Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10massexe/Ma...UI.exe
windows7-x64
10massexe/Ma...UI.exe
windows10-2004-x64
10massexe/Packet.dll
windows7-x64
3massexe/Packet.dll
windows10-2004-x64
3massexe/masscan.exe
windows7-x64
10massexe/masscan.exe
windows10-2004-x64
10massexe/msvcr100.dll
windows7-x64
3massexe/msvcr100.dll
windows10-2004-x64
3massexe/wi...13.exe
windows7-x64
10massexe/wi...13.exe
windows10-2004-x64
10massexe/wpcap.dll
windows7-x64
3massexe/wpcap.dll
windows10-2004-x64
3Analysis
-
max time kernel
94s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2024, 20:51
Behavioral task
behavioral1
Sample
massexe/Massscan_GUI.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
massexe/Massscan_GUI.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
massexe/Packet.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
massexe/Packet.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
massexe/masscan.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
massexe/masscan.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
massexe/msvcr100.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
massexe/msvcr100.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
massexe/winpcap-4.13.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
massexe/winpcap-4.13.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
massexe/wpcap.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
massexe/wpcap.dll
Resource
win10v2004-20241007-en
General
-
Target
massexe/masscan.exe
-
Size
273KB
-
MD5
bcaa226fd557ba6ca18628e1ae3c6053
-
SHA1
2cb78f3f36b27bc692c4856bd6cb20e2cebdb344
-
SHA256
f7f2af6f4dd9d0af03e6af3aba685969ec9ed22295055882e571bef3e96bbc4e
-
SHA512
de0bac7d4cf9d2a00bb880e04d788d3bb21a243864b1df089547c2f4b20e7e18e8b3ce2f784b44c61561e4dccf350ea01e65dd9f943e98f833879fcb1db4a65a
-
SSDEEP
6144:k9wmz/EkPt1xeHP9mCeswbjnK6swOp9cLKQaNTiL:Iz/Ek1eHP9KPf698hMTY
Malware Config
Signatures
-
Detect Neshta payload 4 IoCs
resource yara_rule behavioral6/files/0x000600000002021e-13.dat family_neshta behavioral6/memory/3456-93-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral6/memory/3456-94-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral6/memory/3456-96-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation masscan.exe -
Executes dropped EXE 1 IoCs
pid Process 208 masscan.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" masscan.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE masscan.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE masscan.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe masscan.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE masscan.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe masscan.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe masscan.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe masscan.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE masscan.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe masscan.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe masscan.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe masscan.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE masscan.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE masscan.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE masscan.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE masscan.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE masscan.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE masscan.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe masscan.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe masscan.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE masscan.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE masscan.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE masscan.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe masscan.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe masscan.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe masscan.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE masscan.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe masscan.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE masscan.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE masscan.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE masscan.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE masscan.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE masscan.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE masscan.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE masscan.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe masscan.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE masscan.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE masscan.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE masscan.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE masscan.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE masscan.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE masscan.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe masscan.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE masscan.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE masscan.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE masscan.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com masscan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language masscan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language masscan.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" masscan.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3456 wrote to memory of 208 3456 masscan.exe 85 PID 3456 wrote to memory of 208 3456 masscan.exe 85 PID 3456 wrote to memory of 208 3456 masscan.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\massexe\masscan.exe"C:\Users\Admin\AppData\Local\Temp\massexe\masscan.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\3582-490\masscan.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\masscan.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD53b73078a714bf61d1c19ebc3afc0e454
SHA19abeabd74613a2f533e2244c9ee6f967188e4e7e
SHA256ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29
SHA51275959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4
-
Filesize
232KB
MD5c50f3b0b23dfe5c66561bb9297bf7bbc
SHA15f14241aea174608a7c85127fdad042d7382277d
SHA256de903a297afc249bb7d68fef6c885a4c945d740a487fe3e9144a8499a7094131
SHA51233c557c53b4f65cde67bc0f6a7952822d194e0da262aa7d44c1d527ed300043ad1c06002cd42e69ad98ad2c7b62aa98d66ac0aa211ddfa97dde3e737da3f768f