Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
07/02/2025, 18:15
Behavioral task
behavioral1
Sample
2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe
Resource
win10v2004-20250207-en
General
-
Target
2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe
-
Size
90KB
-
MD5
61a199076ddfb00d9a92792ffa0f2668
-
SHA1
7478d5b7ecf47ac14cbba2fab46f69106d02b008
-
SHA256
b107c99d3d84007f8bc1c3eca8ba6bfdb2b38dd56cbc1d1592110e55f84e6fd6
-
SHA512
f3ce8923d9cd8add89516d3f5033b5a5ccea06890e3ad1b93a422e1d0afff4ef5c4c9aaf4dbcecea5563f0af977084cd944c6b5566607d48282ca1340f8d891b
-
SSDEEP
1536:JxqjQ+P04wsmJC4uFECDpw10vnAOIUaJh4IXdWXLXTWLS:sr85Cnlw10vvA/7sSu
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\!satana!.txt
Signatures
-
Detect Neshta payload 6 IoCs
resource yara_rule behavioral1/files/0x0001000000010319-13.dat family_neshta behavioral1/memory/1124-96-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1124-98-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x0008000000016c66-105.dat family_neshta behavioral1/memory/1984-127-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1904-151-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Satana
Ransomware family which also encrypts the system's Master Boot Record (MBR).
-
Satana family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 6 IoCs
pid Process 2488 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 2852 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 1984 svchost.com 1184 znx.exe 1948 znx.exe 1904 svchost.com -
Loads dropped DLL 9 IoCs
pid Process 1124 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 1124 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 1124 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 2488 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 2852 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 1984 svchost.com 1984 svchost.com 1184 znx.exe 1948 znx.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxapreh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\!satana!.txt" 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 znx.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2488 set thread context of 2852 2488 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 1184 set thread context of 1948 1184 znx.exe 35 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\buttonDown_Off.png znx.exe File created C:\Program Files (x86)\Windows Photo Viewer\it-IT\!satana!.txt znx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_hail.png znx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\!satana!.txt znx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_blue_partly-cloudy.png znx.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\!satana!.txt znx.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\!satana!.txt znx.exe File created C:\Program Files\Windows Photo Viewer\!satana!.txt znx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\button_MCELogo_mouseover.png znx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\setting_back.png znx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\feature.xml znx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\leftnav.gif znx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-templates.xml znx.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\!satana!.txt znx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\!satana!.txt znx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-host-remote.xml znx.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\Explorer.zip znx.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\!satana!.txt znx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\feature.xml znx.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_diagonals-thick_20_666666_40x40.png znx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\reveal_down.png znx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\37.png znx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\rss_headline_glow_docked.png znx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\gadget.xml znx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\babyblue.png znx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\drag.png znx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_gray_hail.png znx.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\!satana!.txt znx.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\feature.xml znx.exe File created C:\Program Files (x86)\Microsoft Office\!satana!.txt znx.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\EmptyDatabase.zip znx.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationUp_SelectionSubpicture.png znx.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe File created C:\Program Files\Common Files\System\en-US\!satana!.txt znx.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\!satana!.txt znx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\bPrev.png znx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-nodes.xml znx.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\!satana!.txt znx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_snow.png znx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_VelvetRose.gif znx.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\1033\!satana!.txt znx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\AddToViewArrowMask.bmp znx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationRight_ButtonGraphic.png znx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\720x480icongraphic.png znx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\!satana!.txt znx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\17.png znx.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\HandPrints.jpg znx.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\1033\!satana!.txt znx.exe File created C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\!satana!.txt znx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-bootstrap.xml znx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-application-views.xml znx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\gadget.xml znx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\drag.png znx.exe File created C:\Program Files (x86)\Microsoft Office\Office14\QUERIES\!satana!.txt znx.