Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 18:55
Behavioral task
behavioral1
Sample
administrator.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
administrator.exe
Resource
win10v2004-20241007-en
General
-
Target
administrator.exe
-
Size
3.9MB
-
MD5
c1e81b35092d292bf50994180c9e7bbd
-
SHA1
172ea8cbf2c7dee75ac0f82229057569cb93f136
-
SHA256
bcce7fb96ddfa065f87ca0b5a50248c5ab4152046bed77762e51a11bff75401d
-
SHA512
93a757c6d49f377e82dd9c0b9a7160b68a566f0e54d21781f8223113725a8fb4cffa5a27eb63f6f72cc450053d216878a7eb550bdfec7d4a8f5d7c7a622e7832
-
SSDEEP
24576:b+qzFuNtLC8xl7EDdLtrXzieFq5RQNRyk59yjtzMi1feBOWaJNBPsaIGgJDF7mCy:KiFolBcLtLGeFq5RQNp5ESiHyJDFatUS
Malware Config
Signatures
-
Detect Neshta payload 5 IoCs
resource yara_rule behavioral1/memory/2556-0-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral1/files/0x0001000000010315-13.dat family_neshta behavioral1/memory/2556-86-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral1/memory/2556-87-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral1/memory/2556-90-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 1 IoCs
pid Process 2084 administrator.exe -
Loads dropped DLL 3 IoCs
pid Process 2556 administrator.exe 2556 administrator.exe 2556 administrator.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" administrator.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE administrator.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe administrator.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE administrator.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE administrator.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe administrator.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE administrator.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE administrator.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE administrator.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE administrator.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE administrator.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE administrator.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE administrator.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe administrator.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe administrator.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe administrator.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE administrator.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE administrator.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE administrator.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE administrator.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe administrator.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE administrator.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE administrator.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe administrator.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE administrator.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe administrator.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE administrator.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE administrator.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe administrator.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE administrator.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE administrator.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe administrator.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe administrator.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE administrator.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe administrator.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE administrator.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe administrator.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE administrator.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE administrator.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE administrator.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE administrator.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE administrator.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE administrator.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE administrator.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe administrator.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE administrator.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe administrator.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE administrator.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe administrator.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE administrator.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE administrator.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE administrator.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe administrator.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE administrator.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE administrator.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE administrator.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe administrator.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE administrator.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe administrator.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe administrator.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE administrator.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE administrator.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe administrator.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE administrator.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe administrator.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com administrator.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language administrator.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" administrator.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2084 2556 administrator.exe 30 PID 2556 wrote to memory of 2084 2556 administrator.exe 30 PID 2556 wrote to memory of 2084 2556 administrator.exe 30 PID 2556 wrote to memory of 2084 2556 administrator.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\administrator.exe"C:\Users\Admin\AppData\Local\Temp\administrator.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\administrator.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\administrator.exe"2⤵
- Executes dropped EXE
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5e0f2257e0ad4b04429c932673ead4884
SHA1352fcc1fe1019cd069ab52b409b31bbd0a08ea9a
SHA2566e11a49479c1d2b35f15901b0700e307712338f343e1c03fcfe715946fab5969
SHA512d77e790e63b1b2307df2ef0bb774bcbfa5cdc716764050dfa055a23449cffa5c6f61759b0819712f3e3be06037cbc3469082ba2b02af990017f28658f0103763
-
Filesize
3.8MB
MD5637393a357832e97e0380a5ebed4b3c5
SHA10b9795389bfb46764d3cc12590d9970a2d19fe30
SHA256d4177f4b1b409a1882280a10387996d345cf53a98c7c07cd8fc9d069b84dddc7
SHA512a3af4881ba89b77eabda2feebb7fcbc818815ca0a0ad924d9ae1c6898c15d00d52a4f226c588bdaceae2d6afda14602cb1bc3d0002bc5af2e524d651988fd1ad
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156