Analysis
-
max time kernel
62s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 05:53
Behavioral task
behavioral1
Sample
Gam _install.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Gam _install.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
Gam _install.exe
-
Size
110KB
-
MD5
6cff3f098fcd2379d21387a062c25a7d
-
SHA1
3f78d254a84318dcf54657477491a8072240da65
-
SHA256
1c8ef8a1c07f2ed88fcfb55929d468c999efad33329cb3099e802ce95f2af001
-
SHA512
2a40c4572b0ec0fd22270613a7661a175cf5264453811cf99d5a9b816396fa44311cdd52aa4751e39e4e46fcc11d52e3b98b1ee12804e34da87d08b631dd0a0b
-
SSDEEP
1536:JxqjQ+P04wsmJCRrZxMdbmI6sxCX28oOV6+1+LbWiTOZUlMuAEpVVQus+R+fxlZn:sr85CREdbmI6XUM+3WiTOKMuAEfw
Malware Config
Signatures
-
Detect Neshta payload 4 IoCs
resource yara_rule behavioral2/files/0x000600000002021e-20.dat family_neshta behavioral2/memory/1280-101-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1280-103-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1280-105-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Gam _install.exe -
Executes dropped EXE 1 IoCs
pid Process 3740 Gam _install.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" Gam _install.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 11 discord.com 21 discord.com 44 discord.com 10 discord.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe Gam _install.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe Gam _install.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe Gam _install.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe Gam _install.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe Gam _install.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE Gam _install.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE Gam _install.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE Gam _install.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE Gam _install.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE Gam _install.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe Gam _install.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe Gam _install.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe Gam _install.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe Gam _install.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE Gam _install.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe Gam _install.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe Gam _install.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe Gam _install.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE Gam _install.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe Gam _install.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE Gam _install.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe Gam _install.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe Gam _install.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe Gam _install.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe Gam _install.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe Gam _install.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE Gam _install.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe Gam _install.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe Gam _install.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe Gam _install.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe Gam _install.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe Gam _install.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe Gam _install.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE Gam _install.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe Gam _install.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com Gam _install.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gam _install.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" Gam _install.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4456 SCHTASKS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3740 Gam _install.exe Token: SeShutdownPrivilege 3740 Gam _install.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1280 wrote to memory of 3740 1280 Gam _install.exe 83 PID 1280 wrote to memory of 3740 1280 Gam _install.exe 83 PID 3740 wrote to memory of 1444 3740 Gam _install.exe 97 PID 3740 wrote to memory of 1444 3740 Gam _install.exe 97 PID 1444 wrote to memory of 1848 1444 cmd.exe 99 PID 1444 wrote to memory of 1848 1444 cmd.exe 99 PID 3740 wrote to memory of 4456 3740 Gam _install.exe 102 PID 3740 wrote to memory of 4456 3740 Gam _install.exe 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Gam _install.exe"C:\Users\Admin\AppData\Local\Temp\Gam _install.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\3582-490\Gam _install.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\Gam _install.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C start3⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\system32\cmd.execmd.exe4⤵PID:1848
-
-
-
C:\Windows\SYSTEM32\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Gam _install.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\3582-490\Gam _install.exe'" /sc onlogon /rl HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4456
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD53b73078a714bf61d1c19ebc3afc0e454
SHA19abeabd74613a2f533e2244c9ee6f967188e4e7e
SHA256ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29
SHA51275959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4
-
Filesize
69KB
MD5d3c07407ad02c7fbb5828be7f7af22b5
SHA1534a4eac66cca8a4af21b8c3a283f3f681e67f80
SHA256388fad4a00651cc01a4f0fbfd1ae1cfc2ef34af3de1a97900843ab25ebbb5da0
SHA5124324a93ada5be2401fb9e7c321a6b9cabe1e2d9735ecffa72647e849a8de69c5006d46d85b87683b1263e000c6836c7c33c8d7d86c67d56ca6c9f2f797f0dfa2