Overview
overview
10Static
static
10русск...ce.exe
windows7-x64
русск...ce.exe
windows10-2004-x64
русск...ts.vbs
windows7-x64
1русск...ts.vbs
windows10-2004-x64
1русск...es.vbs
windows7-x64
1русск...es.vbs
windows10-2004-x64
1русск...gs.vbs
windows7-x64
1русск...gs.vbs
windows10-2004-x64
1русск...es.vbs
windows7-x64
1русск...es.vbs
windows10-2004-x64
1русск...ns.vbs
windows7-x64
1русск...ns.vbs
windows10-2004-x64
1русск...ts.vbs
windows7-x64
1русск...ts.vbs
windows10-2004-x64
1русск...ld.vbs
windows7-x64
1русск...ld.vbs
windows10-2004-x64
1русск...nc.dll
windows7-x64
3русск...nc.dll
windows10-2004-x64
3русск...nc.dll
windows7-x64
3русск...nc.dll
windows10-2004-x64
3русск...cc.exe
windows7-x64
3русск...cc.exe
windows10-2004-x64
3русск...no.exe
windows7-x64
10русск...no.exe
windows10-2004-x64
10русск...ck.dll
windows7-x64
3русск...ck.dll
windows10-2004-x64
3русск...ack.so
ubuntu-24.04-amd64
1русск...ex.dll
windows7-x64
3русск...ex.dll
windows10-2004-x64
3русск...gex.so
ubuntu-22.04-amd64
1русск...er.dll
windows7-x64
3русск...er.dll
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/10/2024, 07:01
Behavioral task
behavioral1
Sample
русский экстримальный сервер/announce.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
русский экстримальный сервер/announce.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
русский экстримальный сервер/pawno/Include/a_objects.vbs
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
русский экстримальный сервер/pawno/Include/a_objects.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
русский экстримальный сервер/pawno/Include/gamemodes/businesses.vbs
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
русский экстримальный сервер/pawno/Include/gamemodes/businesses.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
русский экстримальный сервер/pawno/Include/gamemodes/gangs.vbs
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
русский экстримальный сервер/pawno/Include/gamemodes/gangs.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
русский экстримальный сервер/pawno/Include/gamemodes/houses.vbs
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
русский экстримальный сервер/pawno/Include/gamemodes/houses.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
русский экстримальный сервер/pawno/Include/gamemodes/missions.vbs
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
русский экстримальный сервер/pawno/Include/gamemodes/missions.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
русский экстримальный сервер/pawno/Include/gamemodes/team_quests.vbs
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
русский экстримальный сервер/pawno/Include/gamemodes/team_quests.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
русский экстримальный сервер/pawno/Include/gamemodes/world.vbs
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
русский экстримальный сервер/pawno/Include/gamemodes/world.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
русский экстримальный сервер/pawno/libpawnc.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
русский экстримальный сервер/pawno/libpawnc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
русский экстримальный сервер/pawno/pawnc.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
русский экстримальный сервер/pawno/pawnc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
русский экстримальный сервер/pawno/pawncc.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
русский экстримальный сервер/pawno/pawncc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
русский экстримальный сервер/pawno/pawno.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
русский экстримальный сервер/pawno/pawno.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
русский экстримальный сервер/plugins/antiattack.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
русский экстримальный сервер/plugins/antiattack.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
русский экстримальный сервер/plugins/antiattack.so
Resource
ubuntu2404-amd64-20240729-en
Behavioral task
behavioral28
Sample
русский экстримальный сервер/plugins/regex.dll
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
русский экстримальный сервер/plugins/regex.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
русский экстримальный сервер/plugins/regex.so
Resource
ubuntu2204-amd64-20240522.1-en
Behavioral task
behavioral31
Sample
русский экстримальный сервер/plugins/streamer.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
русский экстримальный сервер/plugins/streamer.dll
Resource
win10v2004-20241007-en
General
-
Target
русский экстримальный сервер/pawno/pawno.exe
-
Size
421KB
-
MD5
b9fb7dcd6db0eb83d8def923d62c13c1
-
SHA1
d137ffb2abf89b3accaabf22ef3be92c3927d3b0
-
SHA256
9c8e3d64896e0b5a65e4df7eff46d6d765c8579504d49f5c5b4c7cee230182de
-
SHA512
59a64e42446cae4c78f581da3d1ea535c7718f2e064d4ddbb5231f582262694d66578afccf71d73e295194410fc0d7a4123ff87207093e93b1cbacd675e8d21d
-
SSDEEP
12288:mTWKYEEF5J87vzLh8aVJSTHZqV5dU79gqV5dU79gqV5dU7k:mzJ45J8DznVJCqV5yWqV5yWqV5yw
Malware Config
Signatures
-
Detect Neshta payload 2 IoCs
resource yara_rule behavioral23/memory/2400-69-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral23/memory/2400-71-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" pawno.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE pawno.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE pawno.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE pawno.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE pawno.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE pawno.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe pawno.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe pawno.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe pawno.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe pawno.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe pawno.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE pawno.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE pawno.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe pawno.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe pawno.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe pawno.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE pawno.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe pawno.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE pawno.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE pawno.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE pawno.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE pawno.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe pawno.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe pawno.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE pawno.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe pawno.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE pawno.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe pawno.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE pawno.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE pawno.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE pawno.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE pawno.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe pawno.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE pawno.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE pawno.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE pawno.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe pawno.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe pawno.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE pawno.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe pawno.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE pawno.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE pawno.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE pawno.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com pawno.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pawno.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" pawno.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\русский экстримальный сервер\pawno\pawno.exe"C:\Users\Admin\AppData\Local\Temp\русский экстримальный сервер\pawno\pawno.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5f2e5cfb8f498639baf77b6a55fb9325e
SHA1dad7f1b0d38a1142c50c629555289daf678cc5a6
SHA25651fadba4debb9030662f2593ede938f175656208aaa30c9b214fa580114613e0
SHA51280689f12aeefaf5452515a4ad3525ce6e85fb4fa4e0f3c0f2e41f8ca37235a4188711871e3b5fd4e67b95b53d99ed447b8603edd35f9c74b12f0ae0f63eb634c