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\!satana!.txt znx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_CopyDrop32x32.gif znx.exe File opened for modification C:\Program Files\VideoLAN\VLC\README.txt znx.exe File created C:\Program Files\Windows Media Player\es-ES\!satana!.txt znx.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\!satana!.txt znx.exe File created C:\Program Files\VideoLAN\VLC\skins\fonts\!satana!.txt znx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\prev_rest.png znx.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language znx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language znx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VSSADMIN.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2404 VSSADMIN.EXE -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1948 znx.exe Token: SeBackupPrivilege 2508 vssvc.exe Token: SeRestorePrivilege 2508 vssvc.exe Token: SeAuditPrivilege 2508 vssvc.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1124 wrote to memory of 2488 1124 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 30 PID 1124 wrote to memory of 2488 1124 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 30 PID 1124 wrote to memory of 2488 1124 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 30 PID 1124 wrote to memory of 2488 1124 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 30 PID 2488 wrote to memory of 2852 2488 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 2488 wrote to memory of 2852 2488 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 2488 wrote to memory of 2852 2488 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 2488 wrote to memory of 2852 2488 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 2488 wrote to memory of 2852 2488 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 2488 wrote to memory of 2852 2488 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 2488 wrote to memory of 2852 2488 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 2488 wrote to memory of 2852 2488 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 2488 wrote to memory of 2852 2488 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 2488 wrote to memory of 2852 2488 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 31 PID 2852 wrote to memory of 1984 2852 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 33 PID 2852 wrote to memory of 1984 2852 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 33 PID 2852 wrote to memory of 1984 2852 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 33 PID 2852 wrote to memory of 1984 2852 2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe 33 PID 1984 wrote to memory of 1184 1984 svchost.com 34 PID 1984 wrote to memory of 1184 1984 svchost.com 34 PID 1984 wrote to memory of 1184 1984 svchost.com 34 PID 1984 wrote to memory of 1184 1984 svchost.com 34 PID 1184 wrote to memory of 1948 1184 znx.exe 35 PID 1184 wrote to memory of 1948 1184 znx.exe 35 PID 1184 wrote to memory of 1948 1184 znx.exe 35 PID 1184 wrote to memory of 1948 1184 znx.exe 35 PID 1184 wrote to memory of 1948 1184 znx.exe 35 PID 1184 wrote to memory of 1948 1184 znx.exe 35 PID 1184 wrote to memory of 1948 1184 znx.exe 35 PID 1184 wrote to memory of 1948 1184 znx.exe 35 PID 1184 wrote to memory of 1948 1184 znx.exe 35 PID 1184 wrote to memory of 1948 1184 znx.exe 35 PID 1948 wrote to memory of 1904 1948 znx.exe 36 PID 1948 wrote to memory of 1904 1948 znx.exe 36 PID 1948 wrote to memory of 1904 1948 znx.exe 36 PID 1948 wrote to memory of 1904 1948 znx.exe 36 PID 1904 wrote to memory of 2404 1904 svchost.com 37 PID 1904 wrote to memory of 2404 1904 svchost.com 37 PID 1904 wrote to memory of 2404 1904 svchost.com 37 PID 1904 wrote to memory of 2404 1904 svchost.com 37 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\znx.exe" {846ee340-7039-11de-9d20-806e6f6e6963} "C:\Users\Admin\AppData\Local\Temp\3582-490\2025-0~1.EXE"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\znx.exeC:\Users\Admin\AppData\Local\Temp\znx.exe {846ee340-7039-11de-9d20-806e6f6e6963} C:\Users\Admin\AppData\Local\Temp\3582-490\2025-0~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\znx.exeC:\Users\Admin\AppData\Local\Temp\znx.exe {846ee340-7039-11de-9d20-806e6f6e6963} C:\Users\Admin\AppData\Local\Temp\3582-490\2025-0~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\system32\VSSADMIN.EXE" Delete Shadows /All /Quiet7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\VSSADMIN.EXEC:\Windows\system32\VSSADMIN.EXE Delete Shadows /All /Quiet8⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2404
-
-
-
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2508
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
2Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5cf6c595d3e5e9667667af096762fd9c4
SHA19bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80
-
Filesize
1KB
MD57876c47f075f27da18b812047bc73119
SHA1f26032ca4faad88e9c412272688ff495957bc027
SHA2565f3b24a1ffa9442e63d7f183421f547cfe416ea0888ad0ec5cf81947682c503f
SHA5128c5a0d492030c4815cbd8ab98718b5a652965fd870de45204d741152191b36b1e791ebd2a92a9609177f201816df332dca93c68b2f29bfc5a5ae28d739fe3c7b
-
Filesize
8B
MD5aa86cb7e70ad5f0a73f7a99004e4851f
SHA1165c6aa3177ff2cd69df18137c91bcc193d14e1f
SHA256797dfe4a5168af5d77b161356c8c893cb505534fca5ac8400e8ee048c4801bc7
SHA512fe7a1655232a04649a7112db95bf7f24dfec5da3b65414a87f10921b7a143e259fbf01ee15dbc58b801ef352afc2e3c79d4c26f430d76e849a882bfb385ec757
-
Filesize
100B
MD55ea13ce720f47d39fdfd889ffb76e6d3
SHA14ce739c39a3c3e0f9c382d025517028d9a28b208
SHA2560488d2f652d43edb2960499cd6548ecc03eff153f391d3d595d48a875b8aceeb
SHA512bd8621a93e721157c7beda9b92790dd7777e9919dc59a5bc33ff302fdd711095a33bc5831606ff5044e7ac16839dac4447704c02aca739b80283bedba7e12721
-
Filesize
34B
MD5135f0649840129f4dc078f9d2709330a
SHA18eaad2d7967f9bfe69091600a7557ed45492af9e
SHA256d4c3abfc34bd686aca8d0152b2c602994d0106601b93c570d3cb8a10a1530aa8
SHA51262dd495e2fc0617ac6ef9f3a4d5f25eeba8829b229e0b675fbbaf1b2344b32925384843af2c8c3944998b8f329f742d98ff1975d538bae4bf81436c08d7f70f5
-
Filesize
40KB
MD536fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
\Users\Admin\AppData\Local\Temp\3582-490\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe
Filesize49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5