Analysis

  • max time kernel
    162s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    06-02-2022 07:34

General

  • Target

    f62fef6f3a75f53fe3ce65440f750765635b2e9398a1e486e375c2da2a78d3c5.exe

  • Size

    1.5MB

  • MD5

    997d9a0c210f31ec90f157e77dc9c488

  • SHA1

    c10e62bf47b425970075a5c6d644db23cd93e08b

  • SHA256

    f62fef6f3a75f53fe3ce65440f750765635b2e9398a1e486e375c2da2a78d3c5

  • SHA512

    1936aeb4fc7919e9b070be3547c4c9ebbe8bd4390628abd8700bfa196e4dcfb040a3bb394c350827132f4f5d3ee60cedcde7f0754753a0a6c42fb27df3689cef

Malware Config

Signatures

  • Detect Neshta Payload 21 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 47 IoCs
  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f62fef6f3a75f53fe3ce65440f750765635b2e9398a1e486e375c2da2a78d3c5.exe
    "C:\Users\Admin\AppData\Local\Temp\f62fef6f3a75f53fe3ce65440f750765635b2e9398a1e486e375c2da2a78d3c5.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Users\Admin\AppData\Local\Temp\3582-490\f62fef6f3a75f53fe3ce65440f750765635b2e9398a1e486e375c2da2a78d3c5.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\f62fef6f3a75f53fe3ce65440f750765635b2e9398a1e486e375c2da2a78d3c5.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Checks whether UAC is enabled
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1440
      • C:\Windows\svchost.com
        "C:\Windows\svchost.com" "C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE"
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3264
        • C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE
          C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE
          4⤵
            PID:3676
    • C:\Windows\system32\MusNotifyIcon.exe
      %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
      1⤵
      • Checks processor information in registry
      PID:2136
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k NetworkService -p
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:2980

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE
      MD5

      22913149a9d766c415c21e613e4e1d1b

      SHA1

      36b33b1ab48615ebe7bd25472d50ba3de56a21c6

      SHA256

      495ac0a638059cb60b2eebf3ac5e8fd17d5fbc7424195308f19e2ffeac3e0ced

      SHA512

      d9e5396bb24e3ad7ba31b45e8e1bfeb74c32895ab3af6544715c5db04da0442fafd82b06c49a920d964cf0a8fac7a58ccef4a173f1a5879c6733748edc180b14

    • C:\PROGRA~2\MICROS~1\EDGEUP~1\13153~1.55\MI391D~1.EXE
      MD5

      a1ca7be41ff6a68ecebe5305c237cf08

      SHA1

      f3ad861fe2d05bd457e4cec026eeb0e3c22c3c92

      SHA256

      77528d56d5ae8d86144d324a32b3ccf49ab9ba346fc79488682db9030a15cbad

      SHA512

      6d13b75c20810131397b750c99107ef45a5ed47bd4ac404d0a3b907b224f79ed0165e7c33fcdbdc32002f3eabb447eff2f102162bf4246d19fd9176782436be0

    • C:\PROGRA~2\MICROS~1\EDGEUP~1\13153~1.55\MICROS~3.EXE
      MD5

      a3e0cd180bc88ba713ecd1748e8c9b32

      SHA1

      99b6d80183792ebb66dcc5cb7f2cbde2c023cda3

      SHA256

      140309628663ba161d340735332071e417ba1ee532ecf00274b6259f28db8da3

      SHA512

      3217b8468c7f3cd5b1e811b77cded9d35c4e2b808f5de903fa7ef690d1417f7cd037e2f1657abf420dc0f20f4de7f77ae5b97573cc2ad00ccb2d863df7962a13

