Analysis
-
max time kernel
104s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2024, 01:16
Behavioral task
behavioral1
Sample
afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe
Resource
win10v2004-20241007-en
General
-
Target
afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe
-
Size
2.0MB
-
MD5
51cd4081cdf5618542510d4f931e4e00
-
SHA1
3f78846b79650169069c9f43e94f7d2d9d975775
-
SHA256
afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744e
-
SHA512
f98307d32f107a73008a603359d237e86a0cbf33619ca5fc9ca77a52058975f8c4e86000d412f0120b5d6d206362b919646154e5f27ca5bd780e1aae0d30c0c6
-
SSDEEP
24576:wHmCl85nY8YSiVznVU+6eb/56com0G9pw1q9Vu/fvZzY:xZ5Y8RiRkWVufvtY
Malware Config
Signatures
-
Detect Neshta payload 4 IoCs
resource yara_rule behavioral2/files/0x000600000002024c-15.dat family_neshta behavioral2/memory/464-95-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/464-96-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/464-98-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe -
Executes dropped EXE 1 IoCs
pid Process 2748 afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2748 afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe 2748 afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 464 wrote to memory of 2748 464 afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe 85 PID 464 wrote to memory of 2748 464 afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe 85 PID 464 wrote to memory of 2748 464 afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe"C:\Users\Admin\AppData\Local\Temp\afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\3582-490\afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD53b73078a714bf61d1c19ebc3afc0e454
SHA19abeabd74613a2f533e2244c9ee6f967188e4e7e
SHA256ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29
SHA51275959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4
-
C:\Users\Admin\AppData\Local\Temp\3582-490\afab11bcffee8b6b27fa72ef9b9f153c0114d23dd6de819e3fd1fd3aa981744eN.exe
Filesize2.0MB
MD5f35117b98b2b1b73ea8dabda59b7c0b9
SHA111e6344a51994df073b799f31f5c9e807f758ebd
SHA25644a9500cef7bf5b2c57e5a4ed442b1992e2f1c9764aad09be7dd64bb9924a57d
SHA51211b5e98ae05727b4b5b7621a36fde937b0c784b60e0a3a2cdc826c82b960607a9f8bea72ad51d3dcd806fcfc29a0999910217690fb8ebcd9ec670b4e1c5a607b