Analysis

  • max time kernel
    95s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-01-2025 10:01

General

  • Target

    svchost.exe

  • Size

    112KB

  • MD5

    2f000e0a52d6ee0c89f93fa5ab4c7e3c

  • SHA1

    6e45db2cc4648a388fbd6f3d82c7da9c8e30187d

  • SHA256

    cf1ebd6fb534d65dd0e8164db9693988d5a4a645dd044beba578ab25c0033e66

  • SHA512

    d433bf1fa375511d86621154450ade0879ee2705e7117fe6be67e38a26294d4187663b47ba3119da1776bf0594d516833696b80a502ff87b92c115cf98a368c4

  • SSDEEP

    1536:JxqjQ+P04wsmJCyfWxMb+KR0Nc8QsJq3+kk8YM7U1BEwox+L2CG7o:sr85CyOxe0Nc8QsC+kfYhHV2CZ

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_http

C2

http://185.174.100.204:443/L7RZw57VJ-b1dfR0k_tCyQtB1fJI8WowHQJSk54rTfUI2od24XrEIUzV5WGzx5fD0nPOwbVMrUfjFtDSZ8s8FudwarDyt7dL8gMPumRtXRv_ondaA99DiB1AmQDhTROOEB5RNqoBUGF7RO1eVLkzN4bgXoa9mjeqRlP1HJkpzxwa-XWfCySg54DfgGxSZPQAlpmdrTQwiPTmXmZzxGfhQBf

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Signatures

  • Detect Neshta payload 4 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:5036
    • C:\Users\Admin\AppData\Local\Temp\3582-490\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\svchost.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Users\Admin\AppData\Local\Temp\3582-490\svchost.exe

    Filesize

    72KB

    MD5

    277ae04cd437c0578320aa9f29d77764

    SHA1

    9e100bbba8d10ff0933d2921417fc49a4ad409d2

    SHA256

    772406ba85c9fb99ad9c066fde0fb39ee6ffac2f7702b383186274e7910c5384

    SHA512

    9b1ed598b1459c918ac2eeee9bac921eea91e73cfbd46292f3e0c351d8e20a27af12fa4ac5eb0286bca28935d7767384c8557f4733bd029aca5a3d47a0fc902e

  • memory/3088-114-0x0000000003900000-0x0000000003963000-memory.dmp

    Filesize

    396KB

  • memory/3088-119-0x0000000003150000-0x0000000003181000-memory.dmp

    Filesize

    196KB

  • memory/3088-80-0x0000000003400000-0x0000000003800000-memory.dmp

    Filesize

    4.0MB

  • memory/3088-103-0x0000000003150000-0x0000000003181000-memory.dmp

    Filesize

    196KB

  • memory/3088-104-0x0000000003150000-0x0000000003181000-memory.dmp

    Filesize

    196KB

  • memory/3088-113-0x0000000003200000-0x0000000003400000-memory.dmp

    Filesize

    2.0MB

  • memory/3088-12-0x00000000005A0000-0x00000000005A1000-memory.dmp

    Filesize

    4KB

  • memory/3088-74-0x0000000003150000-0x0000000003181000-memory.dmp

    Filesize

    196KB

  • memory/3088-134-0x0000000003970000-0x0000000003995000-memory.dmp

    Filesize

    148KB

  • memory/3088-139-0x0000000003200000-0x0000000003400000-memory.dmp

    Filesize

    2.0MB

  • memory/3088-140-0x0000000003150000-0x0000000003181000-memory.dmp

    Filesize

    196KB

  • memory/3088-143-0x0000000003200000-0x0000000003400000-memory.dmp

    Filesize

    2.0MB

  • memory/3088-142-0x0000000003200000-0x0000000003400000-memory.dmp

    Filesize

    2.0MB

  • memory/5036-141-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/5036-144-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/5036-146-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB