Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    07/02/2025, 18:15

General

  • Target

    2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe

  • Size

    90KB

  • MD5

    61a199076ddfb00d9a92792ffa0f2668

  • SHA1

    7478d5b7ecf47ac14cbba2fab46f69106d02b008

  • SHA256

    b107c99d3d84007f8bc1c3eca8ba6bfdb2b38dd56cbc1d1592110e55f84e6fd6

  • SHA512

    f3ce8923d9cd8add89516d3f5033b5a5ccea06890e3ad1b93a422e1d0afff4ef5c4c9aaf4dbcecea5563f0af977084cd944c6b5566607d48282ca1340f8d891b

  • SSDEEP

    1536:JxqjQ+P04wsmJC4uFECDpw10vnAOIUaJh4IXdWXLXTWLS:sr85Cnlw10vvA/7sSu

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\!satana!.txt

Ransom Note
You had bad luck.There was crypting of all your files in a FS bootkit virus <!SATANA!> To decrypt you need send on this E-mail: [email protected] your private code: A3D90235E1136671AB1195C6078184FF and pay on a Bitcoin Wallet: XepTcfFzy1p7LpyRRQyqBz6jszwRVbo1Xm total 0,5 btc After that during 1 - 2 days the software will be sent to you - decryptor - and the necessary instructions. All changes in hardware configurations of your computer can make the decryption of your files absolutely impossible! Decryption of your files is possible only on your PC! Recovery is possible during 7 days, after which the program - decryptor - can not ask for the necessary signature from a public certificate server. Please contact via e-mail, which you can find as yet in the form of a text document in a folder with encrypted files, as well as in the name of all encrypted files.If you do not appreciate your files we recommend you format all your disks and reinstall the system. Read carefully this warning as it is no longer able to see at startup of the computer. We remind once again- it is all serious! Do not touch the configuration of your computer! E-mail: [email protected] - this is our mail CODE: A3D90235E1136671AB1195C6078184FF this is code; you must send BTC: XepTcfFzy1p7LpyRRQyqBz6jszwRVbo1Xm here need to pay 0,5 bitcoins How to pay on the Bitcoin wallet you can easily find on the Internet. Enter your unlock code, obtained by E-mail here and press "ENTER" to continue the normal download on your computer. Good luck! May God help you! <!SATANA!>

Signatures

  • Detect Neshta payload 6 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Satana

    Ransomware family which also encrypts the system's Master Boot Record (MBR).

  • Satana family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 9 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Users\Admin\AppData\Local\Temp\3582-490\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Users\Admin\AppData\Local\Temp\3582-490\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe
        "C:\Users\Admin\AppData\Local\Temp\3582-490\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2852
        • C:\Windows\svchost.com
          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\znx.exe" {846ee340-7039-11de-9d20-806e6f6e6963} "C:\Users\Admin\AppData\Local\Temp\3582-490\2025-0~1.EXE"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1984
          • C:\Users\Admin\AppData\Local\Temp\znx.exe
            C:\Users\Admin\AppData\Local\Temp\znx.exe {846ee340-7039-11de-9d20-806e6f6e6963} C:\Users\Admin\AppData\Local\Temp\3582-490\2025-0~1.EXE
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1184
            • C:\Users\Admin\AppData\Local\Temp\znx.exe
              C:\Users\Admin\AppData\Local\Temp\znx.exe {846ee340-7039-11de-9d20-806e6f6e6963} C:\Users\Admin\AppData\Local\Temp\3582-490\2025-0~1.EXE
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Writes to the Master Boot Record (MBR)
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1948
              • C:\Windows\svchost.com
                "C:\Windows\svchost.com" "C:\Windows\system32\VSSADMIN.EXE" Delete Shadows /All /Quiet
                7⤵
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1904
                • C:\Windows\SysWOW64\VSSADMIN.EXE
                  C:\Windows\system32\VSSADMIN.EXE Delete Shadows /All /Quiet
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Interacts with shadow copies
                  PID:2404
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe

