Analysis

  • max time kernel
    154s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    06-02-2022 08:19

General

  • Target

    d97d82d15bca1f31193596a1f32ae16563b50d14e7f73b18c909c9086bd37760.exe

  • Size

    1.6MB

  • MD5

    a7a8f0c74a61b2de071ed987a2903396

  • SHA1

    1c8e5219542de15213a2c11f3333a09dce3ef4c8

  • SHA256

    d97d82d15bca1f31193596a1f32ae16563b50d14e7f73b18c909c9086bd37760

  • SHA512

    f77188ff058e2e7513236eb081ea079c76aaf2df882829d362a1b40c6e5a6999cc75707587b81aba67906b5a38e194f8896b10c3d168c9d2230fe37f6e29279e

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d97d82d15bca1f31193596a1f32ae16563b50d14e7f73b18c909c9086bd37760.exe
    "C:\Users\Admin\AppData\Local\Temp\d97d82d15bca1f31193596a1f32ae16563b50d14e7f73b18c909c9086bd37760.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Users\Admin\AppData\Local\Temp\3582-490\d97d82d15bca1f31193596a1f32ae16563b50d14e7f73b18c909c9086bd37760.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\d97d82d15bca1f31193596a1f32ae16563b50d14e7f73b18c909c9086bd37760.exe"
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\Windows\svchost.com
        "C:\Windows\svchost.com" "C:\PROGRA~2\Adobe\READER~1.0\Reader\READER~1.EXE"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1640
        • C:\PROGRA~2\Adobe\READER~1.0\Reader\READER~1.EXE
          C:\PROGRA~2\Adobe\READER~1.0\Reader\READER~1.EXE
          4⤵
            PID:948

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE
      MD5

      754309b7b83050a50768236ee966224f

      SHA1

      10ed7efc2e594417ddeb00a42deb8fd9f804ed53

      SHA256

      acd32dd903e5464b0ecd153fb3f71da520d2e59a63d4c355d9c1874c919d04e6

      SHA512

      e5aaddf62c08c8fcc1ae3f29df220c5c730a2efa96dd18685ee19f5a9d66c4735bb4416c4828033661990604669ed345415ef2dc096ec75e1ab378dd804b1614

    • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe
      MD5

      ad98b20199243808cde0b5f0fd14b98f

      SHA1

      f95ce4c4c1bb507da8ed379503b7f597ee2016cd

      SHA256

      214f478e94658fa2bd7f0bc17022831baee707756798addb41d9c5bee050e70b

      SHA512

      ee1251c62530b3027e2cd5669533c633577ffbcf854e137a551148fc0de3ee6cc34253a0bdefdbd4843929843b0790f1de893aa6fbae1c969f057b9f8486afef

    • C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe
      MD5

      248a8df8e662dfca1db4f7160e1a972b

      SHA1

      dca22df5bca069f90d84d59988abe73a24704304

      SHA256

      6c7abeebd50487ca33315f5e507c9a5346e6e7a4b732103b35b8006ed58d7bb2

      SHA512

      0042e806d50c938fb1f08506327c87cd99e4f5f9520636b20695d94a696bb8b3f500f6d9507cb46fdba27c60cc0cb9e3c1e7c35dcfb7fcf4dadac3270e654f75

    • C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe
      MD5

      dc6114cf663ccdb1e55d37e6501c54cc

      SHA1

      8007df78476f6e723ddcb3ad6d515e558dcb97c9

      SHA256

      d566164c874ef66149b493e3220616cdb9090a8cebb4a1325c48c705aea5c348

      SHA512

      677464e6dab367f9158655533cade6e1ec4b39c4e64b05395e72e4099ca7f8fa82b8e49846932956da5fef760cc109a348e1c599d986166998e4d2623022a28c

    • C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE
      MD5

      2142b0fff4fbaaaa52bb901730f4b58c

      SHA1

      8c139ed4e04bb6413200716f0567bf76262e3051

      SHA256

      da7c7e2a69816a8e1c3cd016bdd461c5b55963ef6f198287098b193893d37a54

      SHA512

      f9055d72c535836ec3f06278a7891572665e943ca5af52f84ee368504e82a1f2ce330d455b8420a61e8576b9c8daa08063905df50c76248c58d8c9c97a03c7a0

    • C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE
      MD5

      46990c189f267e44f1927f68380102a7

      SHA1

      01eb9127bcda65186295003420683f3b4385659c

      SHA256

      323942be693446177d1e1f3686ccf142c31f812501a4b96aba2465c5291280cf

      SHA512

      3d1b342922f6fbb55aab224c705202d8607108ed459eb3dfecd7deece986f8818961c31930858f9576afeb9f7114cb64ad68d50768a9a61103be44d668d53296

