General
-
Target
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N
-
Size
570KB
-
Sample
241105-n2rkjasrep
-
MD5
4767f83ca3ff9905cf4dcac847630e50
-
SHA1
f9f14f1c80643ca3d7317a7c02c06a9c0bcfa18d
-
SHA256
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9
-
SHA512
0547c48f60bc64f1fc4c96c51e657e09d7b89453c81cdd07f46fd06c37895c67b4156c3bfabc4c67b52e714dbc76fc98e34382063029151a724bf3ee1a2ad24c
-
SSDEEP
12288:WCLNPL2KestvAeMUbhJlHrfrIf74NCpfUo9ExtytEwEh:WC1L2U5AGLrIf0YExwtmh
Behavioral task
behavioral1
Sample
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N
-
Size
570KB
-
MD5
4767f83ca3ff9905cf4dcac847630e50
-
SHA1
f9f14f1c80643ca3d7317a7c02c06a9c0bcfa18d
-
SHA256
c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9
-
SHA512
0547c48f60bc64f1fc4c96c51e657e09d7b89453c81cdd07f46fd06c37895c67b4156c3bfabc4c67b52e714dbc76fc98e34382063029151a724bf3ee1a2ad24c
-
SSDEEP
12288:WCLNPL2KestvAeMUbhJlHrfrIf74NCpfUo9ExtytEwEh:WC1L2U5AGLrIf0YExwtmh
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Hijack Execution Flow: Executable Installer File Permissions Weakness
Possible Turn off User Account Control's privilege elevation for standard users.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Change Default File Association
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Event Triggered Execution
1Change Default File Association
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1