    Filesize

    547KB

    MD5

    cf6c595d3e5e9667667af096762fd9c4

    SHA1

    9bb44da8d7f6457099cb56e4f7d1026963dce7ce

    SHA256

    593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d

    SHA512

    ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80

  • C:\Users\Admin\AppData\Local\Temp\!satana!.txt

    Filesize

    1KB

    MD5

    7876c47f075f27da18b812047bc73119

    SHA1

    f26032ca4faad88e9c412272688ff495957bc027

    SHA256

    5f3b24a1ffa9442e63d7f183421f547cfe416ea0888ad0ec5cf81947682c503f

    SHA512

    8c5a0d492030c4815cbd8ab98718b5a652965fd870de45204d741152191b36b1e791ebd2a92a9609177f201816df332dca93c68b2f29bfc5a5ae28d739fe3c7b

  • C:\Users\Admin\AppData\Local\Temp\tmp5023.tmp

    Filesize

    8B

    MD5

    aa86cb7e70ad5f0a73f7a99004e4851f

    SHA1

    165c6aa3177ff2cd69df18137c91bcc193d14e1f

    SHA256

    797dfe4a5168af5d77b161356c8c893cb505534fca5ac8400e8ee048c4801bc7

    SHA512

    fe7a1655232a04649a7112db95bf7f24dfec5da3b65414a87f10921b7a143e259fbf01ee15dbc58b801ef352afc2e3c79d4c26f430d76e849a882bfb385ec757

  • C:\Windows\directx.sys

    Filesize

    100B

    MD5

    5ea13ce720f47d39fdfd889ffb76e6d3

    SHA1

    4ce739c39a3c3e0f9c382d025517028d9a28b208

    SHA256

    0488d2f652d43edb2960499cd6548ecc03eff153f391d3d595d48a875b8aceeb

    SHA512

    bd8621a93e721157c7beda9b92790dd7777e9919dc59a5bc33ff302fdd711095a33bc5831606ff5044e7ac16839dac4447704c02aca739b80283bedba7e12721

  • C:\Windows\directx.sys

    Filesize

    34B

    MD5

    135f0649840129f4dc078f9d2709330a

    SHA1

    8eaad2d7967f9bfe69091600a7557ed45492af9e

    SHA256

    d4c3abfc34bd686aca8d0152b2c602994d0106601b93c570d3cb8a10a1530aa8

    SHA512

    62dd495e2fc0617ac6ef9f3a4d5f25eeba8829b229e0b675fbbaf1b2344b32925384843af2c8c3944998b8f329f742d98ff1975d538bae4bf81436c08d7f70f5

  • C:\Windows\svchost.com

    Filesize

    40KB

    MD5

    36fd5e09c417c767a952b4609d73a54b

    SHA1

    299399c5a2403080a5bf67fb46faec210025b36d

    SHA256

    980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2

    SHA512

    1813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\2025-02-07_61a199076ddfb00d9a92792ffa0f2668_neshta_satana.exe

    Filesize

    49KB

    MD5

    46bfd4f1d581d7c0121d2b19a005d3df

    SHA1

    5b063298bbd1670b4d39e1baef67f854b8dcba9d

    SHA256

    683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96

    SHA512

    b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5

  • memory/1124-96-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1124-98-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1904-151-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-162-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-153-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-135-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-124-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-129-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-128-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-132-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-150-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-179-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-163-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-178-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-177-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-175-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-174-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-173-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-171-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-169-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-166-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-165-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-181-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-160-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-159-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-157-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-156-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-154-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-182-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-184-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-149-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-148-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-191-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-193-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-200-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-199-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-198-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-197-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-196-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-195-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-194-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-192-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-190-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-189-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-188-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1948-185-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1984-127-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2852-89-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2852-88-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2852-91-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2852-94-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2852-99-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2852-102-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB