Analysis

  • max time kernel
    151s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    01-02-2022 00:12

General

  • Target

    83d44871cd5ffc71d5d2f85fc3618efd308a118374c590276f33d2f2e49e33ac.exe

  • Size

    2.4MB

  • MD5

    e14aa5a2901df8455f6a3340c9e57b42

  • SHA1

    459c07f4567b0a25b95c38579edf86e472f28911

  • SHA256

    83d44871cd5ffc71d5d2f85fc3618efd308a118374c590276f33d2f2e49e33ac

  • SHA512

    1e1c76f0804c300bb99aeebccee9f6aaae3814eea35a5f8892fc578faf5bde79088bf00aaa22bc072a42fcf7b6cf138a68c33cc42a4e1dc53e3428454f33eb28

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 8 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83d44871cd5ffc71d5d2f85fc3618efd308a118374c590276f33d2f2e49e33ac.exe
    "C:\Users\Admin\AppData\Local\Temp\83d44871cd5ffc71d5d2f85fc3618efd308a118374c590276f33d2f2e49e33ac.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Users\Admin\AppData\Local\Temp\3582-490\83d44871cd5ffc71d5d2f85fc3618efd308a118374c590276f33d2f2e49e33ac.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\83d44871cd5ffc71d5d2f85fc3618efd308a118374c590276f33d2f2e49e33ac.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Windows\system32\taskkill.exe
        taskkill.exe /F /IM pritunl.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1308
      • C:\Windows\system32\taskkill.exe
        taskkill.exe /F /IM pritunl-service.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1408
      • C:\Windows\system32\taskkill.exe
        taskkill.exe /F /IM openvpn.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:828
      • C:\Windows\system32\taskkill.exe
        taskkill.exe /F /IM pritunl.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1600
      • C:\Windows\system32\taskkill.exe
        taskkill.exe /F /IM pritunl-service.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1076
      • C:\Windows\system32\taskkill.exe
        taskkill.exe /F /IM openvpn.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1804
      • C:\Windows\system32\taskkill.exe
        taskkill.exe /F /IM pritunl.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1480
      • C:\Windows\system32\taskkill.exe
        taskkill.exe /F /IM pritunl-service.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1368
      • C:\Windows\system32\sc.exe
        sc.exe config pritunl binPath=\"C:\Users\Admin\AppData\Local\Temp\3582-490\nssm.exe\"
        3⤵
          PID:1724

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\3582-490\83d44871cd5ffc71d5d2f85fc3618efd308a118374c590276f33d2f2e49e33ac.exe
      MD5

      b62592a4cf36f21f6046b8dd500e38a9

      SHA1

      9b0b7ffa905495937241c492c1e03556c00d6a5f

      SHA256

      8a620332f1260334147ca444b5acdff0b68ad6a41339d8d63d49daa7f1e4d81b

      SHA512

      3ec70fb8be0a89ad424648d65a0ab0e055ef1d987905dc8df9e0c1519806da41517e47b5c4adea44a8aedd80c100b63878c424c45de69d7d233b90ef8b2d4b54

    • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
      MD5

      9e2b9928c89a9d0da1d3e8f4bd96afa7

      SHA1

      ec66cda99f44b62470c6930e5afda061579cde35

      SHA256

      8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

      SHA512

      2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

    • \Users\Admin\AppData\Local\Temp\3582-490\83d44871cd5ffc71d5d2f85fc3618efd308a118374c590276f33d2f2e49e33ac.exe
      MD5

      b62592a4cf36f21f6046b8dd500e38a9

      SHA1

      9b0b7ffa905495937241c492c1e03556c00d6a5f

      SHA256

      8a620332f1260334147ca444b5acdff0b68ad6a41339d8d63d49daa7f1e4d81b

      SHA512

      3ec70fb8be0a89ad424648d65a0ab0e055ef1d987905dc8df9e0c1519806da41517e47b5c4adea44a8aedd80c100b63878c424c45de69d7d233b90ef8b2d4b54

    • \Users\Admin\AppData\Local\Temp\3582-490\83d44871cd5ffc71d5d2f85fc3618efd308a118374c590276f33d2f2e49e33ac.exe
      MD5

      b62592a4cf36f21f6046b8dd500e38a9

      SHA1

      9b0b7ffa905495937241c492c1e03556c00d6a5f

      SHA256

      8a620332f1260334147ca444b5acdff0b68ad6a41339d8d63d49daa7f1e4d81b

      SHA512

      3ec70fb8be0a89ad424648d65a0ab0e055ef1d987905dc8df9e0c1519806da41517e47b5c4adea44a8aedd80c100b63878c424c45de69d7d233b90ef8b2d4b54

    • memory/1692-54-0x00000000754B1000-0x00000000754B3000-memory.dmp
      Filesize

      8KB