Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 12:26
Behavioral task
behavioral1
Sample
2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe
-
Size
154KB
-
MD5
877cec8193a067605a4ae8193cd6512c
-
SHA1
3a2b2fa4fa4ca05b909bb465f8623c8674aee5aa
-
SHA256
625e5d6d49f078375b719b5baacda269d68986af78f2e8110028787d805068b7
-
SHA512
a5c9ebb9c583494ecf493e5bf5cfda919e7e3b04b285ef90b62e07e475f907c2a6ffed81e2f80c67fd274d8699fe8c3610eee8b2ef70f81e802ab4310ecc5aee
-
SSDEEP
3072:sr85CAffhavIWqQlTskRTeNpbt64NUsHzqaB7SJLmwvjSQnf:k9ofDWqQlTs+KNfvUsHzYJL9jSQnf
Malware Config
Signatures
-
Detect Neshta payload 5 IoCs
resource yara_rule behavioral1/files/0x0001000000010314-11.dat family_neshta behavioral1/memory/2196-98-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2196-102-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x0008000000016d0e-103.dat family_neshta behavioral1/memory/2824-112-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 4 IoCs
pid Process 3024 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 2372 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 2920 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 2824 svchost.com -
Loads dropped DLL 4 IoCs
pid Process 2196 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 3024 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 2196 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 3024 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3024 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2196 wrote to memory of 3024 2196 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 30 PID 2196 wrote to memory of 3024 2196 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 30 PID 2196 wrote to memory of 3024 2196 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 30 PID 2196 wrote to memory of 3024 2196 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 30 PID 3024 wrote to memory of 2372 3024 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 32 PID 3024 wrote to memory of 2372 3024 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 32 PID 3024 wrote to memory of 2372 3024 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 32 PID 3024 wrote to memory of 2920 3024 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 33 PID 3024 wrote to memory of 2920 3024 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 33 PID 3024 wrote to memory of 2920 3024 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 33 PID 3024 wrote to memory of 2824 3024 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 35 PID 3024 wrote to memory of 2824 3024 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 35 PID 3024 wrote to memory of 2824 3024 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 35 PID 3024 wrote to memory of 2824 3024 2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe 35 PID 2824 wrote to memory of 2388 2824 svchost.com 36 PID 2824 wrote to memory of 2388 2824 svchost.com 36 PID 2824 wrote to memory of 2388 2824 svchost.com 36 PID 2824 wrote to memory of 2388 2824 svchost.com 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exeDDEServer3⤵
- Executes dropped EXE
PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exeDDEClient3⤵
- Executes dropped EXE
PID:2920
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\cmd.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe4⤵
- System Location Discovery: System Language Discovery
PID:2388
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5cf6c595d3e5e9667667af096762fd9c4
SHA19bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80
-
Filesize
8B
MD5aec3977f4731164a7fa97b9399fe1425
SHA1b9d6eff27bf24a047dcd74db25420dfacdf96db6
SHA256fec91fa7d750b47fbaba21b829bfeab88d045c9886c8fa00c96521ebee6ba617
SHA5129bdba38522265042537a1366781c09066bd2139c102e42e369b99a14e4f26e61d1d6f5b8faf73b5c3c3827acdbd9f475b8c74e20b03b08fc947131b12f11e42c
-
Filesize
40KB
MD536fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
\Users\Admin\AppData\Local\Temp\3582-490\2025-01-04_877cec8193a067605a4ae8193cd6512c_neshta_rook.exe
Filesize114KB
MD5c5bc26c810d61e972e0a45f514c743cd
SHA1184e81694b1bd060c66c40cfd1687b82ca39777e
SHA2568411c7b4b1de7d664767934512688acc949156b6cba26060e316ea788904a391
SHA512762ac410d549347dfa9fc44cf88357c83bf3bf1e25750e7f31fb8fe050622b7b15db8642704d4d33543ee3c29e85fafbe84c4fadb60d5a0a1043cbc9de974527