Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 13:36
Behavioral task
behavioral1
Sample
2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe
-
Size
82KB
-
MD5
cfa1758608021a9b00f7db2de6aed889
-
SHA1
7aa7257af37e694ac1f9075334110890fdf659ac
-
SHA256
54f1445c711a8acd438566fcd9231ea8e9df356a310cf015a716fb80d285f2f9
-
SHA512
2006bb5ccdaebd41cd5a73aae556a8b1841912ef050f27779fe5e856bad466e6f399f7684936ebc503b23ce3d792e80238bdf2a8c0eba0c248c1143375f04516
-
SSDEEP
1536:JxqjQ+P04wsmJCRFoTdS1FKnDtkuImIM5smYm:sr85CRCBS1FqtkuImNsm1
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\+README-WARNING+.txt
https://tox.chat
Signatures
-
Detect Neshta payload 3 IoCs
resource yara_rule behavioral1/files/0x0001000000010315-13.dat family_neshta behavioral1/memory/2316-475-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2316-477-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
MAKOP ransomware payload 1 IoCs
resource yara_rule behavioral1/files/0x00080000000174a8-2.dat family_makop -
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8338) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2028 wbadmin.exe -
Executes dropped EXE 2 IoCs
pid Process 2460 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe 1712 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe -
Loads dropped DLL 3 IoCs
pid Process 2316 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe 2316 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe 2316 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 iplogger.com 5 iplogger.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\33BF.tmp.bmp" 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Dubai 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\vlc.mo 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\server_issue.gif.[6B115523].[[email protected]].SRC 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0103402.WMF 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SMSL.ICO 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_left_pressed.png 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\US_export_policy.jar 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaireMCE.lnk 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\AddToViewArrowMask.bmp 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_pressed.gif 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\EssentialLetter.dotx 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\DVD Maker\Shared\DissolveAnother.png 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File created C:\Program Files\Java\jdk1.7.0_80\include\+README-WARNING+.txt 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\vlc.mo 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONENOTE.HXS 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Riyadh87 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\PST8PDT 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf.identity_3.4.0.v20140827-1444.jar 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\diner_settings.png 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.es\Proof.XML 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions\gradient.png 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\delete.avi 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\oledb32r.dll.mui 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\epl-v10.html 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.renderers.swt.nl_ja_4.4.0.v20140623020002.jar 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\VDK10.STD 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\server_lg.gif 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02287_.WMF 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14832_.GIF 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\POST98SP.POC 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\+README-WARNING+.txt 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\about.html 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Urumqi 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_browse.html 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0293238.WMF 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD10335_.GIF 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\ERROR.GIF 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ICE\PREVIEW.GIF 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\WSSFilesToolIconImages.jpg 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.transport.ecf_1.1.0.v20140408-1354.jar 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kuching 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe.config 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00455_.WMF 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\FrameworkList.xml 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\32.png 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Dili 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Tegucigalpa 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\DMR_48.jpg 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\graph_down.png 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\reviewers.gif 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01368_.WMF 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SCDCNCLS.ICO 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\currency.html 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Lima 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\gadget.xml 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18255_.WMF 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyclient.jar 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\Stanley 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\cronometer_h.png 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\GIGGLE.WAV 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsrus.xml 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\rtscom.dll.mui 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-application-views_ja.jar 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\GrayCheck.css 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsutil.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 952 cmd.exe 612 PING.EXE -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2312 vssadmin.