SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301

General
Target

SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe

Filesize

700KB

Completed

06-07-2021 15:51

Score
10/10
MD5

4c33a8d7ea67f81000eee8b1c9475f9c

SHA1

a96a1a2cd37af1a04fafc9104b59661924c2c2a0

SHA256

3fa53f6f68e280013eb9651a53a3c40a16fa99f7689d0761b3f95b2de68b22cf

Malware Config
Signatures 11

Filter: none

Collection
Credential Access
Defense Evasion
Discovery
Persistence
  • Detect Neshta Payload

    Reported IOCs

    resourceyara_rule
    behavioral1/memory/456-66-0x0000000000400000-0x000000000041B000-memory.dmpfamily_neshta
    behavioral1/memory/456-67-0x00000000004080E4-mapping.dmpfamily_neshta
    behavioral1/memory/456-69-0x0000000000400000-0x000000000041B000-memory.dmpfamily_neshta
  • Modifies system executable filetype association
    SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe

    TTPs

    Modify RegistryChange Default File Association

    Reported IOCs

    descriptioniocprocess
    Set value (str)\REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*"SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
  • Neshta

    Description

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Loads dropped DLL
    SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe

    Reported IOCs

    pidprocess
    456SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    456SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    456SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    TTPs

    Data from Local SystemCredentials in Files
  • Suspicious use of SetThreadContext
    SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 1080 set thread context of 4561080SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
  • Drops file in Program Files directory
    SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe

    Reported IOCs

    descriptioniocprocess
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GO664E~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GOF5E2~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\OIS.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\WI54FB~1\WMPDMC.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\WI54FB~1\setup_wm.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\misc.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GOOGLE~3.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GOOGLE~2.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\INTERN~1\ieinstal.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\WORDICON.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\WI54FB~1\wmprph.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\PPTICO.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\WINWORD.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Google\Temp\GUME011.tmp\GOFB2B~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\GRAPH.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\INTERN~1\iexplore.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\XLICONS.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\WINDOW~1\wabmig.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\WI54FB~1\wmplayer.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GOBD5D~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\WI54FB~1\wmpshare.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\WI4223~1\sidebar.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~3\PACKAG~1\{F4220~1\VC_RED~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GOOGLE~4.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MOZILL~1\UNINST~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\WINDOW~1\wab.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\INTERN~1\ielowutil.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\BCSSync.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\MSOUC.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
  • Drops file in Windows directory
    SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe

    Reported IOCs

    descriptioniocprocess
    File opened for modificationC:\Windows\svchost.comSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
  • Enumerates physical storage devices

    Description

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    TTPs

    System Information Discovery
  • Modifies registry class
    SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe

    Reported IOCs

    descriptioniocprocess
    Set value (str)\REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*"SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
  • Suspicious use of WriteProcessMemory
    SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 1080 wrote to memory of 4561080SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 1080 wrote to memory of 4561080SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 1080 wrote to memory of 4561080SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 1080 wrote to memory of 4561080SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 1080 wrote to memory of 4561080SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 1080 wrote to memory of 4561080SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 1080 wrote to memory of 4561080SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 1080 wrote to memory of 4561080SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 1080 wrote to memory of 4561080SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 1080 wrote to memory of 4561080SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 1080 wrote to memory of 4561080SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 1080 wrote to memory of 4561080SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
Processes 2
  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe"
    Suspicious use of SetThreadContext
    Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
      "{path}"
      Modifies system executable filetype association
      Loads dropped DLL
      Drops file in Program Files directory
      Drops file in Windows directory
      Modifies registry class
      PID:456
Network
MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Defense Evasion
    Execution
      Exfiltration
        Impact
          Initial Access
            Lateral Movement
              Privilege Escalation
                Replay Monitor
                00:00 00:00
                Downloads
                • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

                  MD5

                  9e2b9928c89a9d0da1d3e8f4bd96afa7

                  SHA1

                  ec66cda99f44b62470c6930e5afda061579cde35

                  SHA256

                  8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

                  SHA512

                  2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

                • \PROGRA~2\Google\Temp\GUME011.tmp\GOFB2B~1.EXE

                  MD5

                  583ff3367e050c4d62bc03516473b40a

                  SHA1

                  6aa1d26352b78310e711884829c35a69ed1bf0f9

                  SHA256

                  6b63f8dd47d8b3baa71b6cd205d428861b96bf09cf479071e75ddd23f97c0146

                  SHA512

                  e9bdd5cc2e29db48cc524488fbadb08e808f17f6e18fa595cfebae229c94f2547079e52a2ada214169577b89b2ffbef424729cd90acdea3774f5c76aec192be0

                • \PROGRA~2\Google\Update\1335~1.452\GOFB2B~1.EXE

                  MD5

                  583ff3367e050c4d62bc03516473b40a

                  SHA1

                  6aa1d26352b78310e711884829c35a69ed1bf0f9

                  SHA256

                  6b63f8dd47d8b3baa71b6cd205d428861b96bf09cf479071e75ddd23f97c0146

                  SHA512

                  e9bdd5cc2e29db48cc524488fbadb08e808f17f6e18fa595cfebae229c94f2547079e52a2ada214169577b89b2ffbef424729cd90acdea3774f5c76aec192be0

                • memory/456-69-0x0000000000400000-0x000000000041B000-memory.dmp

                • memory/456-68-0x00000000766D1000-0x00000000766D3000-memory.dmp

                • memory/456-67-0x00000000004080E4-mapping.dmp

                • memory/456-66-0x0000000000400000-0x000000000041B000-memory.dmp

                • memory/1080-65-0x00000000005A0000-0x00000000005DD000-memory.dmp

                • memory/1080-64-0x000000000A1C0000-0x000000000A244000-memory.dmp

                • memory/1080-63-0x00000000049A0000-0x00000000049A1000-memory.dmp

                • memory/1080-62-0x0000000000360000-0x0000000000362000-memory.dmp

                • memory/1080-61-0x0000000000E90000-0x0000000000EF2000-memory.dmp

                • memory/1080-59-0x0000000000F90000-0x0000000000F91000-memory.dmp