Analysis
-
max time kernel
390s -
max time network
1118s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
06-12-2024 19:43
Behavioral task
behavioral1
Sample
massexe/Massscan_GUI.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
massexe/Packet.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
massexe/masscan.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
massexe/msvcr100.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
massexe/winpcap-4.13.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
massexe/wpcap.dll
Resource
win10ltsc2021-20241023-en
General
-
Target
massexe/masscan.exe
-
Size
273KB
-
MD5
bcaa226fd557ba6ca18628e1ae3c6053
-
SHA1
2cb78f3f36b27bc692c4856bd6cb20e2cebdb344
-
SHA256
f7f2af6f4dd9d0af03e6af3aba685969ec9ed22295055882e571bef3e96bbc4e
-
SHA512
de0bac7d4cf9d2a00bb880e04d788d3bb21a243864b1df089547c2f4b20e7e18e8b3ce2f784b44c61561e4dccf350ea01e65dd9f943e98f833879fcb1db4a65a
-
SSDEEP
6144:k9wmz/EkPt1xeHP9mCeswbjnK6swOp9cLKQaNTiL:Iz/Ek1eHP9KPf698hMTY
Malware Config
Signatures
-
Detect Neshta payload 6 IoCs
resource yara_rule behavioral3/files/0x0002000000042a21-16.dat family_neshta behavioral3/memory/1848-79-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral3/memory/1848-80-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral3/memory/1848-81-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral3/memory/1848-82-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral3/memory/1848-84-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation masscan.exe -
Executes dropped EXE 1 IoCs
pid Process 3116 masscan.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" masscan.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 62 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE masscan.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE masscan.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe masscan.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe masscan.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe masscan.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE masscan.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE masscan.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE masscan.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe masscan.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE masscan.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe masscan.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe masscan.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe masscan.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE masscan.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE masscan.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE masscan.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe masscan.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE masscan.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE masscan.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe masscan.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE masscan.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE masscan.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE masscan.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe masscan.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE masscan.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe masscan.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE masscan.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe masscan.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe masscan.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe masscan.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE masscan.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13195~1.25\MICROS~1.EXE masscan.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE masscan.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe masscan.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe masscan.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe masscan.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE masscan.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE masscan.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe masscan.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE masscan.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe masscan.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com masscan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language masscan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language masscan.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" masscan.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1848 wrote to memory of 3116 1848 masscan.exe 80 PID 1848 wrote to memory of 3116 1848 masscan.exe 80 PID 1848 wrote to memory of 3116 1848 masscan.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\massexe\masscan.exe"C:\Users\Admin\AppData\Local\Temp\massexe\masscan.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\3582-490\masscan.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\masscan.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
325KB
MD5892cf4fc5398e07bf652c50ef2aa3b88
SHA1c399e55756b23938057a0ecae597bd9dbe481866
SHA256e2262c798729169f697e6c30e5211cde604fd8b14769311ff4ea81abba8c2781
SHA512f16a9e4b1150098c5936ec6107c36d47246dafd5a43e9f4ad9a31ecab69cc789c768691fa23a1440fae7f6e93e8e62566b5c86f7ed6bb4cfe26368149ea8c167
-
Filesize
232KB
MD5c50f3b0b23dfe5c66561bb9297bf7bbc
SHA15f14241aea174608a7c85127fdad042d7382277d
SHA256de903a297afc249bb7d68fef6c885a4c945d740a487fe3e9144a8499a7094131
SHA51233c557c53b4f65cde67bc0f6a7952822d194e0da262aa7d44c1d527ed300043ad1c06002cd42e69ad98ad2c7b62aa98d66ac0aa211ddfa97dde3e737da3f768f