Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    22-10-2021 04:56

General

  • Target

    10582cb77db8a793346cb4ded73df5e63fcb1d3f9ed252a13d8b38c2b8463c56.exe

  • Size

    230KB

  • MD5

    fc47d6284d44425fdb5da2519096c5a5

  • SHA1

    77c03a6d3583480c432c64bd0d634394ccdb2f87

  • SHA256

    10582cb77db8a793346cb4ded73df5e63fcb1d3f9ed252a13d8b38c2b8463c56

  • SHA512

    bb905c6c86d404ce89a78c88b063eec17f8362dabcfced865d0285c50247c10d9e8d917722919922129eed5dc8926adbb8f0f54df5756100d86e1e9cbf249749

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 53 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10582cb77db8a793346cb4ded73df5e63fcb1d3f9ed252a13d8b38c2b8463c56.exe
    "C:\Users\Admin\AppData\Local\Temp\10582cb77db8a793346cb4ded73df5e63fcb1d3f9ed252a13d8b38c2b8463c56.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Users\Admin\AppData\Local\Temp\10582cb77db8a793346cb4ded73df5e63fcb1d3f9ed252a13d8b38c2b8463c56.exe
      "C:\Users\Admin\AppData\Local\Temp\10582cb77db8a793346cb4ded73df5e63fcb1d3f9ed252a13d8b38c2b8463c56.exe"
      2⤵
      • Modifies system executable filetype association
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies registry class
      PID:3900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nse9C51.tmp\xmhk.dll
    MD5

    86a44efd3d936edd6c8578afd975f48b

    SHA1

    58ceaba0834bebb08072321a092b48e543a3a1e5

    SHA256

    bb4b14ee495c8de5fd7f7e04c4dd24a4e0a89610fd537aa2e4a72af470d2ab32

    SHA512

    e255686216d8e4ac9e3c790fd1e68fcdb195b616f58078939a4169a2570ada039e1983fe314b8055eb745ac480b7dbf5c1ee400027e0c908207e20212a5ce88c

  • memory/3900-116-0x0000000000000000-mapping.dmp
  • memory/3900-117-0x00000000001D0000-0x00000000001EB000-memory.dmp
    Filesize

    108KB