Analysis

  • max time kernel
    179s
  • max time network
    197s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    29-01-2022 09:40

General

  • Target

    3a0ac18ca391cdf622b13a415c2f3666d0493d42e4db50a49e397e318c2eb27b.exe

  • Size

    756KB

  • MD5

    9f8e178a38f1dd82bffc1f355ea267de

  • SHA1

    2334987b49fa6a0c7c6e3bdc0dd1dcb9d3f1effc

  • SHA256

    3a0ac18ca391cdf622b13a415c2f3666d0493d42e4db50a49e397e318c2eb27b

  • SHA512

    f0abfe970b897cc4b594af264aa9f721e3b29d7e2b235fc06a2392a4a582f8afe03f257e48791e0b6c08aa2ade3f794d815657234f8d465efb97545b24ea5df1

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 53 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a0ac18ca391cdf622b13a415c2f3666d0493d42e4db50a49e397e318c2eb27b.exe
    "C:\Users\Admin\AppData\Local\Temp\3a0ac18ca391cdf622b13a415c2f3666d0493d42e4db50a49e397e318c2eb27b.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Users\Admin\AppData\Local\Temp\3582-490\3a0ac18ca391cdf622b13a415c2f3666d0493d42e4db50a49e397e318c2eb27b.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\3a0ac18ca391cdf622b13a415c2f3666d0493d42e4db50a49e397e318c2eb27b.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_wm.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_wm.exe /AnyOS
        3⤵
        • Executes dropped EXE
        PID:2348

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\3a0ac18ca391cdf622b13a415c2f3666d0493d42e4db50a49e397e318c2eb27b.exe
    MD5

    bfc13d7005e9db75b0f806c8f3b0d1d6

    SHA1

    8adb420b56288f80dde5a9fad6c4e0c860a37ae3

    SHA256

    a42909390664ebeeaa7e68fedf97b931bb248e5e6943997eaa67b2ed26d02319

    SHA512

    1691f66b3f953bbde16c043b48dd1ea79c507e7c8adfa4705f2934cd0cc83450103515441402041a1449a889660ae76a71362edf27b52c884e61f3f6852ea8a8

  • C:\Users\Admin\AppData\Local\Temp\3582-490\3a0ac18ca391cdf622b13a415c2f3666d0493d42e4db50a49e397e318c2eb27b.exe
    MD5

    bfc13d7005e9db75b0f806c8f3b0d1d6

    SHA1

    8adb420b56288f80dde5a9fad6c4e0c860a37ae3

    SHA256

    a42909390664ebeeaa7e68fedf97b931bb248e5e6943997eaa67b2ed26d02319

    SHA512

    1691f66b3f953bbde16c043b48dd1ea79c507e7c8adfa4705f2934cd0cc83450103515441402041a1449a889660ae76a71362edf27b52c884e61f3f6852ea8a8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_wm.exe
    MD5

    fb7432d3076400b2389b8da2374e7b02

    SHA1

    5418be5da6c9d432a03bf5618ea5dee0eb344fd6

    SHA256

    4656693bf4b68e00daf30842566811120121f14da314a42af0e0e766c4463ecf

    SHA512

    31127874db4345a98969c37a939cbcc19f18caff16200949ce98f4dc96dc70c83680b2cc4e97044364065e48524afdcbd72b51e33e0f0a6089fc64723e7733f3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_wm.exe
    MD5

    fb7432d3076400b2389b8da2374e7b02

    SHA1

    5418be5da6c9d432a03bf5618ea5dee0eb344fd6

    SHA256

    4656693bf4b68e00daf30842566811120121f14da314a42af0e0e766c4463ecf

    SHA512

    31127874db4345a98969c37a939cbcc19f18caff16200949ce98f4dc96dc70c83680b2cc4e97044364065e48524afdcbd72b51e33e0f0a6089fc64723e7733f3