General
-
Target
35845d281a91dae79912a7238697c8b1d074bbff2785b621e0836f7c01d80b6e
-
Size
747KB
-
Sample
241016-zh9gsa1hpc
-
MD5
8e62bd548aabfb139621a304326654ae
-
SHA1
20b64b76c88e225387cae355828a1081f2c74480
-
SHA256
35845d281a91dae79912a7238697c8b1d074bbff2785b621e0836f7c01d80b6e
-
SHA512
86f0ddb4ddbe512a21826d831941f228ea4610f612b7d4bb1f5eadd7b31aa27b939c536eefea38326ab1f001a175ead7876ffc89ba3e6aa00335e2f10d74fe1d
-
SSDEEP
12288:Nmp6d74dwmC/YPwaZBSvaG47RR7ZdaCiBTi02Oay1/CoP6p5dUo8eelRNX9KkE55:7gG47RR5eTivy1/cpvUxeelRNX9JE5Mk
Static task
static1
Behavioral task
behavioral1
Sample
35845d281a91dae79912a7238697c8b1d074bbff2785b621e0836f7c01d80b6e.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
35845d281a91dae79912a7238697c8b1d074bbff2785b621e0836f7c01d80b6e
-
Size
747KB
-
MD5
8e62bd548aabfb139621a304326654ae
-
SHA1
20b64b76c88e225387cae355828a1081f2c74480
-
SHA256
35845d281a91dae79912a7238697c8b1d074bbff2785b621e0836f7c01d80b6e
-
SHA512
86f0ddb4ddbe512a21826d831941f228ea4610f612b7d4bb1f5eadd7b31aa27b939c536eefea38326ab1f001a175ead7876ffc89ba3e6aa00335e2f10d74fe1d
-
SSDEEP
12288:Nmp6d74dwmC/YPwaZBSvaG47RR7ZdaCiBTi02Oay1/CoP6p5dUo8eelRNX9KkE55:7gG47RR5eTivy1/cpvUxeelRNX9JE5Mk
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1