Analysis

  • max time kernel
    82s
  • max time network
    83s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-02-2025 17:25

Errors

Reason
Machine shutdown

General

  • Target

    2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe

  • Size

    90KB

  • MD5

    61a199076ddfb00d9a92792ffa0f2668

  • SHA1

    7478d5b7ecf47ac14cbba2fab46f69106d02b008

  • SHA256

    b107c99d3d84007f8bc1c3eca8ba6bfdb2b38dd56cbc1d1592110e55f84e6fd6

  • SHA512

    f3ce8923d9cd8add89516d3f5033b5a5ccea06890e3ad1b93a422e1d0afff4ef5c4c9aaf4dbcecea5563f0af977084cd944c6b5566607d48282ca1340f8d891b

  • SSDEEP

    1536:JxqjQ+P04wsmJC4uFECDpw10vnAOIUaJh4IXdWXLXTWLS:sr85Cnlw10vvA/7sSu

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\!satana!.txt

Ransom Note
You had bad luck.There was crypting of all your files in a FS bootkit virus <!SATANA!> To decrypt you need send on this E-mail: [email protected] your private code: A3D90235E1136671AB1195C6078184FF and pay on a Bitcoin Wallet: XbvKCGr8VowpBLwE8VxHNL2oL24ukKcNFw total 0,5 btc After that during 1 - 2 days the software will be sent to you - decryptor - and the necessary instructions. All changes in hardware configurations of your computer can make the decryption of your files absolutely impossible! Decryption of your files is possible only on your PC! Recovery is possible during 7 days, after which the program - decryptor - can not ask for the necessary signature from a public certificate server. Please contact via e-mail, which you can find as yet in the form of a text document in a folder with encrypted files, as well as in the name of all encrypted files.If you do not appreciate your files we recommend you format all your disks and reinstall the system. Read carefully this warning as it is no longer able to see at startup of the computer. We remind once again- it is all serious! Do not touch the configuration of your computer! E-mail: [email protected] - this is our mail CODE: A3D90235E1136671AB1195C6078184FF this is code; you must send BTC: XbvKCGr8VowpBLwE8VxHNL2oL24ukKcNFw here need to pay 0,5 bitcoins How to pay on the Bitcoin wallet you can easily find on the Internet. Enter your unlock code, obtained by E-mail here and press "ENTER" to continue the normal download on your computer. Good luck! May God help you! <!SATANA!>

Signatures

  • Detect Neshta payload 6 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Satana

    Ransomware family which also encrypts the system's Master Boot Record (MBR).

  • Satana family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 9 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\3582-490\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Users\Admin\AppData\Local\Temp\3582-490\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe
        "C:\Users\Admin\AppData\Local\Temp\3582-490\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Windows\svchost.com
          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\aryay.exe" {846ee340-7039-11de-9d20-806e6f6e6963} "C:\Users\Admin\AppData\Local\Temp\3582-490\2025-0~1.EXE"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1976
          • C:\Users\Admin\AppData\Local\Temp\aryay.exe
            C:\Users\Admin\AppData\Local\Temp\aryay.exe {846ee340-7039-11de-9d20-806e6f6e6963} C:\Users\Admin\AppData\Local\Temp\3582-490\2025-0~1.EXE
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1708
            • C:\Users\Admin\AppData\Local\Temp\aryay.exe
              C:\Users\Admin\AppData\Local\Temp\aryay.exe {846ee340-7039-11de-9d20-806e6f6e6963} C:\Users\Admin\AppData\Local\Temp\3582-490\2025-0~1.EXE
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Writes to the Master Boot Record (MBR)
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1812
              • C:\Windows\svchost.com
                "C:\Windows\svchost.com" "C:\Windows\system32\VSSADMIN.EXE" Delete Shadows /All /Quiet
                7⤵
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1992
                • C:\Windows\SysWOW64\VSSADMIN.EXE
                  C:\Windows\system32\VSSADMIN.EXE Delete Shadows /All /Quiet
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Interacts with shadow copies
                  PID:2984
              • C:\Windows\SysWOW64\NOTEPAD.EXE
                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\!satana!.txt
                7⤵
                • System Location Discovery: System Language Discovery
                PID:11968
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32.exe
                7⤵
                • System Location Discovery: System Language Discovery
                PID:11816
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32.exe
                7⤵
                • System Location Discovery: System Language Discovery
                PID:11648
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32.exe
                7⤵
                • System Location Discovery: System Language Discovery
                PID:11736
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1420
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:11372
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:12152

