Analysis
-
max time kernel
82s -
max time network
83s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-02-2025 17:25
Behavioral task
behavioral1
Sample
2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe
Resource
win10v2004-20250207-en
Errors
General
-
Target
2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe
-
Size
90KB
-
MD5
61a199076ddfb00d9a92792ffa0f2668
-
SHA1
7478d5b7ecf47ac14cbba2fab46f69106d02b008
-
SHA256
b107c99d3d84007f8bc1c3eca8ba6bfdb2b38dd56cbc1d1592110e55f84e6fd6
-
SHA512
f3ce8923d9cd8add89516d3f5033b5a5ccea06890e3ad1b93a422e1d0afff4ef5c4c9aaf4dbcecea5563f0af977084cd944c6b5566607d48282ca1340f8d891b
-
SSDEEP
1536:JxqjQ+P04wsmJC4uFECDpw10vnAOIUaJh4IXdWXLXTWLS:sr85Cnlw10vvA/7sSu
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\!satana!.txt
Signatures
-
Detect Neshta payload 6 IoCs
resource yara_rule behavioral1/files/0x0001000000010314-13.dat family_neshta behavioral1/memory/2380-96-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2380-98-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x0008000000016890-105.dat family_neshta behavioral1/memory/1976-125-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1992-145-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Satana
Ransomware family which also encrypts the system's Master Boot Record (MBR).
-
Satana family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 6 IoCs
pid Process 2092 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 2692 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 1976 svchost.com 1708 aryay.exe 1812 aryay.exe 1992 svchost.com -
Loads dropped DLL 9 IoCs
pid Process 2380 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 2380 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 2380 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 2092 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 2692 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 1976 svchost.com 1976 svchost.com 1708 aryay.exe 1812 aryay.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\lbtbgdas = "C:\\Users\\Admin\\AppData\\Local\\Temp\\!satana!.txt" 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 aryay.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2092 set thread context of 2692 2092 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 1708 set thread context of 1812 1708 aryay.exe 35 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_SlateBlue.gif aryay.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\41.png aryay.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\feature.xml aryay.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-autoupdate-ui.xml aryay.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\LoginTool24x24Images.jpg aryay.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\MessageAttachmentIconImagesMask.bmp aryay.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\WSSFilesToolIconImagesMask.bmp aryay.exe File created C:\Program Files\Google\!satana!.txt aryay.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\!satana!.txt aryay.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-oql.xml aryay.exe File created C:\Program Files\Microsoft Games\More Games\en-US\!satana!.txt aryay.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_box_divider_right.png aryay.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Verve.xml aryay.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_HighMask.bmp aryay.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\!satana!.txt aryay.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\redStateIcon.png aryay.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\slideshow_glass_frame.png aryay.exe File created C:\Program Files (x86)\Common Files\System\ado\fr-FR\!satana!.txt aryay.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Angles.xml aryay.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\!satana!.txt aryay.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\10.png aryay.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_cloudy.png aryay.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_VideoInset.png aryay.exe File created C:\Program Files\Java\jre7\lib\zi\!satana!.txt aryay.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\stop_collection_data.gif aryay.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\DigitalInk.jpg aryay.exe File created C:\Program Files\Java\jre7\bin\!satana!.txt aryay.exe File created C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\!satana!.txt aryay.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\item_hover_docked.png aryay.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Peacock.jpg aryay.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\!satana!.txt aryay.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt aryay.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\!satana!.txt aryay.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\DMR_120.jpg aryay.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\bPrev-disable.png aryay.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Garden.jpg aryay.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\logo.png aryay.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt aryay.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\system_s.png aryay.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\item_hover_flyout.png aryay.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_browser.gif aryay.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\!satana!.txt aryay.exe File created C:\Program Files\Java\jre7\bin\plugin2\!satana!.txt aryay.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\!satana!.txt aryay.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\OutlineToolIconImagesMask.bmp aryay.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\delete_up.png aryay.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\!satana!.txt aryay.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\!satana!.txt aryay.exe File created C:\Program Files\MSBuild\Microsoft\!satana!.txt aryay.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\!satana!.txt aryay.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_gray_cloudy.png aryay.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\conticon.gif aryay.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler-ui.xml aryay.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-profiling.xml aryay.exe File created C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\!satana!.txt aryay.exe File created C:\Program Files\VideoLAN\VLC\locale\sw\LC_MESSAGES\!satana!.txt aryay.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\!satana!.txt aryay.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\novelty.png aryay.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\win32_LinkNoDrop32x32.gif aryay.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\!satana!.txt aryay.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-full.png aryay.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\AboutBox.zip aryay.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\(144DPI)redStateIcon.png aryay.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VSSADMIN.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aryay.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aryay.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2984 VSSADMIN.EXE -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1812 aryay.exe Token: SeBackupPrivilege 1420 vssvc.exe Token: SeRestorePrivilege 1420 vssvc.exe Token: SeAuditPrivilege 1420 vssvc.exe Token: SeShutdownPrivilege 1812 aryay.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2092 2380 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 30 PID 2380 wrote to memory of 2092 2380 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 30 PID 2380 wrote to memory of 2092 2380 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 30 PID 2380 wrote to memory of 2092 2380 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 30 PID 2092 wrote to memory of 2692 2092 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 2092 wrote to memory of 2692 2092 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 2092 wrote to memory of 2692 2092 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 2092 wrote to memory of 2692 2092 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 2092 wrote to memory of 2692 2092 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 2092 wrote to memory of 2692 2092 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 2092 wrote to memory of 2692 2092 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 2092 wrote to memory of 2692 2092 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 2092 wrote to memory of 2692 2092 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 2092 wrote to memory of 2692 2092 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 2692 wrote to memory of 1976 2692 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 33 PID 2692 wrote to memory of 1976 2692 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 33 PID 2692 wrote to memory of 1976 2692 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 33 PID 2692 wrote to memory of 1976 2692 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 33 PID 1976 wrote to memory of 1708 1976 svchost.com 34 PID 1976 wrote to memory of 1708 1976 svchost.com 34 PID 1976 wrote to memory of 1708 1976 svchost.com 34 PID 1976 wrote to memory of 1708 1976 svchost.com 34 PID 1708 wrote to memory of 1812 1708 aryay.exe 35 PID 1708 wrote to memory of 1812 1708 aryay.exe 35 PID 1708 wrote to memory of 1812 1708 aryay.exe 35 PID 1708 wrote to memory of 1812 1708 aryay.exe 35 PID 1708 wrote to memory of 1812 1708 aryay.exe 35 PID 1708 wrote to memory of 1812 1708 aryay.exe 35 PID 1708 wrote to memory of 1812 1708 