    • C:\PROGRA~3\Adobe\ARM\S\21312\ADOBEA~1.EXE
      MD5

      fc4c66072aeacb96b521decf86fbe3e5

      SHA1

      a0bd3a9cd98f3d18e01b4a65e159c4d62b9bdee6

      SHA256

      f8f6b41712d7b27996b488cc4e781f2510655ddde579668a143a3f58c0ca5a69

      SHA512

      81d2409e062b734051b7cac7d9f7c808af82d25a5b9daaaef828a0619dcccb2aa2ffb481e8e063102f72ddd31da5415751ce4e26720f88dc19983fb394b4c208

    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
      MD5

      4b2192864374f21ee6cb90b81c8b98a9

      SHA1

      131c29e7354fe6e32153d5dcf4d52c8f9c9d3091

      SHA256

      b29d2b87e91f82d764ee7ab5947dbf9f3e2b9dc473e571ef1b67622d35cb9b9a

      SHA512

      2361cfb375b597f6100dd0c84340c34041db4da2ca0bd72e1aba7782e73c43c9ef920c83e367eb16bf213ecb3518e97c6417a5f666a298deefd23f4260b52f2b

    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\acrord32.exe
      MD5

      12fd9fcb97cb1e45c020e7bac06b2c91

      SHA1

      90c6fce6c9c40666ecc0c3964308bb2401676703

      SHA256

      8cec6976f1f5c004627ac249302e29127f4c7d2cda4df8263bf75281edec7a25

      SHA512

      c805cc4ca9bbc3e4c961e2685712d44c85aed275cdfd2f6c3c20898c647efbd442fb0b8da0186d06fce88288e9fdec25830c48cb107b73da466098ab19353953

    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe
      MD5

      92dc0a5b61c98ac6ca3c9e09711e0a5d

      SHA1

      f809f50cfdfbc469561bced921d0bad343a0d7b4

      SHA256

      3e9da97a7106122245e77f13f3f3cc96c055d732ab841eb848d03ac25401c1bc

      SHA512

      d9eefb19f82e0786d9be0dbe5e339d25473fb3a09682f40c6d190d4c320cca5556abb72b5d97c6b0da4f8faefdc6d39ac9d0415fdf94ebcc90ecdf2e513c6a31

    • C:\Users\ALLUSE~1\Adobe\ARM\S\21312\ADOBEA~1.EXE
      MD5

      3ad3461ef1d630f38ed3749838bbedc3

      SHA1

      8d85b0b392ae75c5d0b004ee9cf5a7b80b1b79e6

      SHA256

      32be2bca2b848da78c02140a288f1bb771cb66757f90d20126b1bcfd5bb40e62

      SHA512

      0e95e5181eab14d5820a3a4952018ac9b290fa3b17add8a5e13d893052f1d2a90a2323c62843f6a9e9af00f27e00108b60e0bce2f848e0a4d8ce0cce153db1ba

    • C:\Users\ALLUSE~1\Adobe\Setup\{AC76B~1\setup.exe
      MD5

      05bdfd8a3128ab14d96818f43ebe9c0e

      SHA1

      495cbbd020391e05d11c52aa23bdae7b89532eb7

      SHA256

      7b945c7e6b8bfbb489f003ecd1d0dcd4803042003de4646d4206114361a0fbbb

      SHA512

      8d9b9fc407986bd53fe3b56c96b7371cc782b4bac705253bfb0a2b0b1e6883fdb022f1ac87b8bfd7005291991b6a3dfbaceab54f5d494e0af70f0435a0b8b0da

    • C:\Users\ALLUSE~1\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE
      MD5

      63dc05e27a0b43bf25f151751b481b8c

      SHA1

      b20321483dac62bce0aa0cef1d193d247747e189

      SHA256

      7d607fb69c69a72a5bf4305599279f46318312ce1082b6a34ac9100b8c7762ce

      SHA512

      374d705704d456cc5f9f79b7f465f6ec7c775dc43001c840e9d6efbbdef20926ed1fa97f8a9b1e73161e17f72520b96c05fa58ac86b3945208b405f9166e7ba3