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe

        Filesize

        547KB

        MD5

        cf6c595d3e5e9667667af096762fd9c4

        SHA1

        9bb44da8d7f6457099cb56e4f7d1026963dce7ce

        SHA256

        593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d

        SHA512

        ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80

      • C:\Users\Admin\AppData\Local\Temp\!satana!.txt

        Filesize

        1KB

        MD5

        1e61574b5db873372a5047760f48c96a

        SHA1

        519df6e3288638beb6566d2c48df7ad6133fd404

        SHA256

        0df2b10908519c63a85ab8509bdf2182675da13a7c7fa38598d7b5d49f495e03

        SHA512

        f7d802ff5f0859c79650192a36e0ad46a43d0eda359b07c2d131908578b1c80043c918b86a32ad6243a94801df2225852c2f31cb95cb8f199596f88fb4f089ab

      • C:\Users\Admin\AppData\Local\Temp\3582-490\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe

        Filesize

        49KB

        MD5

        46bfd4f1d581d7c0121d2b19a005d3df

        SHA1

        5b063298bbd1670b4d39e1baef67f854b8dcba9d

        SHA256

        683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96

        SHA512

        b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5

      • C:\Users\Admin\AppData\Local\Temp\tmp5023.tmp

        Filesize

        8B

        MD5

        dda6cddfdf6ec92fd6b36e762c13a5af

        SHA1

        97bc2b6ea8b7dd88d4c083edefccea1025da8d66

        SHA256

        0fb272ecd4db6b32b913d606a80754fd8306df5bc0f5853c18a968fc09fccc31

        SHA512

        01086921096a8889acaaf089e55c7de8697166de5ea26f4e8baf6fff16d620db26d96936a6562fb58997f513e6537329dc50eb6998595134664a7b3d4f478aab

      • C:\Windows\directx.sys

        Filesize

        102B

        MD5

        22de0ba874f5a0e1b742430d06d9b264

        SHA1

        a16be086acea93cab0e8276425ecdf17c207ebad

        SHA256

        0f92c6ba04348c0c1a4c1ebe57dcae1f12ad2ce72b87b0a58a8a284e1f61bfd1

        SHA512

        c5481e3948f9785b297d33c284438231e9eb8ee229aaa4fc18273ed1b50a39ea3239aff8c9512ab6f7bd8b40f53e0679e46fcb9816d5c4a70624bc2207665cd6

      • C:\Windows\directx.sys

        Filesize

        34B

        MD5

        135f0649840129f4dc078f9d2709330a

        SHA1

        8eaad2d7967f9bfe69091600a7557ed45492af9e

        SHA256

        d4c3abfc34bd686aca8d0152b2c602994d0106601b93c570d3cb8a10a1530aa8

        SHA512

        62dd495e2fc0617ac6ef9f3a4d5f25eeba8829b229e0b675fbbaf1b2344b32925384843af2c8c3944998b8f329f742d98ff1975d538bae4bf81436c08d7f70f5

      • C:\Windows\svchost.com

        Filesize

        40KB

        MD5

        36fd5e09c417c767a952b4609d73a54b

        SHA1

        299399c5a2403080a5bf67fb46faec210025b36d

        SHA256

        980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2

        SHA512

        1813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92

      • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

        Filesize

        252KB

        MD5

        9e2b9928c89a9d0da1d3e8f4bd96afa7

        SHA1

        ec66cda99f44b62470c6930e5afda061579cde35

        SHA256

        8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

        SHA512

        2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

      • memory/1812-163-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-206-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-131-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-134-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-165-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-171-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-174-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-128-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-177-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-129-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-126-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-151-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-150-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-149-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-153-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-166-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-169-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-173-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-175-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-178-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-181-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-182-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-180-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-162-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-194-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-201-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-208-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-154-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-200-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-199-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-198-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-195-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-193-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-191-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-190-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-189-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-188-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-185-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-184-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-160-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-159-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-157-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1812-156-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1976-125-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1992-145-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/2380-96-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/2380-98-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/2692-99-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/2692-89-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/2692-91-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/2692-94-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/2692-88-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/2692-102-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB