Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 14:01
Behavioral task
behavioral1
Sample
GrayWolf.exe
Resource
win7-20240903-en
General
-
Target
GrayWolf.exe
-
Size
5.4MB
-
MD5
fc880e4806da9ef322b4918ad89880bd
-
SHA1
a359064fce75722488038c4316deb7354cef87b5
-
SHA256
608e5234a2745f72909b5e002176149df66e39c36217fcc4826f13dba9e0153e
-
SHA512
ea43f38145b4493a0a2ed5a7fa6997dd86573530a479e7593928629f74106430e2e45ee15e156f6f3c648d164d909db0591fb0407034037e79d3175b146471da
-
SSDEEP
49152:DF/5OwXqsw+mw6j4w6SAZplWz3SUcSUWrXxRyJQfSqF6kr3Az0L:D/B0rQgCUcSUWOv98JL
Malware Config
Signatures
-
Detect Neshta payload 6 IoCs
resource yara_rule behavioral2/files/0x000600000002021e-43.dat family_neshta behavioral2/memory/4060-130-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000228e4-134.dat family_neshta behavioral2/memory/4060-135-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4060-137-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4060-140-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation GrayWolf.exe -
Executes dropped EXE 1 IoCs
pid Process 4272 GrayWolf.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" GrayWolf.exe -
Obfuscated with Agile.Net obfuscator 3 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/files/0x0007000000023c7d-4.dat agile_net behavioral2/memory/4272-13-0x0000000000040000-0x00000000005A6000-memory.dmp agile_net behavioral2/memory/4272-18-0x0000000002700000-0x00000000027B2000-memory.dmp agile_net -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe GrayWolf.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe GrayWolf.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe GrayWolf.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe GrayWolf.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe GrayWolf.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe GrayWolf.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe GrayWolf.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE GrayWolf.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe GrayWolf.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe GrayWolf.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe GrayWolf.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe GrayWolf.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe GrayWolf.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe GrayWolf.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe GrayWolf.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe GrayWolf.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE GrayWolf.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe GrayWolf.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe GrayWolf.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe GrayWolf.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe GrayWolf.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe GrayWolf.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe GrayWolf.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE GrayWolf.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE GrayWolf.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com GrayWolf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GrayWolf.exe -
Modifies registry class 21 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 GrayWolf.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 GrayWolf.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff GrayWolf.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff GrayWolf.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 GrayWolf.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" GrayWolf.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots GrayWolf.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff GrayWolf.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags GrayWolf.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 GrayWolf.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings GrayWolf.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU GrayWolf.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 GrayWolf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ GrayWolf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" GrayWolf.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell GrayWolf.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell GrayWolf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" GrayWolf.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ GrayWolf.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 GrayWolf.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff GrayWolf.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4272 GrayWolf.exe 4272 GrayWolf.exe 4272 GrayWolf.exe 4272 GrayWolf.exe 4272 GrayWolf.exe 4272 GrayWolf.exe 4272 GrayWolf.exe 4272 GrayWolf.exe 4272 GrayWolf.exe 4272 GrayWolf.exe 4272 GrayWolf.exe 4272 GrayWolf.exe 4272 GrayWolf.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4060 wrote to memory of 4272 4060 GrayWolf.exe 83 PID 4060 wrote to memory of 4272 4060 GrayWolf.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\GrayWolf.exe"C:\Users\Admin\AppData\Local\Temp\GrayWolf.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\GrayWolf.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\GrayWolf.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD53b73078a714bf61d1c19ebc3afc0e454
SHA19abeabd74613a2f533e2244c9ee6f967188e4e7e
SHA256ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29
SHA51275959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4
-
Filesize
1.6MB
MD53a3a71a5df2d162555fcda9bc0993d74
SHA195c7400f85325eba9b0a92abd80ea64b76917a1a
SHA2560a023355d1cc0a2348475d63aaf6aa0521d11e12a5c70102d7b3ebde092849e8
SHA5129ad76ccce76ccfe8292bca8def5bc7255e7ea0ba6d92130c4350da49a3d7faef2d46b08aaef1955f3f4ea0a2e22451562b5e08783a79f794724584e409cf7837
-
Filesize
5.4MB
MD502a88d03242515576fa54218538e34fa
SHA1ed6f90fcbf9fabf0da167987e1c2647833df5d6e
SHA256533afe3493caae3a36d03f7766aeeec4de9f682a76d73b8098f975daacf48c0b
SHA512b9b0a03500e5ef66569dc42b07c5da6c186660989403bafd9f8511303add0622f8a9f670f73dffa3ddd8fe044b82c4e26a4ad6ae6e1aa0898c72b3ef671e09d5