263d8a753029d61bf455e97989acd625c94b410d9c0
-
Filesize
99KB
MD5eff25086b1367be1c11a523a37b4a5e1
SHA1146ba77646254aa1f8847749c9893a7bf40d7a7c
SHA2560c67baf01b1f2421f39a2a6ae3023cf1add734b60ca9d49de0e62f5711f25273
SHA5125087f363c3f6dbd0b8c4eda733419c654987836dd40dcc4c8fc297d0edf1a16446ad5dcd520b35f2afbf57deaf60e80b40d28826dd2d6932429181d205a183b0