Analysis

  • max time kernel
    134s
  • max time network
    139s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    18-11-2021 03:27

General

  • Target

    a56201e88978eee0be785d68c9f510b25dc8d5e702af0b9d17dec5e507fc3626.exe

  • Size

    627KB

  • MD5

    f8906462bfd37551085272bb77ff8eac

  • SHA1

    faa366615778213d0969743eba215b957fbec235

  • SHA256

    a56201e88978eee0be785d68c9f510b25dc8d5e702af0b9d17dec5e507fc3626

  • SHA512

    79c58d7b7fbb71ed3afa23f32a9ca4a17bf7463ed28375333c2865ddf9d8bbf2f430879fcf7925dfcac71ec45c80e41bbf2d4dff4c1b09f14dba187b6b814038

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 53 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a56201e88978eee0be785d68c9f510b25dc8d5e702af0b9d17dec5e507fc3626.exe
    "C:\Users\Admin\AppData\Local\Temp\a56201e88978eee0be785d68c9f510b25dc8d5e702af0b9d17dec5e507fc3626.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Users\Admin\AppData\Local\Temp\a56201e88978eee0be785d68c9f510b25dc8d5e702af0b9d17dec5e507fc3626.exe
      "C:\Users\Admin\AppData\Local\Temp\a56201e88978eee0be785d68c9f510b25dc8d5e702af0b9d17dec5e507fc3626.exe"
      2⤵
        PID:3884
      • C:\Users\Admin\AppData\Local\Temp\a56201e88978eee0be785d68c9f510b25dc8d5e702af0b9d17dec5e507fc3626.exe
        "C:\Users\Admin\AppData\Local\Temp\a56201e88978eee0be785d68c9f510b25dc8d5e702af0b9d17dec5e507fc3626.exe"
        2⤵
        • Modifies system executable filetype association
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        PID:2236

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2236-125-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2236-126-0x0000000000408178-mapping.dmp
    • memory/2236-127-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2744-115-0x0000000000CA0000-0x0000000000CA1000-memory.dmp
      Filesize

      4KB

    • memory/2744-117-0x0000000005BA0000-0x0000000005BA1000-memory.dmp
      Filesize

      4KB

    • memory/2744-118-0x00000000055C0000-0x00000000055C1000-memory.dmp
      Filesize

      4KB

    • memory/2744-119-0x00000000056A0000-0x0000000005B9E000-memory.dmp
      Filesize

      5.0MB

    • memory/2744-120-0x0000000003120000-0x0000000003121000-memory.dmp
      Filesize

      4KB

    • memory/2744-121-0x0000000005B90000-0x0000000005B96000-memory.dmp
      Filesize

      24KB

    • memory/2744-122-0x0000000008F30000-0x0000000008F31000-memory.dmp
      Filesize

      4KB

    • memory/2744-123-0x0000000008EA0000-0x0000000008EA1000-memory.dmp
      Filesize

      4KB

    • memory/2744-124-0x0000000009040000-0x00000000090A6000-memory.dmp
      Filesize

      408KB