Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 12:23
Behavioral task
behavioral1
Sample
2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe
-
Size
154KB
-
MD5
877cec8193a067605a4ae8193cd6512c
-
SHA1
3a2b2fa4fa4ca05b909bb465f8623c8674aee5aa
-
SHA256
625e5d6d49f078375b719b5baacda269d68986af78f2e8110028787d805068b7
-
SHA512
a5c9ebb9c583494ecf493e5bf5cfda919e7e3b04b285ef90b62e07e475f907c2a6ffed81e2f80c67fd274d8699fe8c3610eee8b2ef70f81e802ab4310ecc5aee
-
SSDEEP
3072:sr85CAffhavIWqQlTskRTeNpbt64NUsHzqaB7SJLmwvjSQnf:k9ofDWqQlTs+KNfvUsHzYJL9jSQnf
Malware Config
Signatures
-
Detect Neshta payload 5 IoCs
resource yara_rule behavioral1/files/0x0001000000010314-11.dat family_neshta behavioral1/memory/1728-99-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1728-103-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x00060000000186f8-105.dat family_neshta behavioral1/memory/1028-113-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 4 IoCs
pid Process 3048 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 2000 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 2620 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 1028 svchost.com -
Loads dropped DLL 4 IoCs
pid Process 1728 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 3048 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 1728 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 3048 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3048 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1728 wrote to memory of 3048 1728 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 31 PID 1728 wrote to memory of 3048 1728 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 31 PID 1728 wrote to memory of 3048 1728 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 31 PID 1728 wrote to memory of 3048 1728 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 31 PID 3048 wrote to memory of 2000 3048 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 33 PID 3048 wrote to memory of 2000 3048 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 33 PID 3048 wrote to memory of 2000 3048 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 33 PID 3048 wrote to memory of 2620 3048 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 34 PID 3048 wrote to memory of 2620 3048 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 34 PID 3048 wrote to memory of 2620 3048 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 34 PID 3048 wrote to memory of 1028 3048 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 35 PID 3048 wrote to memory of 1028 3048 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 35 PID 3048 wrote to memory of 1028 3048 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 35 PID 3048 wrote to memory of 1028 3048 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 35 PID 1028 wrote to memory of 1992 1028 svchost.com 36 PID 1028 wrote to memory of 1992 1028 svchost.com 36 PID 1028 wrote to memory of 1992 1028 svchost.com 36 PID 1028 wrote to memory of 1992 1028 svchost.com 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exeDDEServer3⤵
- Executes dropped EXE
PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exeDDEClient3⤵
- Executes dropped EXE
PID:2620
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\cmd.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe4⤵
- System Location Discovery: System Language Discovery
PID:1992
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5cf6c595d3e5e9667667af096762fd9c4
SHA19bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe
Filesize114KB
MD5c5bc26c810d61e972e0a45f514c743cd
SHA1184e81694b1bd060c66c40cfd1687b82ca39777e
SHA2568411c7b4b1de7d664767934512688acc949156b6cba26060e316ea788904a391
SHA512762ac410d549347dfa9fc44cf88357c83bf3bf1e25750e7f31fb8fe050622b7b15db8642704d4d33543ee3c29e85fafbe84c4fadb60d5a0a1043cbc9de974527
-
Filesize
8B
MD5353dc1432b843f2e52d27b9c9a36297b
SHA1c7621d9416ba47fab97d3fe4c185a1bdc8575f57
SHA2560c7d167d5d31783731b5d663de04a626d18fa7ae7fd0d4e560f2c617255581fd
SHA512627753d349c6b657e28106aaf5f2d75440502f3467d4414b90eadec50a0f4f51e0ec624cff08c300e3f1c844ce09a8594c8969c2e0cbfd9e59b8d57bc91b3f7f
-
Filesize
40KB
MD536fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156