Overview
overview
10Static
static
10русск...ce.exe
windows7-x64
русск...ce.exe
windows10-2004-x64
русск...ts.vbs
windows7-x64
1русск...ts.vbs
windows10-2004-x64
1русск...es.vbs
windows7-x64
1русск...es.vbs
windows10-2004-x64
1русск...gs.vbs
windows7-x64
1русск...gs.vbs
windows10-2004-x64
1русск...es.vbs
windows7-x64
1русск...es.vbs
windows10-2004-x64
1русск...ns.vbs
windows7-x64
1русск...ns.vbs
windows10-2004-x64
1русск...ts.vbs
windows7-x64
1русск...ts.vbs
windows10-2004-x64
1русск...ld.vbs
windows7-x64
1русск...ld.vbs
windows10-2004-x64
1русск...nc.dll
windows7-x64
3русск...nc.dll
windows10-2004-x64
3русск...nc.dll
windows7-x64
3русск...nc.dll
windows10-2004-x64
3русск...cc.exe
windows7-x64
3русск...cc.exe
windows10-2004-x64
3русск...no.exe
windows7-x64
10русск...no.exe
windows10-2004-x64
10русск...ck.dll
windows7-x64
3русск...ck.dll
windows10-2004-x64
3русск...ack.so
ubuntu-24.04-amd64
1русск...ex.dll
windows7-x64
3русск...ex.dll
windows10-2004-x64
3русск...gex.so
ubuntu-22.04-amd64
1русск...er.dll
windows7-x64
3русск...er.dll
windows10-2004-x64
3Analysis
-
max time kernel
141s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2024, 07:01
Behavioral task
behavioral1
Sample
русский экстримальный сервер/announce.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
русский экстримальный сервер/announce.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
русский экстримальный сервер/pawno/Include/a_objects.vbs
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
русский экстримальный сервер/pawno/Include/a_objects.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
русский экстримальный сервер/pawno/Include/gamemodes/businesses.vbs
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
русский экстримальный сервер/pawno/Include/gamemodes/businesses.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
русский экстримальный сервер/pawno/Include/gamemodes/gangs.vbs
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
русский экстримальный сервер/pawno/Include/gamemodes/gangs.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
русский экстримальный сервер/pawno/Include/gamemodes/houses.vbs
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
русский экстримальный сервер/pawno/Include/gamemodes/houses.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
русский экстримальный сервер/pawno/Include/gamemodes/missions.vbs
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
русский экстримальный сервер/pawno/Include/gamemodes/missions.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
русский экстримальный сервер/pawno/Include/gamemodes/team_quests.vbs
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
русский экстримальный сервер/pawno/Include/gamemodes/team_quests.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
русский экстримальный сервер/pawno/Include/gamemodes/world.vbs
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
русский экстримальный сервер/pawno/Include/gamemodes/world.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
русский экстримальный сервер/pawno/libpawnc.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
русский экстримальный сервер/pawno/libpawnc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
русский экстримальный сервер/pawno/pawnc.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
русский экстримальный сервер/pawno/pawnc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
русский экстримальный сервер/pawno/pawncc.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
русский экстримальный сервер/pawno/pawncc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
русский экстримальный сервер/pawno/pawno.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
русский экстримальный сервер/pawno/pawno.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
русский экстримальный сервер/plugins/antiattack.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
русский экстримальный сервер/plugins/antiattack.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
русский экстримальный сервер/plugins/antiattack.so
Resource
ubuntu2404-amd64-20240729-en
Behavioral task
behavioral28
Sample
русский экстримальный сервер/plugins/regex.dll
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
русский экстримальный сервер/plugins/regex.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
русский экстримальный сервер/plugins/regex.so
Resource
ubuntu2204-amd64-20240522.1-en
Behavioral task
behavioral31
Sample
русский экстримальный сервер/plugins/streamer.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
русский экстримальный сервер/plugins/streamer.dll
Resource
win10v2004-20241007-en
General
-
Target
русский экстримальный сервер/pawno/pawno.exe
-
Size
421KB
-
MD5
b9fb7dcd6db0eb83d8def923d62c13c1
-
SHA1
d137ffb2abf89b3accaabf22ef3be92c3927d3b0
-
SHA256
9c8e3d64896e0b5a65e4df7eff46d6d765c8579504d49f5c5b4c7cee230182de
-
SHA512
59a64e42446cae4c78f581da3d1ea535c7718f2e064d4ddbb5231f582262694d66578afccf71d73e295194410fc0d7a4123ff87207093e93b1cbacd675e8d21d
-
SSDEEP
12288:mTWKYEEF5J87vzLh8aVJSTHZqV5dU79gqV5dU79gqV5dU7k:mzJ45J8DznVJCqV5yWqV5yWqV5yw
Malware Config
Signatures
-
Detect Neshta payload 3 IoCs
resource yara_rule behavioral24/memory/3688-84-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral24/memory/3688-85-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral24/memory/3688-87-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" pawno.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE pawno.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE pawno.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE pawno.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE pawno.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe pawno.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe pawno.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE pawno.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE pawno.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe pawno.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE pawno.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe pawno.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE pawno.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE pawno.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe pawno.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe pawno.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe pawno.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE pawno.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE pawno.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE pawno.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE pawno.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE pawno.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe pawno.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe pawno.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe pawno.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe pawno.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE pawno.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe pawno.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE pawno.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe pawno.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE pawno.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE pawno.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe pawno.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE pawno.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe pawno.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe pawno.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe pawno.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe pawno.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE pawno.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE pawno.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE pawno.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE pawno.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE pawno.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE pawno.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE pawno.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE pawno.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE pawno.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE pawno.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE pawno.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe pawno.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE pawno.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com pawno.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pawno.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" pawno.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\русский экстримальный сервер\pawno\pawno.exe"C:\Users\Admin\AppData\Local\Temp\русский экстримальный сервер\pawno\pawno.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD52701f5f07f9c3bd97f752b93e11224a6
SHA119e11632c430f6db218be7d54719e7d16005703f
SHA25615dc0e52a821f2c356d6c9eac4ac41fa53ab1742a5f719de4e8be28d86ca3a99
SHA512121ba9218c676c28e432f3ffa0e13f4b14f3726e5d8521c239641f24b869063de27608689daab4c81d1eea0b3f67072e42fca558bf379c60a8370cd15d37b81d