aryay.exe 35 PID 1708 wrote to memory of 1812 1708 aryay.exe 35 PID 1708 wrote to memory of 1812 1708 aryay.exe 35 PID 1708 wrote to memory of 1812 1708 aryay.exe 35 PID 1812 wrote to memory of 1992 1812 aryay.exe 36 PID 1812 wrote to memory of 1992 1812 aryay.exe 36 PID 1812 wrote to memory of 1992 1812 aryay.exe 36 PID 1812 wrote to memory of 1992 1812 aryay.exe 36 PID 1992 wrote to memory of 2984 1992 svchost.com 37 PID 1992 wrote to memory of 2984 1992 svchost.com 37 PID 1992 wrote to memory of 2984 1992 svchost.com 37 PID 1992 wrote to memory of 2984 1992 svchost.com 37 PID 1812 wrote to memory of 11968 1812 aryay.exe 41 PID 1812 wrote to memory of 11968 1812 aryay.exe 41 PID 1812 wrote to memory of 11968 1812 aryay.exe 41 PID 1812 wrote to memory of 11968 1812 aryay.exe 41 PID 1812 wrote to memory of 11816 1812 aryay.exe 42 PID 1812 wrote to memory of 11816 1812 aryay.exe 42 PID 1812 wrote to memory of 11816 1812 aryay.exe 42 PID 1812 wrote to memory of 11816 1812 aryay.exe 42 PID 1812 wrote to memory of 11816 1812 aryay.exe 42 PID 1812 wrote to memory of 11816 1812 aryay.exe 42 PID 1812 wrote to memory of 11816 1812 aryay.exe 42 PID 1812 wrote to memory of 11816 1812 aryay.exe 42 PID 1812 wrote to memory of 11816 1812 aryay.exe 42 PID 1812 wrote to memory of 11648 1812 aryay.exe 43 PID 1812 wrote to memory of 11648 1812 aryay.exe 43 PID 1812 wrote to memory of 11648 1812 aryay.exe 43 PID 1812 wrote to memory of 11648 1812 aryay.exe 43 PID 1812 wrote to memory of 11648 1812 aryay.exe 43 PID 1812 wrote to memory of 11648 1812 aryay.exe 43 PID 1812 wrote to memory of 11648 1812 aryay.exe 43 PID 1812 wrote to memory of 11648 1812 aryay.exe 43 PID 1812 wrote to memory of 11648 1812 aryay.exe 43 PID 1812 wrote to memory of 11736 1812 aryay.exe 44 PID 1812 wrote to memory of 11736 1812 aryay.exe 44 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\aryay.exe" {846ee340-7039-11de-9d20-806e6f6e6963} "C:\Users\Admin\AppData\Local\Temp\3582-490\2025-0~1.EXE"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\aryay.exeC:\Users\Admin\AppData\Local\Temp\aryay.exe {846ee340-7039-11de-9d20-806e6f6e6963} C:\Users\Admin\AppData\Local\Temp\3582-490\2025-0~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\aryay.exeC:\Users\Admin\AppData\Local\Temp\aryay.exe {846ee340-7039-11de-9d20-806e6f6e6963} C:\Users\Admin\AppData\Local\Temp\3582-490\2025-0~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\system32\VSSADMIN.EXE" Delete Shadows /All /Quiet7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\VSSADMIN.EXEC:\Windows\system32\VSSADMIN.EXE Delete Shadows /All /Quiet8⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2984
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\!satana!.txt7⤵
- System Location Discovery: System Language Discovery
PID:11968
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe7⤵
- System Location Discovery: System Language Discovery
PID:11816
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe7⤵
- System Location Discovery: System Language Discovery
PID:11648
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe7⤵
- System Location Discovery: System Language Discovery
PID:11736
-
-
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:11372
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:12152
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
2Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5cf6c595d3e5e9667667af096762fd9c4
SHA19bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80
-
Filesize
1KB
MD51e61574b5db873372a5047760f48c96a
SHA1519df6e3288638beb6566d2c48df7ad6133fd404
SHA2560df2b10908519c63a85ab8509bdf2182675da13a7c7fa38598d7b5d49f495e03
SHA512f7d802ff5f0859c79650192a36e0ad46a43d0eda359b07c2d131908578b1c80043c918b86a32ad6243a94801df2225852c2f31cb95cb8f199596f88fb4f089ab
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe
Filesize49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
Filesize
8B
MD5dda6cddfdf6ec92fd6b36e762c13a5af
SHA197bc2b6ea8b7dd88d4c083edefccea1025da8d66
SHA2560fb272ecd4db6b32b913d606a80754fd8306df5bc0f5853c18a968fc09fccc31
SHA51201086921096a8889acaaf089e55c7de8697166de5ea26f4e8baf6fff16d620db26d96936a6562fb58997f513e6537329dc50eb6998595134664a7b3d4f478aab
-
Filesize
102B
MD522de0ba874f5a0e1b742430d06d9b264
SHA1a16be086acea93cab0e8276425ecdf17c207ebad
SHA2560f92c6ba04348c0c1a4c1ebe57dcae1f12ad2ce72b87b0a58a8a284e1f61bfd1
SHA512c5481e3948f9785b297d33c284438231e9eb8ee229aaa4fc18273ed1b50a39ea3239aff8c9512ab6f7bd8b40f53e0679e46fcb9816d5c4a70624bc2207665cd6
-
Filesize
34B
MD5135f0649840129f4dc078f9d2709330a
SHA18eaad2d7967f9bfe69091600a7557ed45492af9e
SHA256d4c3abfc34bd686aca8d0152b2c602994d0106601b93c570d3cb8a10a1530aa8
SHA51262dd495e2fc0617ac6ef9f3a4d5f25eeba8829b229e0b675fbbaf1b2344b32925384843af2c8c3944998b8f329f742d98ff1975d538bae4bf81436c08d7f70f5
-
Filesize
40KB
MD536fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156