    • C:\Users\ALLUSE~1\PACKAG~1\{33D1F~1\VCREDI~1.EXE
      MD5

      413ec51a9880e79324c712c0548674c1

      SHA1

      032d114c78c8df6d98186eeffd9cba24589e93bb

      SHA256

      80eee8d364db4b281b1643a1a52a5dd1c334b4f20c2519c5e0ba7aa9a49c2bd7

      SHA512

      4a1f74751793c32729ebe1e01b8b79ffe1a812e6972a21c17a688f52ea828c9d179151026597cae202b3cc46ecd0909d78b47cba5b3e2dc954832cd378657555

    • C:\Users\ALLUSE~1\PACKAG~1\{4D8DC~1\VC_RED~1.EXE
      MD5

      015caa1588f703bd73bc7cfe9386ffe4

      SHA1

      747bec0876a67c0242ff657d47d7c383254ea857

      SHA256

      e5c6463292e3013ef2eb211dad0dfa716671241affbd8bed5802a94f03950141

      SHA512

      1fb3b2fa422d635c71a8e7865714516b7de1c32e6286f8b975be71b17a9186fcac78852e9467b4751b4eab69cb6af30140772858a758596596d09d767d170aab

    • C:\Users\ALLUSE~1\PACKAG~1\{57A73~1\VC_RED~1.EXE
      MD5

      4cf3954a39b7e27f364cbb5e58a3a957

      SHA1

      4498a5dea907da2b85e30bf6a1ebddfbaba2eb18

      SHA256

      f24a6d80aff3ee9ee65a609376d1aa3fdb3a034847ebbc0e4e65ff20ab0893fb

      SHA512

      d7dd8c5ad15dda561ae309fbf18e5ad2e852e951e937ea062cc0cb035df74ecb5a9aa636c6813aef37271268cedb1b3c5d39a8b6519fd54f5346445a2a9ef57d

    • C:\Users\ALLUSE~1\PACKAG~1\{61087~1\VCREDI~1.EXE
      MD5

      9597098cfbc45fae685d9480d135ed13

      SHA1

      84401f03a7942a7e4fcd26e4414b227edd9b0f09

      SHA256

      45966655baaed42df92cd6d8094b4172c0e7a0320528b59cf63fca7c25d66e9c

      SHA512

      16afbdffe4b4b2e54b4cc96fe74e49ca367dea50752321ddf334756519812ba8ce147ef5459e421dc42e103bc3456aab1d185588cc86b35fa2315ac86b2a0164

    • C:\Users\ALLUSE~1\PACKAG~1\{CA675~1\VCREDI~1.EXE
      MD5

      a55d2c94c27ffe098171e6c1f296f56d

      SHA1

      d0c875b2721894404c9eaa07d444c0637a3cbc3b

      SHA256

      e81e4630b01d181fb3116e9e874eedfe1a43472bfa6d83cc24f55e78721ddf86

      SHA512

      13ee9041b21d4e00392aeaa5440c34301f945d9bbd4f07f831397040991eee79842a5618c1fd26ec75e7132b5da811bc9605b76b83a48355ede37a2a1c1cd6f0

    • C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE
      MD5

      07e194ce831b1846111eb6c8b176c86e

      SHA1

      b9c83ec3b0949cb661878fb1a8b43a073e15baf1

      SHA256

      d882f673ddf40a7ea6d89ce25e4ee55d94a5ef0b5403aa8d86656fd960d0e4ac

      SHA512

      55f9b6d3199aa60d836b6792ae55731236fb2a99c79ce8522e07e579c64eabb88fa413c02632deb87a361dd8490361aa1424beed2e01ba28be220f8c676a1bb5

