Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 21:36
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Client.exe
Resource
win10v2004-20241007-en
General
-
Target
Client.exe
-
Size
5.8MB
-
MD5
732ea742b87e1cccd0937389f800d386
-
SHA1
311f9b36f63d3435597fa441dc12ea8256f72a9d
-
SHA256
c0e4d0d4b55b4bda727c09e7756275b910b080c2f6b3eea1427e00176b2d5498
-
SHA512
d9b82cbd894a063df957ffb852cd7a26716a2301cb44863fcb06c2d546540246cdb362e09553be565a11d1079e8b5fd3e9c8a6c1d4414f0291ebf5db804bb3f0
-
SSDEEP
98304:2y08IGg4S+eh6gcmzT4T3F4MUpj7xfebyUf9Ecuhp2JiudmmJKAZRVB6P4/56di3:2IG6gcmzT4T3F8SyUf9EcuhkgUR+E56e
Malware Config
Signatures
-
Detect Neshta payload 5 IoCs
resource yara_rule behavioral1/memory/388-0-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral1/files/0x0001000000010314-10.dat family_neshta behavioral1/memory/388-85-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral1/memory/388-86-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral1/memory/388-88-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 1 IoCs
pid Process 2352 Client.exe -
Loads dropped DLL 2 IoCs
pid Process 388 Client.exe 388 Client.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" Client.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE Client.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe Client.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE Client.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE Client.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE Client.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE Client.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe Client.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE Client.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE Client.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE Client.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe Client.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE Client.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE Client.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE Client.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe Client.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE Client.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE Client.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE Client.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE Client.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE Client.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE Client.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe Client.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe Client.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE Client.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE Client.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE Client.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe Client.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE Client.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe Client.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE Client.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE Client.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe Client.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe Client.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE Client.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe Client.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE Client.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe Client.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE Client.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE Client.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe Client.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE Client.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE Client.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe Client.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe Client.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" Client.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 388 wrote to memory of 2352 388 Client.exe 31 PID 388 wrote to memory of 2352 388 Client.exe 31 PID 388 wrote to memory of 2352 388 Client.exe 31 PID 388 wrote to memory of 2352 388 Client.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\3582-490\Client.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\Client.exe"2⤵
- Executes dropped EXE
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5e0f2257e0ad4b04429c932673ead4884
SHA1352fcc1fe1019cd069ab52b409b31bbd0a08ea9a
SHA2566e11a49479c1d2b35f15901b0700e307712338f343e1c03fcfe715946fab5969
SHA512d77e790e63b1b2307df2ef0bb774bcbfa5cdc716764050dfa055a23449cffa5c6f61759b0819712f3e3be06037cbc3469082ba2b02af990017f28658f0103763
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
5.8MB
MD5281837be71c594c7f7aa10e8336e1463
SHA1a560aa8295bba491d599abe50ec18ff2a3ac79e9
SHA2562733fc65d64521126ae8a7b1ee02beb8559703d441e22d5cdf9fa9bdb92e1f5f
SHA51237d802a673b5d3b5813f240b4e00fde5dcc1472116ddab2482181d4bb6663beefacf9a706bdba557c4754e8da2ea1f442ed37e79955db912b00f2acb14503428