Analysis

  • max time kernel
    153s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    06-02-2022 07:22

General

  • Target

    fe9c6095f62c227b09feda435ea0710380e25037fcbc26278cf36ec661c13740.exe

  • Size

    1.5MB

  • MD5

    9057756e36aeb18b10ef0947cb4a26ea

  • SHA1

    53ce6f7a14c320e5205bbf5a373337d78188bd2a

  • SHA256

    fe9c6095f62c227b09feda435ea0710380e25037fcbc26278cf36ec661c13740

  • SHA512

    f4f2cf9bf05424ab69feb1632eeb062806627a28913db94fd720f845d25008eac49bd4c4ea8eb83dcead5c2f4d4d5793474796fe35e3c5af5bbe0df1bed50240

Malware Config

Signatures

  • Detect Neshta Payload 13 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe9c6095f62c227b09feda435ea0710380e25037fcbc26278cf36ec661c13740.exe
    "C:\Users\Admin\AppData\Local\Temp\fe9c6095f62c227b09feda435ea0710380e25037fcbc26278cf36ec661c13740.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Users\Admin\AppData\Local\Temp\3582-490\fe9c6095f62c227b09feda435ea0710380e25037fcbc26278cf36ec661c13740.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\fe9c6095f62c227b09feda435ea0710380e25037fcbc26278cf36ec661c13740.exe"
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1264
      • C:\Windows\svchost.com
        "C:\Windows\svchost.com" "C:\PROGRA~2\Adobe\READER~1.0\Reader\READER~1.EXE"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1608
        • C:\PROGRA~2\Adobe\READER~1.0\Reader\READER~1.EXE
          C:\PROGRA~2\Adobe\READER~1.0\Reader\READER~1.EXE
          4⤵
            PID:960

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE
      MD5

      9306f2a522a57b846007a08f1ca66f03

      SHA1

      df4ba0ea9393304bce52879d4b9344a0f1277d20

      SHA256

      0b3954c2f43c8c55e3d23bc7c97acf57022b9ced4360fe7d8660e77a1fbb3372

      SHA512

      dfc6336d1115a7337905341d0579700df3f821d4be340faa603a30668152e061818628e7544a2f0b4767c40baffe37554d040644dfd0d1da8ef3de0e25dd171b

    • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe
      MD5

      e0f2257e0ad4b04429c932673ead4884

      SHA1

      352fcc1fe1019cd069ab52b409b31bbd0a08ea9a

      SHA256

      6e11a49479c1d2b35f15901b0700e307712338f343e1c03fcfe715946fab5969

      SHA512

      d77e790e63b1b2307df2ef0bb774bcbfa5cdc716764050dfa055a23449cffa5c6f61759b0819712f3e3be06037cbc3469082ba2b02af990017f28658f0103763

    • C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe
      MD5

      05137767de39f2bb28b365b2238f32e1

      SHA1

      5e62f303be2d32f16da8ebe555eb80491f7c0efb

      SHA256

      ca65573ff40bd61e73cf21f24a122de99e5face2ce75a2e0753f93e10cf6495b

      SHA512

      9f29611adeac506c6db62a47d82fe5891688cfffc7217ad1dd076fc88e54ea4b9291974b168922245f6c8e302f4e03a273bf0ac9942ac4d1cf6c5a6099b9f0be

    • C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe
      MD5

      98359abd5f26fc75169bafd6edcf00cd

      SHA1

      c0bdcc5b5f48c72275f84d6166a42519cc5f2028

      SHA256

      958bf8d76d4de0bbba6aadea0c4aff0ec7be9cc69ab9fa61cd29dcecbf3528fa

      SHA512

      573e374866e93b14cec6b5192ba45529a89c140d023ec0e471bad563fd6893cbef2a2fb0b106732f40fd4a2629869c8074b991539b05ade3d38f32aa26751fe2

    • C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe
      MD5

      9b9869e0df0acac9babac95a1f8d5c7d

      SHA1

      9ea411c302c9a2c565c941631128a7b23992530f

      SHA256

      963167bf45b0acb36b0d968e70e486f0956ace3fe2a48e6e26e9482df829c9d3

      SHA512

      cae5f2e81f7811f6c3307cfbfd2d8e8350bb048333ff3484a090cde2ac13b2709fc0f95f0a851b00d16d27601cb4e457028ecd689b66ed3ac8a716454403c0a2

    • C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE
      MD5

      48c9aff5be5cf16eefa2cd30aa4ce672

      SHA1

      797a62900ad1e0c5c9e371f396a82bd80e57af99

      SHA256

      3000f367c652139ae07ea09f9c8284faa825225024d63cf1bc25020dbeed4fa3

      SHA512

      d64383dd1f08bd01a664e23d912c0c962df0a16bdc13afa4de31724decec238a30bc31d103a8b5707ced1ec274a388d41a5d768432ecf8fa3c953cec03de7b56

    • C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE
      MD5

      9e9218b109d79d4f943f379cfcf8133b

      SHA1

      8cf77c60ad2028b6eef401469ff6bfcdaf9f9e46

      SHA256

      21561cd643413d20759942f4e4fbb963cbeb65aa1df97169a99a404e6c91e1a7

      SHA512

      ccc375c8ef738678728131fa01f452eeba05917731bcdc5f8562f65e58066923e0917b34ab0f6ac3d64d91cdf55c891e768004a23f51ec3d02812daf9463c84e

