Analysis

  • max time kernel
    132s
  • max time network
    125s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    27-10-2021 09:46

General

  • Target

    ORDER OCT 28,2021.exe

  • Size

    502KB

  • MD5

    947b72694e25a2fefcfadd3aeec7c0a1

  • SHA1

    e1263f029a1d7a673218be6ba58f8f5c53b911fb

  • SHA256

    6449b0b19510e8c167d7bbc8a8471f81deadda1730c5889147589db21f30cd76

  • SHA512

    e4b2084a5259495bbcdebebaad6ca8d8e554374ce21b65ba52a4fec6d1ed5e626c36ef06447331b09fdb8a4651406aab91332068138d7e30c3b947221b7dcaab

Malware Config

Signatures

  • Detect Neshta Payload 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 53 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ORDER OCT 28,2021.exe
    "C:\Users\Admin\AppData\Local\Temp\ORDER OCT 28,2021.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3144
    • C:\Users\Admin\AppData\Local\Temp\ORDER OCT 28,2021.exe
      "C:\Users\Admin\AppData\Local\Temp\ORDER OCT 28,2021.exe"
      2⤵
      • Modifies system executable filetype association
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies registry class
      PID:368

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsvC536.tmp\brkwwr.dll
    MD5

    526d857a1bdb294a6be8ea0c40005bfa

    SHA1

    23f31727a792a7deb57d84c730ee6a21ab84ca55

    SHA256

    2fe94d81ec07813f84c6b5a310fa0c58175bc5a4f73b464d6e93c321474038de

    SHA512

    b3a0b21377d00edcc0b599998399a8ea4fa6a936680621e7e9b167d6373dc72069b1d3a174019cec024237797d7e8be4429365465ae34077b055e61759031ccd

  • memory/368-117-0x0000000000000000-mapping.dmp
  • memory/368-118-0x00000000001D0000-0x00000000001EB000-memory.dmp
    Filesize

    108KB