    • C:\Users\ALLUSE~1\PACKAG~1\{CA675~1\VCREDI~1.EXE
      MD5

      bbbc52b266a2df2d33cd62e05b06a303

      SHA1

      c70eaf76efdd8dc88268edbe4dd452018929e9d8

      SHA256

      966d26221d5db2da9e1ce829c69a7638b90121035b60909d98c303f0e5eea18f

      SHA512

      16029d960ad82b506e439b195da75912dc7f86cdf9607041f68f07deadb257666e04a509a1f0b4fbf79f2769099f1498980b47f3e39985f666febca977cf9f06

    • C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE
      MD5

      c44a48628a935d356244c0d7e2c16459

      SHA1

      44c0e2c8c2201a28ba2904c25d8ea08a47c2f356

      SHA256

      4a153402d870ebef1105722218652c608435bbe63d497c2a04a75fe185459b40

      SHA512

      19bdf91d740931dfaa41978b4af99437d16bba0d7e1473da01c336621d60d01370a624316dd64eae7654e564e61f32c4cd9521eabf63340d7f1307c0c522e3e3

    • C:\Users\ALLUSE~1\PACKAG~1\{F4220~1\VC_RED~1.EXE
      MD5

      616dbca1326a77bacec24efa8e702f0a

      SHA1

      8cbe2a098f50b90ba514282b96110e3467c0b464

      SHA256

      c295b64cbe74f234b6f9bae533cc7acf8df2e2b9d4d2b0cc207a87d298fa8d60

      SHA512

      be41e1e59fc7ec54b9e5f9d32c541b61cc438cebd7ae145333563fa4a12ed44a0aed5d9ab327dc0feca9d883da901e5b0893732c7ad79523d6aefbebb2c51012

    • C:\Users\Admin\AppData\Local\Temp\3582-490\d97d82d15bca1f31193596a1f32ae16563b50d14e7f73b18c909c9086bd37760.exe
      MD5

      be185db3d2d448396fcce062b1048dbe

      SHA1

      072a8872cf5240a7f96e899dce0c215a6df67dc6

      SHA256

      51f3d2110604755ad75b646a46f79b759389e4dba17498d83de9bbf4d3100b1b

      SHA512

      a07ba5873cb9e57885f81ab683d06a13caef06572dfcc3310d4f9daefc94ee36f0116d31f784ce043008e4bcbcb9075a809a6c9e152447782eb1bf3d8d6a159f

    • C:\Windows\svchost.com
      MD5

      371c1e8a04fc1255cd38141e8d1c4e9d

      SHA1

      a08212115f726e91f5f82ecb0711fe68d392f1c7

      SHA256

      3109e6a23edb277172fab39ade7be67a2a1ffef6ae37a31e69cc4c5fc2ca62e3

      SHA512

      f969b3ab18d1bb4ac04e8136cdf89945335907fa6426c5190ea21d79817448592828652d5d32181c060f6562cae85688313a49e20f50f6e1120aa8a72da48966

    • C:\Windows\svchost.com
      MD5

      371c1e8a04fc1255cd38141e8d1c4e9d

      SHA1

      a08212115f726e91f5f82ecb0711fe68d392f1c7

      SHA256

      3109e6a23edb277172fab39ade7be67a2a1ffef6ae37a31e69cc4c5fc2ca62e3

      SHA512

      f969b3ab18d1bb4ac04e8136cdf89945335907fa6426c5190ea21d79817448592828652d5d32181c060f6562cae85688313a49e20f50f6e1120aa8a72da48966

    • \PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE
      MD5

      2142b0fff4fbaaaa52bb901730f4b58c

      SHA1

      8c139ed4e04bb6413200716f0567bf76262e3051

      SHA256

      da7c7e2a69816a8e1c3cd016bdd461c5b55963ef6f198287098b193893d37a54

      SHA512

      f9055d72c535836ec3f06278a7891572665e943ca5af52f84ee368504e82a1f2ce330d455b8420a61e8576b9c8daa08063905df50c76248c58d8c9c97a03c7a0

    • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
      MD5

      9e2b9928c89a9d0da1d3e8f4bd96afa7

      SHA1

      ec66cda99f44b62470c6930e5afda061579cde35

      SHA256

      8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

      SHA512

      2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

    • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
      MD5

      9e2b9928c89a9d0da1d3e8f4bd96afa7

      SHA1

      ec66cda99f44b62470c6930e5afda061579cde35

      SHA256

      8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

      SHA512

      2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

    • \Users\Admin\AppData\Local\Temp\3582-490\d97d82d15bca1f31193596a1f32ae16563b50d14e7f73b18c909c9086bd37760.exe
      MD5

      be185db3d2d448396fcce062b1048dbe

      SHA1

      072a8872cf5240a7f96e899dce0c215a6df67dc6

      SHA256

      51f3d2110604755ad75b646a46f79b759389e4dba17498d83de9bbf4d3100b1b

      SHA512

      a07ba5873cb9e57885f81ab683d06a13caef06572dfcc3310d4f9daefc94ee36f0116d31f784ce043008e4bcbcb9075a809a6c9e152447782eb1bf3d8d6a159f

    • memory/1080-55-0x0000000076371000-0x0000000076373000-memory.dmp
      Filesize

      8KB