Analysis

  • max time kernel
    152s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    29-01-2022 06:24

General

  • Target

    7677f02eba76f2cf42d55ef859b22976d79db2de3c67f613b8054b13f43fb08d.exe

  • Size

    2.4MB

  • MD5

    ae47016cc9ce531df98e6e9da5eeb076

  • SHA1

    ea0ed319bb94742b01a26cefb29f7fc1c8a811a4

  • SHA256

    7677f02eba76f2cf42d55ef859b22976d79db2de3c67f613b8054b13f43fb08d

  • SHA512

    e694595ff92e8b8a93a3b432419b2e73e03f15ad3af1959dda7169f1884a0c025d1c422eac6548a137dbe1e847c21683579a22ec3545abf864ad5f0a3efdbc26

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 6 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • UAC bypass 3 TTPs
  • Windows security bypass 2 TTPs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 14 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\7677f02eba76f2cf42d55ef859b22976d79db2de3c67f613b8054b13f43fb08d.exe
        "C:\Users\Admin\AppData\Local\Temp\7677f02eba76f2cf42d55ef859b22976d79db2de3c67f613b8054b13f43fb08d.exe"
        2⤵
        • Modifies firewall policy service
        • Modifies system executable filetype association
        • Loads dropped DLL
        • Windows security modification
        • Checks whether UAC is enabled
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:1296
        • C:\Users\Admin\AppData\Local\Temp\3582-490\7677f02eba76f2cf42d55ef859b22976d79db2de3c67f613b8054b13f43fb08d.exe
          "C:\Users\Admin\AppData\Local\Temp\3582-490\7677f02eba76f2cf42d55ef859b22976d79db2de3c67f613b8054b13f43fb08d.exe"
          3⤵
          • Modifies firewall policy service
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Checks whether UAC is enabled
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2036
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1180
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1096

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\3582-490\7677f02eba76f2cf42d55ef859b22976d79db2de3c67f613b8054b13f43fb08d.exe
          MD5

          7cd7b267d136ec6dcc9d7152f5c2eada

          SHA1

          0bb1cf210a03b93bb54bbfce35b652dcb2626264

          SHA256

          3f015bc2f53bb9e381ee9473fb9984fbf23b583f5b241e9582da70cff97eb6db

          SHA512

          10f15b466673b062f529adf61fa94ef1519589c6367b88a9d194adf707712b228d5136441facfac9bacc833f9884e623bf23ce9689c8ac08531b0a3a4d3cb640

        • C:\Users\Admin\AppData\Local\Temp\3582-490\7677f02eba76f2cf42d55ef859b22976d79db2de3c67f613b8054b13f43fb08d.exe
          MD5

          7cd7b267d136ec6dcc9d7152f5c2eada

          SHA1

          0bb1cf210a03b93bb54bbfce35b652dcb2626264

          SHA256

          3f015bc2f53bb9e381ee9473fb9984fbf23b583f5b241e9582da70cff97eb6db

          SHA512

          10f15b466673b062f529adf61fa94ef1519589c6367b88a9d194adf707712b228d5136441facfac9bacc833f9884e623bf23ce9689c8ac08531b0a3a4d3cb640

        • C:\Windows\SYSTEM.INI
          MD5

          a395e2ad9f7cc4af857260c179cd1d71

          SHA1

          ff0c9900d0a4ec4401bedbca9b5974e5d21d1462

          SHA256

          73e1524e7a78925076acd2b6c82dc385c3d982a76f1f9fbe64ee9be93181a7e6

          SHA512

          4e814220a9ec82cfb905a8581dbd0072389aec2656ad5f9eb570fc9b3f73b8539361eecc8b20a85af939b5f1f2fb06f5d1ca2fca709836c6d58b2b05e385907d

        • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
          MD5

          9e2b9928c89a9d0da1d3e8f4bd96afa7

          SHA1

          ec66cda99f44b62470c6930e5afda061579cde35

          SHA256

          8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

          SHA512

          2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

        • \Users\Admin\AppData\Local\Temp\3582-490\7677f02eba76f2cf42d55ef859b22976d79db2de3c67f613b8054b13f43fb08d.exe
          MD5