    • C:\Users\ALLUSE~1\PACKAG~1\{CA675~1\VCREDI~1.EXE
      MD5

      8dbf1ff260efc8b7da8d1770ac7d22c0

      SHA1

      63caecab96c4b5361321f09800e6c63efdcc190f

      SHA256

      e9b49e4ca8a65ead25a4873d1b36b256fddc31015f4a277a7f1625aec3804f88

      SHA512

      a7b85cc892d3b7990c6489f1b7e653c6ca8a45d0c819ad63785b704cff6938a61703fb07097b22a5bfd3f6369c6ed5cc1131da723d61282b53687aab79c61b48

    • C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE
      MD5

      b38d3dbb9687fc614d22e72e016bf5f0

      SHA1

      79a7f59d311b3ba8238cbc99ae921bcd9005088f

      SHA256

      ef0a018061cee0ec72240d670a061c76775a80187ecd4b005e4dcf4aa0aeec14

      SHA512

      63b9dd78401577343da4942be2b5124495f1be9a685adb40147a41813782b299484c606ad69be624b509429d9bf912fdee4f7d7e2c2bab5d8ddb33aaa89e7c4e

    • C:\Users\ALLUSE~1\PACKAG~1\{F4220~1\VC_RED~1.EXE
      MD5

      da3c04a3711676a02796b0889d1c9b7d

      SHA1

      57767fe6cfcb577355a67829b0e7b1e511013d89

      SHA256

      f3747e60d2d295072426554d2c9eafc9ee90207236f29fa8125b9560b64befa6

      SHA512

      949cee8054499c177708d52a932908ae8bba72170167f6b5b2344903ef5811f7b6f2253d9bcc9ea480ead4f73bf7d09cc4dc66837d931718d17c6b3a0273aecc

    • C:\Users\Admin\AppData\Local\Temp\3582-490\fe9c6095f62c227b09feda435ea0710380e25037fcbc26278cf36ec661c13740.exe
      MD5

      4eb5d80cdb10e827692c029635f171a7

      SHA1

      46029f69ba21eea4d701d55480fee9b991f9c052

      SHA256

      5ded8a12139ad93d44491706f2f0124f532d0b43a136179604ae905e2d1ccb01

      SHA512

      051944536afbae0619ebe272e1b6379eab66ef3eedfd4f87dce4c22a6269e69a50523c445bbda7b7d2bc8aaa112d5704609731af87d51f2a15763d564575a464

    • C:\Windows\svchost.com
      MD5

      d1499f582a63bc6e26debc4d6c439773

      SHA1

      efff51429486363749484600cab910c0768e85a9

      SHA256

      8005691f4eff8d78f866243532f583826a4c2bdd009eab278c60ef64fc260209

      SHA512

      eadfee975290db3474ec669c83f98f974fe19d85873a4d5344a467ffaf2f689f538152dca598cb246a323a988a2ee9198543d8950bdba59c710c4f2efc412fca

    • C:\Windows\svchost.com
      MD5

      d1499f582a63bc6e26debc4d6c439773

      SHA1

      efff51429486363749484600cab910c0768e85a9

      SHA256

      8005691f4eff8d78f866243532f583826a4c2bdd009eab278c60ef64fc260209

      SHA512

      eadfee975290db3474ec669c83f98f974fe19d85873a4d5344a467ffaf2f689f538152dca598cb246a323a988a2ee9198543d8950bdba59c710c4f2efc412fca

    • \PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe
      MD5

      9b9869e0df0acac9babac95a1f8d5c7d

      SHA1

      9ea411c302c9a2c565c941631128a7b23992530f

      SHA256

      963167bf45b0acb36b0d968e70e486f0956ace3fe2a48e6e26e9482df829c9d3

      SHA512

      cae5f2e81f7811f6c3307cfbfd2d8e8350bb048333ff3484a090cde2ac13b2709fc0f95f0a851b00d16d27601cb4e457028ecd689b66ed3ac8a716454403c0a2

    • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
      MD5

      9e2b9928c89a9d0da1d3e8f4bd96afa7

      SHA1

      ec66cda99f44b62470c6930e5afda061579cde35

      SHA256

      8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

      SHA512

      2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

    • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
      MD5

      9e2b9928c89a9d0da1d3e8f4bd96afa7

      SHA1

      ec66cda99f44b62470c6930e5afda061579cde35

      SHA256

      8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

      SHA512

      2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

    • \Users\Admin\AppData\Local\Temp\3582-490\fe9c6095f62c227b09feda435ea0710380e25037fcbc26278cf36ec661c13740.exe
      MD5

      4eb5d80cdb10e827692c029635f171a7

      SHA1

      46029f69ba21eea4d701d55480fee9b991f9c052

      SHA256

      5ded8a12139ad93d44491706f2f0124f532d0b43a136179604ae905e2d1ccb01

      SHA512

      051944536afbae0619ebe272e1b6379eab66ef3eedfd4f87dce4c22a6269e69a50523c445bbda7b7d2bc8aaa112d5704609731af87d51f2a15763d564575a464

    • memory/1308-55-0x00000000769D1000-0x00000000769D3000-memory.dmp
      Filesize

      8KB