Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31/12/2024, 17:55
Behavioral task
behavioral1
Sample
492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe
Resource
win10v2004-20241007-en
General
-
Target
492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe
-
Size
118KB
-
MD5
55978849ec431982791abc8907495580
-
SHA1
e2016fa2c6dde0ef6ab8ab5ca153195047cccd0a
-
SHA256
492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016e
-
SHA512
c1f71b6713a1115f172120f12b8c79a2471efc12aff2031be3178ba0d9a71a8bdc5107f0c27ebd8842856b130ed1452ec49fc0fdaefeb6582a08ed394d6b6d07
-
SSDEEP
1536:JxqjQ+P04wsmJCQIEZ+qi9URcLJYetKkHhaFlS/ktO2wwkfBlNrKnJAy5WZBIFX:sr85CYZLS95tKkHhaFlS/VtprQXFX
Malware Config
Signatures
-
Detect Neshta payload 3 IoCs
resource yara_rule behavioral1/files/0x0001000000010315-10.dat family_neshta behavioral1/memory/2756-96-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2756-100-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 3 IoCs
pid Process 2824 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe 2616 nst46C1.tmp 2772 A~NSISu_.tmp -
Loads dropped DLL 4 IoCs
pid Process 2756 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe 2824 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe 2616 nst46C1.tmp 2756 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nst46C1.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A~NSISu_.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.EXE -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2824 2756 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe 30 PID 2756 wrote to memory of 2824 2756 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe 30 PID 2756 wrote to memory of 2824 2756 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe 30 PID 2756 wrote to memory of 2824 2756 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe 30 PID 2824 wrote to memory of 2616 2824 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe 31 PID 2824 wrote to memory of 2616 2824 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe 31 PID 2824 wrote to memory of 2616 2824 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe 31 PID 2824 wrote to memory of 2616 2824 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe 31 PID 2616 wrote to memory of 2772 2616 nst46C1.tmp 32 PID 2616 wrote to memory of 2772 2616 nst46C1.tmp 32 PID 2616 wrote to memory of 2772 2616 nst46C1.tmp 32 PID 2616 wrote to memory of 2772 2616 nst46C1.tmp 32 PID 2772 wrote to memory of 2948 2772 A~NSISu_.tmp 33 PID 2772 wrote to memory of 2948 2772 A~NSISu_.tmp 33 PID 2772 wrote to memory of 2948 2772 A~NSISu_.tmp 33 PID 2772 wrote to memory of 2948 2772 A~NSISu_.tmp 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe"C:\Users\Admin\AppData\Local\Temp\492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\nst46A1.tmp\nst46C1.tmpnst46C1.tmp /DOIT3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\nst46A1.tmp\A~NSISu_.tmp"C:\Users\Admin\AppData\Local\Temp\nst46A1.tmp\A~NSISu_.tmp" /DOIT _=C:\Users\Admin\AppData\Local\Temp\nst46A1.tmp4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\CMD.EXECMD.EXE /C "C:\Users\Admin\AppData\Local\Temp\nst7ABB.bat"5⤵
- System Location Discovery: System Language Discovery
PID:2948
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5cf6c595d3e5e9667667af096762fd9c4
SHA19bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80
-
Filesize
277B
MD5fba27f833cedc2d4fae2131dfb100fce
SHA1abea8d47034e858f7b31bc6084bf034def1af9ee
SHA25630984eac7cbc933e4490364d223b5e76d337494f08e2ad164da5dadbb3eae131
SHA512019eb5b08fe079e397e911bfc2d81476c350241e78ea3fb58d691497e75f408a0968631978a59cc66a1f48c792b19e5a97293d83964a5827cad3a7710429658e
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
\Users\Admin\AppData\Local\Temp\3582-490\492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe
Filesize78KB
MD5b1812d2c16d9adddf4642ace51f3e06a
SHA1a2ca3277fa890ffee4d9294441d5e052e30ab2e8
SHA256eab8921ebe73c16aa8534185cf5793bf47350591549c5d84d57e2e0f716c0911
SHA5123c1a3877d75e58f96aea3107b576dfd01204f2fb3f3fd346df387a146a7a75e2439c2a65e9f66ffa94b8a42d2540abc2a6de6717a067c2cf9ac2dc6e30cb7038