          7cd7b267d136ec6dcc9d7152f5c2eada

          SHA1

          0bb1cf210a03b93bb54bbfce35b652dcb2626264

          SHA256

          3f015bc2f53bb9e381ee9473fb9984fbf23b583f5b241e9582da70cff97eb6db

          SHA512

          10f15b466673b062f529adf61fa94ef1519589c6367b88a9d194adf707712b228d5136441facfac9bacc833f9884e623bf23ce9689c8ac08531b0a3a4d3cb640

        • \Users\Admin\AppData\Local\Temp\3582-490\7677f02eba76f2cf42d55ef859b22976d79db2de3c67f613b8054b13f43fb08d.exe
          MD5

          7cd7b267d136ec6dcc9d7152f5c2eada

          SHA1

          0bb1cf210a03b93bb54bbfce35b652dcb2626264

          SHA256

          3f015bc2f53bb9e381ee9473fb9984fbf23b583f5b241e9582da70cff97eb6db

          SHA512

          10f15b466673b062f529adf61fa94ef1519589c6367b88a9d194adf707712b228d5136441facfac9bacc833f9884e623bf23ce9689c8ac08531b0a3a4d3cb640

        • \Users\Admin\AppData\Local\Temp\3582-490\7677f02eba76f2cf42d55ef859b22976d79db2de3c67f613b8054b13f43fb08d.exe
          MD5

          7cd7b267d136ec6dcc9d7152f5c2eada

          SHA1

          0bb1cf210a03b93bb54bbfce35b652dcb2626264

          SHA256

          3f015bc2f53bb9e381ee9473fb9984fbf23b583f5b241e9582da70cff97eb6db

          SHA512

          10f15b466673b062f529adf61fa94ef1519589c6367b88a9d194adf707712b228d5136441facfac9bacc833f9884e623bf23ce9689c8ac08531b0a3a4d3cb640

        • \Users\Admin\AppData\Local\Temp\3582-490\7677f02eba76f2cf42d55ef859b22976d79db2de3c67f613b8054b13f43fb08d.exe
          MD5

          7cd7b267d136ec6dcc9d7152f5c2eada

          SHA1

          0bb1cf210a03b93bb54bbfce35b652dcb2626264

          SHA256

          3f015bc2f53bb9e381ee9473fb9984fbf23b583f5b241e9582da70cff97eb6db

          SHA512

          10f15b466673b062f529adf61fa94ef1519589c6367b88a9d194adf707712b228d5136441facfac9bacc833f9884e623bf23ce9689c8ac08531b0a3a4d3cb640

        • memory/1096-63-0x0000000001B40000-0x0000000001B42000-memory.dmp
          Filesize

          8KB

        • memory/1296-67-0x00000000021A0000-0x00000000021A1000-memory.dmp
          Filesize

          4KB

        • memory/1296-73-0x0000000002B10000-0x0000000003B9E000-memory.dmp
          Filesize

          16.6MB

        • memory/1296-54-0x0000000075CE1000-0x0000000075CE3000-memory.dmp
          Filesize

          8KB

        • memory/1296-96-0x0000000002730000-0x000000000298D000-memory.dmp
          Filesize

          2.4MB

        • memory/1296-97-0x00000000024F0000-0x000000000313A000-memory.dmp
          Filesize

          12.3MB

        • memory/1296-98-0x00000000003B0000-0x00000000003B2000-memory.dmp
          Filesize

          8KB

        • memory/1296-99-0x00000000021A0000-0x00000000021A1000-memory.dmp
          Filesize

          4KB

        • memory/2036-70-0x0000000001000000-0x000000000125D000-memory.dmp
          Filesize

          2.4MB

        • memory/2036-71-0x0000000002660000-0x00000000036EE000-memory.dmp
          Filesize

          16.6MB

        • memory/2036-62-0x0000000002660000-0x00000000036EE000-memory.dmp
          Filesize

          16.6MB