Analysis

  • max time kernel
    156s
  • max time network
    165s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    29-01-2022 06:56

General

  • Target

    6b7a76c358149348b5f14944e48ee43844fdb021d076bd92c9ba735a4b23d8cf.exe

  • Size

    4.6MB

  • MD5

    cc5a9f2b7dcf45afef28bd8aeee9e308

  • SHA1

    51a4fa3f8a5b5c3f1a9f4cac2dab50d816ccee06

  • SHA256

    6b7a76c358149348b5f14944e48ee43844fdb021d076bd92c9ba735a4b23d8cf

  • SHA512

    b07f532c99289cee59b724fa8d0da999969aaa3f579b2510e59cad4fe0900846353db5209c9cc4b0187eb109a5ace38aa73c46294d0fefc42bcef160073af2f5

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 53 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b7a76c358149348b5f14944e48ee43844fdb021d076bd92c9ba735a4b23d8cf.exe
    "C:\Users\Admin\AppData\Local\Temp\6b7a76c358149348b5f14944e48ee43844fdb021d076bd92c9ba735a4b23d8cf.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3436
    • C:\Users\Admin\AppData\Local\Temp\3582-490\6b7a76c358149348b5f14944e48ee43844fdb021d076bd92c9ba735a4b23d8cf.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\6b7a76c358149348b5f14944e48ee43844fdb021d076bd92c9ba735a4b23d8cf.exe"
      2⤵
      • Executes dropped EXE
      PID:2712

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\6b7a76c358149348b5f14944e48ee43844fdb021d076bd92c9ba735a4b23d8cf.exe
    MD5

    504d55b0259f9958ec039f7db8c85e40

    SHA1

    3d542f861b031e7e81df4a8348025ec57be1103c

    SHA256

    4f711c4cdf161a3e4baac488f066ea265a01e66220f441ca476cd6c9e78951fa

    SHA512

    df309e1cb91f4730789c8c53d198a5191df0d9147bbf0919143cd384b8ec7b70c9baa4ec5f9901350f25774c0d975138db535275ab49a63ba103f47598ff55ae

  • C:\Users\Admin\AppData\Local\Temp\3582-490\6b7a76c358149348b5f14944e48ee43844fdb021d076bd92c9ba735a4b23d8cf.exe
    MD5

    504d55b0259f9958ec039f7db8c85e40

    SHA1

    3d542f861b031e7e81df4a8348025ec57be1103c

    SHA256

    4f711c4cdf161a3e4baac488f066ea265a01e66220f441ca476cd6c9e78951fa

    SHA512

    df309e1cb91f4730789c8c53d198a5191df0d9147bbf0919143cd384b8ec7b70c9baa4ec5f9901350f25774c0d975138db535275ab49a63ba103f47598ff55ae