Analysis
-
max time kernel
164s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2024 20:02
Behavioral task
behavioral1
Sample
cca3a842ace17da425030764ad6ee1e3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cca3a842ace17da425030764ad6ee1e3.exe
Resource
win10v2004-20231215-en
General
-
Target
cca3a842ace17da425030764ad6ee1e3.exe
-
Size
4.4MB
-
MD5
cca3a842ace17da425030764ad6ee1e3
-
SHA1
a7af93570adcc057e44db5a64eab235f022e5a2d
-
SHA256
496c44eaf6f2df9a54fded426dc674f2f93ee4603f514900eeb06a169dce3751
-
SHA512
11fc4fe33523bb5040f218e07f92f74b3bf077acd1743699aef05e1341c82960017c2092e9b56ab2679fc46b735525f563458d5644ffed040b1d6b982db9d129
-
SSDEEP
49152:Fa35tY5FhBfpjB6SkKeW/nrN9itixC5QV9h1y6+jF2/Tsq7r/I8wKeKmCwjE34dJ:FtfTwoS5GwK8QQI05wb7KNL
Malware Config
Signatures
-
Detect Neshta payload 6 IoCs
resource yara_rule behavioral2/memory/116-0-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/116-2-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/116-18-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/116-19-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/116-20-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/116-21-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation cca3a842ace17da425030764ad6ee1e3.exe -
Executes dropped EXE 1 IoCs
pid Process 3964 cca3a842ace17da425030764ad6ee1e3.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" cca3a842ace17da425030764ad6ee1e3.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com cca3a842ace17da425030764ad6ee1e3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" cca3a842ace17da425030764ad6ee1e3.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 116 wrote to memory of 3964 116 cca3a842ace17da425030764ad6ee1e3.exe 103 PID 116 wrote to memory of 3964 116 cca3a842ace17da425030764ad6ee1e3.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\cca3a842ace17da425030764ad6ee1e3.exe"C:\Users\Admin\AppData\Local\Temp\cca3a842ace17da425030764ad6ee1e3.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cca3a842ace17da425030764ad6ee1e3.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\cca3a842ace17da425030764ad6ee1e3.exe"2⤵
- Executes dropped EXE
PID:3964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD59f2d86da7d58a70b0003307d9cfc2438
SHA1bd69ad6ea837e309232d7c4fd0e87e22c3266ac5
SHA2567052619814a614a1b157c5c94a92dbec22b425a0977ac8b21958b8db81e2dd65
SHA512ce345ff77d8043f416a04b782be8e7b0d5fdea933f3ac79abb88648a9fca23d7a69f537a825d0b636ba64f80afe70f758114ddbf412bd9398800ba4b6e359a99