Analysis

  • max time kernel
    121s
  • max time network
    134s
  • submitted
    01-01-1970 00:00

General

  • Target

    df330ab2a2e5aa4ac947315ee3f93992.exe

  • Size

    230KB

  • MD5

    df330ab2a2e5aa4ac947315ee3f93992

  • SHA1

    76b5d1eee342b47fe58e2136a067712cbd210351

  • SHA256

    99a897c5b8f53e1d04e51107c748a4f385b754a852ca6b605559f5b50820a64f

  • SHA512

    e65f573d68e8f198024028d553210095173d1551e6074b60d9543977116a0286f75641f4692049a49e6cd03729b001027136419d6cf0c71645e800d5522ed895

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 53 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df330ab2a2e5aa4ac947315ee3f93992.exe
    "C:\Users\Admin\AppData\Local\Temp\df330ab2a2e5aa4ac947315ee3f93992.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3408
    • C:\Users\Admin\AppData\Local\Temp\df330ab2a2e5aa4ac947315ee3f93992.exe
      "C:\Users\Admin\AppData\Local\Temp\df330ab2a2e5aa4ac947315ee3f93992.exe"
      2⤵
      • Modifies system executable filetype association
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies registry class
      PID:1132

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsgFA40.tmp\oxtrp.dll
    MD5

    c2c405109b51233def2b5bf15ffd2308

    SHA1

    14debd98b26edba7788aafcaa41f1d32e8fe1cbc

    SHA256

    7e16ed39ba05c887e6d1b470b6cc8de06fd67ed81fb2da85f645cfbc643ca154

    SHA512

    1c209d4110dc5295d5ba951cf5a22d62ab1bf65d9b5bf66f4c6a2e8e2f2cfd339f06cddf6b956d5f9a567ec8206d607753833ce94e14149d5bbc1b596c91b80b

  • memory/1132-119-0x0000000000000000-mapping.dmp
  • memory/1132-120-0x00000000001D0000-0x00000000001EB000-memory.dmp
    Filesize

    108KB