Analysis
-
max time kernel
96s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 17:55
Behavioral task
behavioral1
Sample
492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe
Resource
win10v2004-20241007-en
General
-
Target
492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe
-
Size
118KB
-
MD5
55978849ec431982791abc8907495580
-
SHA1
e2016fa2c6dde0ef6ab8ab5ca153195047cccd0a
-
SHA256
492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016e
-
SHA512
c1f71b6713a1115f172120f12b8c79a2471efc12aff2031be3178ba0d9a71a8bdc5107f0c27ebd8842856b130ed1452ec49fc0fdaefeb6582a08ed394d6b6d07
-
SSDEEP
1536:JxqjQ+P04wsmJCQIEZ+qi9URcLJYetKkHhaFlS/ktO2wwkfBlNrKnJAy5WZBIFX:sr85CYZLS95tKkHhaFlS/VtprQXFX
Malware Config
Signatures
-
Detect Neshta payload 4 IoCs
resource yara_rule behavioral2/files/0x0006000000020228-20.dat family_neshta behavioral2/memory/2384-100-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2384-103-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2384-105-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe -
Executes dropped EXE 3 IoCs
pid Process 3436 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe 1760 nstAB06.tmp 4200 A~NSISu_.tmp -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nstAB06.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A~NSISu_.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.EXE -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2384 wrote to memory of 3436 2384 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe 83 PID 2384 wrote to memory of 3436 2384 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe 83 PID 2384 wrote to memory of 3436 2384 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe 83 PID 3436 wrote to memory of 1760 3436 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe 84 PID 3436 wrote to memory of 1760 3436 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe 84 PID 3436 wrote to memory of 1760 3436 492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe 84 PID 1760 wrote to memory of 4200 1760 nstAB06.tmp 85 PID 1760 wrote to memory of 4200 1760 nstAB06.tmp 85 PID 1760 wrote to memory of 4200 1760 nstAB06.tmp 85 PID 4200 wrote to memory of 5040 4200 A~NSISu_.tmp 93 PID 4200 wrote to memory of 5040 4200 A~NSISu_.tmp 93 PID 4200 wrote to memory of 5040 4200 A~NSISu_.tmp 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe"C:\Users\Admin\AppData\Local\Temp\492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\nstAAF5.tmp\nstAB06.tmpnstAB06.tmp /DOIT3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\nstAAF5.tmp\A~NSISu_.tmp"C:\Users\Admin\AppData\Local\Temp\nstAAF5.tmp\A~NSISu_.tmp" /DOIT _=C:\Users\Admin\AppData\Local\Temp\nstAAF5.tmp4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\CMD.EXECMD.EXE /C "C:\Users\Admin\AppData\Local\Temp\nstDD50.bat"5⤵
- System Location Discovery: System Language Discovery
PID:5040
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD53b73078a714bf61d1c19ebc3afc0e454
SHA19abeabd74613a2f533e2244c9ee6f967188e4e7e
SHA256ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29
SHA51275959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4
-
C:\Users\Admin\AppData\Local\Temp\3582-490\492968d8d480902d5f337a26b2f1e8675e0cc396172055ebbb812c9fc1d7016eN.exe
Filesize78KB
MD5b1812d2c16d9adddf4642ace51f3e06a
SHA1a2ca3277fa890ffee4d9294441d5e052e30ab2e8
SHA256eab8921ebe73c16aa8534185cf5793bf47350591549c5d84d57e2e0f716c0911
SHA5123c1a3877d75e58f96aea3107b576dfd01204f2fb3f3fd346df387a146a7a75e2439c2a65e9f66ffa94b8a42d2540abc2a6de6717a067c2cf9ac2dc6e30cb7038
-
Filesize
277B
MD5bb934843b8bcda9cba2a3eef3f6f115c
SHA197e7af6be99d3d10be512307bc55d526d5c6a3a1
SHA256688d7440930b67135f8fb056bd970050ddd119851ae9276eb461d152ba6d8e55
SHA512e37e58d7f47dfa16bb365639eade2cecd6a65c7f1a70714edbe63bd965d656d0b6a07e4ab83c69c6850eb95b15deedab33c8708cfb63508b7875f4c83e664531