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 612 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2460 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 1616 vssvc.exe Token: SeRestorePrivilege 1616 vssvc.exe Token: SeAuditPrivilege 1616 vssvc.exe Token: SeBackupPrivilege 1020 wbengine.exe Token: SeRestorePrivilege 1020 wbengine.exe Token: SeSecurityPrivilege 1020 wbengine.exe Token: SeIncreaseQuotaPrivilege 2904 WMIC.exe Token: SeSecurityPrivilege 2904 WMIC.exe Token: SeTakeOwnershipPrivilege 2904 WMIC.exe Token: SeLoadDriverPrivilege 2904 WMIC.exe Token: SeSystemProfilePrivilege 2904 WMIC.exe Token: SeSystemtimePrivilege 2904 WMIC.exe Token: SeProfSingleProcessPrivilege 2904 WMIC.exe Token: SeIncBasePriorityPrivilege 2904 WMIC.exe Token: SeCreatePagefilePrivilege 2904 WMIC.exe Token: SeBackupPrivilege 2904 WMIC.exe Token: SeRestorePrivilege 2904 WMIC.exe Token: SeShutdownPrivilege 2904 WMIC.exe Token: SeDebugPrivilege 2904 WMIC.exe Token: SeSystemEnvironmentPrivilege 2904 WMIC.exe Token: SeRemoteShutdownPrivilege 2904 WMIC.exe Token: SeUndockPrivilege 2904 WMIC.exe Token: SeManageVolumePrivilege 2904 WMIC.exe Token: 33 2904 WMIC.exe Token: 34 2904 WMIC.exe Token: 35 2904 WMIC.exe Token: SeIncreaseQuotaPrivilege 2904 WMIC.exe Token: SeSecurityPrivilege 2904 WMIC.exe Token: SeTakeOwnershipPrivilege 2904 WMIC.exe Token: SeLoadDriverPrivilege 2904 WMIC.exe Token: SeSystemProfilePrivilege 2904 WMIC.exe Token: SeSystemtimePrivilege 2904 WMIC.exe Token: SeProfSingleProcessPrivilege 2904 WMIC.exe Token: SeIncBasePriorityPrivilege 2904 WMIC.exe Token: SeCreatePagefilePrivilege 2904 WMIC.exe Token: SeBackupPrivilege 2904 WMIC.exe Token: SeRestorePrivilege 2904 WMIC.exe Token: SeShutdownPrivilege 2904 WMIC.exe Token: SeDebugPrivilege 2904 WMIC.exe Token: SeSystemEnvironmentPrivilege 2904 WMIC.exe Token: SeRemoteShutdownPrivilege 2904 WMIC.exe Token: SeUndockPrivilege 2904 WMIC.exe Token: SeManageVolumePrivilege 2904 WMIC.exe Token: 33 2904 WMIC.exe Token: 34 2904 WMIC.exe Token: 35 2904 WMIC.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2460 2316 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe 31 PID 2316 wrote to memory of 2460 2316 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe 31 PID 2316 wrote to memory of 2460 2316 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe 31 PID 2316 wrote to memory of 2460 2316 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe 31 PID 2460 wrote to memory of 2244 2460 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe 33 PID 2460 wrote to memory of 2244 2460 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe 33 PID 2460 wrote to memory of 2244 2460 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe 33 PID 2460 wrote to memory of 2244 2460 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe 33 PID 2244 wrote to memory of 2312 2244 cmd.exe 35 PID 2244 wrote to memory of 2312 2244 cmd.exe 35 PID 2244 wrote to memory of 2312 2244 cmd.exe 35 PID 2244 wrote to memory of 2028 2244 cmd.exe 38 PID 2244 wrote to memory of 2028 2244 cmd.exe 38 PID 2244 wrote to memory of 2028 2244 cmd.exe 38 PID 2244 wrote to memory of 2904 2244 cmd.exe 42 PID 2244 wrote to memory of 2904 2244 cmd.exe 42 PID 2244 wrote to memory of 2904 2244 cmd.exe 42 PID 2460 wrote to memory of 952 2460 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe 47 PID 2460 wrote to memory of 952 2460 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe 47 PID 2460 wrote to memory of 952 2460 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe 47 PID 2460 wrote to memory of 952 2460 2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe 47 PID 952 wrote to memory of 612 952 cmd.exe 49 PID 952 wrote to memory of 612 952 cmd.exe 49 PID 952 wrote to memory of 612 952 cmd.exe 49 PID 952 wrote to memory of 612 952 cmd.exe 49 PID 952 wrote to memory of 904 952 cmd.exe 50 PID 952 wrote to memory of 904 952 cmd.exe 50 PID 952 wrote to memory of 904 952 cmd.exe 50 PID 952 wrote to memory of 904 952 cmd.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe"2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe" n24603⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1712
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2312
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:2028
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping 1.1.1.1 -n 5 & fsutil file setZeroData offset=0 length=131072 "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe" & del /q /f "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 54⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:612
-
-
C:\Windows\SysWOW64\fsutil.exefsutil file setZeroData offset=0 length=131072 "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe"4⤵
- System Location Discovery: System Language Discovery
PID:904
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1412
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:1924
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:2188
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5cf6c595d3e5e9667667af096762fd9c4
SHA19bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80
-
Filesize
1KB
MD51a80c54ec6c91ad26568dbb776af7b44
SHA1f0931e5bd93a6b36393494f978f864c135a7d0af
SHA256836a753bf4c2261ec1e1ad3c761c9fcded1342de63ad70a1eac2826ddb8e1254
SHA512d09f605733927fc2bff169757b38af0cfb724b30ff40316a915f0c26a1e6d453913a35440040cafd974288cc37a31426413a0e814744f7bfad9dcb7088381cbc
-
Filesize
244B
MD5050ae2c25a40771949a7d3e925154be7
SHA1582248b7cc5ecfb7b6b3716d4f0e3e6a2bbda7d5
SHA25626c7979c69e6ebb3eaff7bc7a6b3d2bd15a02510638c0c20b42140205a4e5549
SHA512c6cf3bc22e1b8d04e428690554fcf1ebf0ead34f994770dc401f00d06b632d3482b47d4e8c46235df8cf1db9d7571987be62ad5cb1d098810939f01b6f346f6e
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
\Users\Admin\AppData\Local\Temp\3582-490\2024-08-29_cfa1758608021a9b00f7db2de6aed889_makop_neshta.exe
Filesize42KB
MD53811d51b51ce6a7b7fa98da1e6df28aa
SHA1c2fbcaaacf82789fdcdc15977fbc40e02d9bd9e3
SHA256d8cd2e5790dbc4538879fe00b4ff0e6ea733bcea5dd1294208a24e241247592f
SHA5129886948928d2054ed688f40716f093569c93e1a036289a5e20099811ce70280b6d2e1522cbfaee65ee90cedfd0bf3a46036d524fe658d95d50679fdc52fe449d