Analysis
-
max time kernel
168s -
max time network
158s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
24-01-2022 01:17
Static task
static1
Behavioral task
behavioral1
Sample
b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe
Resource
win10-en-20211208
General
-
Target
b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe
-
Size
516KB
-
MD5
ab7e9029d356c8b464d1d9809bbddba7
-
SHA1
7e3fe0cee4b0d0005556d030da77eabfed1ebb58
-
SHA256
b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc
-
SHA512
e9fdd9640f32befca60b23f60739043014cc184e7c09b906258f694d3febcb7168f835acf594853df57cc42d1f7832949bedd7614cc524f79871f6e4e4637943
Malware Config
Signatures
-
Detect Neshta Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1340-120-0x0000000000400000-0x00000000099DB000-memory.dmp family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi/Revil sample 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3582-490\b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe family_sodinokobi C:\Users\Admin\AppData\Local\Temp\3582-490\b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe family_sodinokobi -
Executes dropped EXE 1 IoCs
Processes:
b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exepid process 2496 b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 53 IoCs
Processes:
b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exedescription ioc process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~3\PACKAG~1\{F4220~1\VC_RED~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\WINDOW~2\WinMail.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\armsvc.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\WINDOW~4\ACCESS~1\wordpad.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe -
Drops file in Windows directory 1 IoCs
Processes:
b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exedescription ioc process File opened for modification C:\Windows\svchost.com b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3140 1340 WerFault.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe 2888 1340 WerFault.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe 1056 1340 WerFault.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe 4076 1340 WerFault.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe 1852 1340 WerFault.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe 3116 1340 WerFault.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe 2404 1340 WerFault.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe 3112 2496 WerFault.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe 3700 1340 WerFault.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe 3948 1340 WerFault.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe -
Modifies registry class 1 IoCs
Processes:
b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid process 3140 WerFault.exe 3140 WerFault.exe 3140 WerFault.exe 3140 WerFault.exe 3140 WerFault.exe 3140 WerFault.exe 3140 WerFault.exe 3140 WerFault.exe 3140 WerFault.exe 3140 WerFault.exe 3140 WerFault.exe 3140 WerFault.exe 2888 WerFault.exe 2888 WerFault.exe 2888 WerFault.exe 2888 WerFault.exe 2888 WerFault.exe 2888 WerFault.exe 2888 WerFault.exe 2888 WerFault.exe 2888 WerFault.exe 2888 WerFault.exe 2888 WerFault.exe 2888 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 3116 WerFault.exe 3116 WerFault.exe 3116 WerFault.exe 3116 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process Token: SeRestorePrivilege 3140 WerFault.exe Token: SeBackupPrivilege 3140 WerFault.exe Token: SeDebugPrivilege 3140 WerFault.exe Token: SeDebugPrivilege 2888 WerFault.exe Token: SeDebugPrivilege 1056 WerFault.exe Token: SeDebugPrivilege 4076 WerFault.exe Token: SeDebugPrivilege 1852 WerFault.exe Token: SeDebugPrivilege 3116 WerFault.exe Token: SeDebugPrivilege 2404 WerFault.exe Token: SeDebugPrivilege 3112 WerFault.exe Token: SeDebugPrivilege 3700 WerFault.exe Token: SeDebugPrivilege 3948 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exedescription pid process target process PID 1340 wrote to memory of 2496 1340 b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe PID 1340 wrote to memory of 2496 1340 b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe PID 1340 wrote to memory of 2496 1340 b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe"C:\Users\Admin\AppData\Local\Temp\b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 8602⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 8282⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 9002⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 9482⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 9882⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 9522⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 9602⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\3582-490\b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe"2⤵
- Executes dropped EXE
PID:2496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 2323⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 10562⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 9642⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3582-490\b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe
MD5f2d75554a229eed6505563fed0b72ebb
SHA1e5c7cec12ac3431a8255b16caa85840a6d9809c7
SHA256b4600ade2f01a466f787576320b71c14d3e311b553f3f0e1ec05c9efa4eec233
SHA5126181a2f855a815247baab25b077cd348d651d056f13392c9e97700119696fe4d678d740e60811d8e44b19007d06360b26063f8b12b47b8391ab7a791d793cf13
-
C:\Users\Admin\AppData\Local\Temp\3582-490\b0f991cf5289dad243910275738d27f88c261d5d8372ab7326572b48814565bc.exe
MD5f2d75554a229eed6505563fed0b72ebb
SHA1e5c7cec12ac3431a8255b16caa85840a6d9809c7
SHA256b4600ade2f01a466f787576320b71c14d3e311b553f3f0e1ec05c9efa4eec233
SHA5126181a2f855a815247baab25b077cd348d651d056f13392c9e97700119696fe4d678d740e60811d8e44b19007d06360b26063f8b12b47b8391ab7a791d793cf13