    • C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\181510~1.001\FILESY~1.EXE
      MD5

      f3228c24035b3f54f78bb4fd11c36aeb

      SHA1

      2fe73d1f64575bc4abf1d47a9dddfe7e2d9c9cbb

      SHA256

      d2767c9c52835f19f6695c604081bf03cdd772a3731cd2e320d9db5e477d8af7

      SHA512

      b526c63338d9167060bc40ffa1d13a8c2e871f46680cd4a0efc2333d9f15bf21ae75af45f8932de857678c5bf785011a28862ce7879f4bffdb9753c8bc2c19b5

    • C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\OneDrive.exe
      MD5

      3a3a71a5df2d162555fcda9bc0993d74

      SHA1

      95c7400f85325eba9b0a92abd80ea64b76917a1a

      SHA256

      0a023355d1cc0a2348475d63aaf6aa0521d11e12a5c70102d7b3ebde092849e8

      SHA512

      9ad76ccce76ccfe8292bca8def5bc7255e7ea0ba6d92130c4350da49a3d7faef2d46b08aaef1955f3f4ea0a2e22451562b5e08783a79f794724584e409cf7837

    • C:\Users\Admin\AppData\Local\Temp\3582-490\f62fef6f3a75f53fe3ce65440f750765635b2e9398a1e486e375c2da2a78d3c5.exe
      MD5

      4eb5d80cdb10e827692c029635f171a7

      SHA1

      46029f69ba21eea4d701d55480fee9b991f9c052

      SHA256

      5ded8a12139ad93d44491706f2f0124f532d0b43a136179604ae905e2d1ccb01

      SHA512

      051944536afbae0619ebe272e1b6379eab66ef3eedfd4f87dce4c22a6269e69a50523c445bbda7b7d2bc8aaa112d5704609731af87d51f2a15763d564575a464

    • C:\Users\Admin\AppData\Local\Temp\3582-490\f62fef6f3a75f53fe3ce65440f750765635b2e9398a1e486e375c2da2a78d3c5.exe
      MD5

      4eb5d80cdb10e827692c029635f171a7

      SHA1

      46029f69ba21eea4d701d55480fee9b991f9c052

      SHA256

      5ded8a12139ad93d44491706f2f0124f532d0b43a136179604ae905e2d1ccb01

      SHA512

      051944536afbae0619ebe272e1b6379eab66ef3eedfd4f87dce4c22a6269e69a50523c445bbda7b7d2bc8aaa112d5704609731af87d51f2a15763d564575a464

    • C:\Windows\svchost.com
      MD5

      d1bb9002f9b41f1dd503b9b2d238e961

      SHA1

      12a1b2dca6a63dc395d327b7e4efe72c01869584

      SHA256

      b97b7dc1081d71bebacc15c20a2546e9029ec2c68294a78f29f0cce57ce49520

      SHA512

      40c33e27d80876b0326913f77dc70055f2e1cd89675eb7cec2e9a0c96182fdc16136009176d41be6ed959927bf4aac839586badfcb65622914a5ecce9398d860

    • C:\Windows\svchost.com
      MD5

      d1bb9002f9b41f1dd503b9b2d238e961

      SHA1

      12a1b2dca6a63dc395d327b7e4efe72c01869584

      SHA256

      b97b7dc1081d71bebacc15c20a2546e9029ec2c68294a78f29f0cce57ce49520

      SHA512

      40c33e27d80876b0326913f77dc70055f2e1cd89675eb7cec2e9a0c96182fdc16136009176d41be6ed959927bf4aac839586badfcb65622914a5ecce9398d860

    • C:\odt\OFFICE~1.EXE
      MD5

      02c3d242fe142b0eabec69211b34bc55

      SHA1

      ea0a4a6d6078b362f7b3a4ad1505ce49957dc16e

      SHA256

      2a1ed24be7e3859b46ec3ebc316789ead5f12055853f86a9656e04b4bb771842

      SHA512

      0efb08492eaaa2e923beddc21566e98fbbef3a102f9415ff310ec616f5c84fd2ba3a7025b05e01c0bdf37e5e2f64dfd845f9254a376144cc7d827e7577dbb099