Analysis

  • max time kernel
    139s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    29-01-2022 09:40

General

  • Target

    3a0ac18ca391cdf622b13a415c2f3666d0493d42e4db50a49e397e318c2eb27b.exe

  • Size

    756KB

  • MD5

    9f8e178a38f1dd82bffc1f355ea267de

  • SHA1

    2334987b49fa6a0c7c6e3bdc0dd1dcb9d3f1effc

  • SHA256

    3a0ac18ca391cdf622b13a415c2f3666d0493d42e4db50a49e397e318c2eb27b

  • SHA512

    f0abfe970b897cc4b594af264aa9f721e3b29d7e2b235fc06a2392a4a582f8afe03f257e48791e0b6c08aa2ade3f794d815657234f8d465efb97545b24ea5df1

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a0ac18ca391cdf622b13a415c2f3666d0493d42e4db50a49e397e318c2eb27b.exe
    "C:\Users\Admin\AppData\Local\Temp\3a0ac18ca391cdf622b13a415c2f3666d0493d42e4db50a49e397e318c2eb27b.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Users\Admin\AppData\Local\Temp\3582-490\3a0ac18ca391cdf622b13a415c2f3666d0493d42e4db50a49e397e318c2eb27b.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\3a0ac18ca391cdf622b13a415c2f3666d0493d42e4db50a49e397e318c2eb27b.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_wm.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_wm.exe /AnyOS
        3⤵
        • Executes dropped EXE
        PID:1564

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\3a0ac18ca391cdf622b13a415c2f3666d0493d42e4db50a49e397e318c2eb27b.exe
    MD5

    bfc13d7005e9db75b0f806c8f3b0d1d6

    SHA1

    8adb420b56288f80dde5a9fad6c4e0c860a37ae3

    SHA256

    a42909390664ebeeaa7e68fedf97b931bb248e5e6943997eaa67b2ed26d02319

    SHA512

    1691f66b3f953bbde16c043b48dd1ea79c507e7c8adfa4705f2934cd0cc83450103515441402041a1449a889660ae76a71362edf27b52c884e61f3f6852ea8a8

  • C:\Users\Admin\AppData\Local\Temp\3582-490\3a0ac18ca391cdf622b13a415c2f3666d0493d42e4db50a49e397e318c2eb27b.exe
    MD5

    bfc13d7005e9db75b0f806c8f3b0d1d6

    SHA1

    8adb420b56288f80dde5a9fad6c4e0c860a37ae3

    SHA256

    a42909390664ebeeaa7e68fedf97b931bb248e5e6943997eaa67b2ed26d02319

    SHA512

    1691f66b3f953bbde16c043b48dd1ea79c507e7c8adfa4705f2934cd0cc83450103515441402041a1449a889660ae76a71362edf27b52c884e61f3f6852ea8a8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_wm.exe
    MD5

    fb7432d3076400b2389b8da2374e7b02

    SHA1

    5418be5da6c9d432a03bf5618ea5dee0eb344fd6

    SHA256

    4656693bf4b68e00daf30842566811120121f14da314a42af0e0e766c4463ecf

    SHA512

    31127874db4345a98969c37a939cbcc19f18caff16200949ce98f4dc96dc70c83680b2cc4e97044364065e48524afdcbd72b51e33e0f0a6089fc64723e7733f3

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\3a0ac18ca391cdf622b13a415c2f3666d0493d42e4db50a49e397e318c2eb27b.exe
    MD5

    bfc13d7005e9db75b0f806c8f3b0d1d6

    SHA1

    8adb420b56288f80dde5a9fad6c4e0c860a37ae3

    SHA256

    a42909390664ebeeaa7e68fedf97b931bb248e5e6943997eaa67b2ed26d02319

    SHA512

    1691f66b3f953bbde16c043b48dd1ea79c507e7c8adfa4705f2934cd0cc83450103515441402041a1449a889660ae76a71362edf27b52c884e61f3f6852ea8a8

  • \Users\Admin\AppData\Local\Temp\3582-490\3a0ac18ca391cdf622b13a415c2f3666d0493d42e4db50a49e397e318c2eb27b.exe
    MD5

    bfc13d7005e9db75b0f806c8f3b0d1d6

    SHA1

    8adb420b56288f80dde5a9fad6c4e0c860a37ae3

    SHA256

    a42909390664ebeeaa7e68fedf97b931bb248e5e6943997eaa67b2ed26d02319

    SHA512

    1691f66b3f953bbde16c043b48dd1ea79c507e7c8adfa4705f2934cd0cc83450103515441402041a1449a889660ae76a71362edf27b52c884e61f3f6852ea8a8

  • \Users\Admin\AppData\Local\Temp\3582-490\3a0ac18ca391cdf622b13a415c2f3666d0493d42e4db50a49e397e318c2eb27b.exe
    MD5

    bfc13d7005e9db75b0f806c8f3b0d1d6

    SHA1

    8adb420b56288f80dde5a9fad6c4e0c860a37ae3

    SHA256

    a42909390664ebeeaa7e68fedf97b931bb248e5e6943997eaa67b2ed26d02319

    SHA512

    1691f66b3f953bbde16c043b48dd1ea79c507e7c8adfa4705f2934cd0cc83450103515441402041a1449a889660ae76a71362edf27b52c884e61f3f6852ea8a8

  • \Users\Admin\AppData\Local\Temp\3582-490\3a0ac18ca391cdf622b13a415c2f3666d0493d42e4db50a49e397e318c2eb27b.exe
    MD5

    bfc13d7005e9db75b0f806c8f3b0d1d6

    SHA1

    8adb420b56288f80dde5a9fad6c4e0c860a37ae3

    SHA256

    a42909390664ebeeaa7e68fedf97b931bb248e5e6943997eaa67b2ed26d02319

    SHA512

    1691f66b3f953bbde16c043b48dd1ea79c507e7c8adfa4705f2934cd0cc83450103515441402041a1449a889660ae76a71362edf27b52c884e61f3f6852ea8a8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_wm.exe
    MD5

    fb7432d3076400b2389b8da2374e7b02

    SHA1

    5418be5da6c9d432a03bf5618ea5dee0eb344fd6

    SHA256

    4656693bf4b68e00daf30842566811120121f14da314a42af0e0e766c4463ecf

    SHA512

    31127874db4345a98969c37a939cbcc19f18caff16200949ce98f4dc96dc70c83680b2cc4e97044364065e48524afdcbd72b51e33e0f0a6089fc64723e7733f3

  • memory/1504-54-0x0000000076451000-0x0000000076453000-memory.dmp
    Filesize

    8KB