Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29-03-2024 07:30
Static task
static1
Behavioral task
behavioral1
Sample
Current Invoice.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Current Invoice.exe
Resource
win10v2004-20240226-en
General
-
Target
Current Invoice.exe
-
Size
758KB
-
MD5
a0e731bdd58096ba8ca50487f5410f5d
-
SHA1
30e34aa1d32c059c6b0fa7ffe5461c98fb32bb60
-
SHA256
f9c6d61e21bab262adb55358862e97b2c0cd9b13a6a73129510f24a917558911
-
SHA512
55f69375728fa02162ddb5ab70f87e24cab20f94a34ef344b13c4a3bd253d953ce426c47900839d1e51ddf7c21f2e2a41bfa47f69db80d097bd0da4f0ba4d4be
-
SSDEEP
12288:ScLK1kRVYUp7rasx7h+22PhQVgZQZNdI87f25NdNM+NwmgF5hkAudYPFS6ryom1s:Scik/YmHashh+3PWTnI87eVNM+NwmgFv
Malware Config
Signatures
-
Detect Neshta payload 5 IoCs
resource yara_rule behavioral1/memory/3000-15-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3000-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3000-17-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3000-19-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3000-101-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Loads dropped DLL 1 IoCs
pid Process 3000 Current Invoice.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" Current Invoice.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3048 set thread context of 3000 3048 Current Invoice.exe 28 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe Current Invoice.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe Current Invoice.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe Current Invoice.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE Current Invoice.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE Current Invoice.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe Current Invoice.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe Current Invoice.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe Current Invoice.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe Current Invoice.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe Current Invoice.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe Current Invoice.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe Current Invoice.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe Current Invoice.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe Current Invoice.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe Current Invoice.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE Current Invoice.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE Current Invoice.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com Current Invoice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" Current Invoice.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3048 wrote to memory of 3000 3048 Current Invoice.exe 28 PID 3048 wrote to memory of 3000 3048 Current Invoice.exe 28 PID 3048 wrote to memory of 3000 3048 Current Invoice.exe 28 PID 3048 wrote to memory of 3000 3048 Current Invoice.exe 28 PID 3048 wrote to memory of 3000 3048 Current Invoice.exe 28 PID 3048 wrote to memory of 3000 3048 Current Invoice.exe 28 PID 3048 wrote to memory of 3000 3048 Current Invoice.exe 28 PID 3048 wrote to memory of 3000 3048 Current Invoice.exe 28 PID 3048 wrote to memory of 3000 3048 Current Invoice.exe 28 PID 3048 wrote to memory of 3000 3048 Current Invoice.exe 28 PID 3048 wrote to memory of 3000 3048 Current Invoice.exe 28 PID 3048 wrote to memory of 3000 3048 Current Invoice.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Current Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Current Invoice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Current Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Current Invoice.exe"2⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5a1f59d99a9baa22ed85d43441db39f1f
SHA1e450981d26e8badf8118b9e90279d26894b716d2
SHA2569bbe0e52e15f5d44fb7a1ff1a10a01bc72540784b7c0e8cbb5072ff87f598327
SHA5126a795c7f3bce775d78678d464ab5cc7228d6c2cef0890ca14f9a06ec46c5293ba1aa116aa4afaeb78e38112bc838da4774d0700f51b9f969d79218702db72c4e
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156