SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301

General
Target

SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe

Filesize

700KB

Completed

06-07-2021 15:51

Score
10/10
MD5

4c33a8d7ea67f81000eee8b1c9475f9c

SHA1

a96a1a2cd37af1a04fafc9104b59661924c2c2a0

SHA256

3fa53f6f68e280013eb9651a53a3c40a16fa99f7689d0761b3f95b2de68b22cf

Malware Config
Signatures 12

Filter: none

Collection
Credential Access
Defense Evasion
Discovery
Persistence
  • Detect Neshta Payload

    Reported IOCs

    resourceyara_rule
    behavioral2/memory/2128-125-0x0000000000400000-0x000000000041B000-memory.dmpfamily_neshta
    behavioral2/memory/2128-126-0x00000000004080E4-mapping.dmpfamily_neshta
    behavioral2/memory/2128-127-0x0000000000400000-0x000000000041B000-memory.dmpfamily_neshta
  • Modifies system executable filetype association
    SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe

    TTPs

    Modify RegistryChange Default File Association

    Reported IOCs

    descriptioniocprocess
    Set value (str)\REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*"SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
  • Neshta

    Description

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    TTPs

    Data from Local SystemCredentials in Files
  • Suspicious use of SetThreadContext
    SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 3424 set thread context of 21283424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
  • Drops file in Program Files directory
    SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe

    Reported IOCs

    descriptioniocprocess
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Google\Update\DISABL~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\INTERN~1\ExtExport.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\WINDOW~2\wabmig.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\WINDOW~2\WinMail.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GOOGLE~3.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GOBD5D~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\WI54FB~1\wmprph.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\INTERN~1\ieinstal.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\INTERN~1\iexplore.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\WI54FB~1\wmlaunch.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GOOGLE~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\WI54FB~1\setup_wm.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\WI54FB~1\wmpshare.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~3\PACKAG~1\{F4220~1\VC_RED~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\WI54FB~1\wmplayer.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\INTERN~1\ielowutil.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MOZILL~1\MAINTE~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\MOZILL~1\UNINST~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GO664E~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GOFB2B~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\WI8A19~1\ImagingDevices.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\WI54FB~1\wmpconfig.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\armsvc.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\WINDOW~4\ACCESS~1\wordpad.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GOF5E2~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Google\Temp\GUM1CBD.tmp\GOFB2B~1.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GOOGLE~4.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GOOGLE~2.EXESecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    File opened for modificationC:\PROGRA~2\WINDOW~2\wab.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
  • Drops file in Windows directory
    SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe

    Reported IOCs

    descriptioniocprocess
    File opened for modificationC:\Windows\svchost.comSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
  • Enumerates physical storage devices

    Description

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    TTPs

    System Information Discovery
  • Modifies registry class
    SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe

    Reported IOCs

    descriptioniocprocess
    Set value (str)\REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*"SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
  • Suspicious behavior: EnumeratesProcesses
    SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe

    Reported IOCs

    pidprocess
    3424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    3424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    3424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    3424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
  • Suspicious use of AdjustPrivilegeToken
    SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe

    Reported IOCs

    descriptionpidprocess
    Token: SeDebugPrivilege3424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
  • Suspicious use of WriteProcessMemory
    SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 3424 wrote to memory of 31203424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 3424 wrote to memory of 31203424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 3424 wrote to memory of 31203424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 3424 wrote to memory of 33643424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 3424 wrote to memory of 33643424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 3424 wrote to memory of 33643424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 3424 wrote to memory of 21283424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 3424 wrote to memory of 21283424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 3424 wrote to memory of 21283424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 3424 wrote to memory of 21283424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 3424 wrote to memory of 21283424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 3424 wrote to memory of 21283424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 3424 wrote to memory of 21283424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 3424 wrote to memory of 21283424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 3424 wrote to memory of 21283424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 3424 wrote to memory of 21283424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    PID 3424 wrote to memory of 21283424SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exeSecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
Processes 4
  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe"
    Suspicious use of SetThreadContext
    Suspicious behavior: EnumeratesProcesses
    Suspicious use of AdjustPrivilegeToken
    Suspicious use of WriteProcessMemory
    PID:3424
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
      "{path}"
      PID:3120
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
      "{path}"
      PID:3364
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.MSIL_Kryptik.ERY.genEldorado.22139.11301.exe
      "{path}"
      Modifies system executable filetype association
      Drops file in Program Files directory
      Drops file in Windows directory
      Modifies registry class
      PID:2128
Network
MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Defense Evasion
    Execution
      Exfiltration
        Impact
          Initial Access
            Lateral Movement
              Privilege Escalation
                Replay Monitor
                00:00 00:00
                Downloads
                • memory/2128-127-0x0000000000400000-0x000000000041B000-memory.dmp

                • memory/2128-126-0x00000000004080E4-mapping.dmp

                • memory/2128-125-0x0000000000400000-0x000000000041B000-memory.dmp

                • memory/3424-121-0x00000000024C0000-0x00000000024C2000-memory.dmp

                • memory/3424-119-0x00000000024D0000-0x00000000024D1000-memory.dmp

                • memory/3424-120-0x0000000004B60000-0x0000000004B61000-memory.dmp

                • memory/3424-118-0x0000000009EF0000-0x0000000009EF1000-memory.dmp

                • memory/3424-122-0x000000000A190000-0x000000000A191000-memory.dmp

                • memory/3424-123-0x000000000ABF0000-0x000000000AC74000-memory.dmp

                • memory/3424-124-0x0000000004CA0000-0x0000000004CDD000-memory.dmp

                • memory/3424-117-0x000000000A3F0000-0x000000000A3F1000-memory.dmp

                • memory/3424-116-0x0000000004960000-0x00000000049C2000-memory.dmp

                • memory/3424-114-0x0000000000090000-0x0000000000091000-memory.dmp