Analysis

  • max time kernel
    152s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    06-02-2022 08:30

General

  • Target

    d3de8650be06b7baef11e68977865d0aa4747d0cc6b8c0274185a5e79a06cea9.exe

  • Size

    1.5MB

  • MD5

    73092e6a2353b35b933645fa9ff4fb35

  • SHA1

    cfb11f292e46f5cc11d13d1021af52375bfda30e

  • SHA256

    d3de8650be06b7baef11e68977865d0aa4747d0cc6b8c0274185a5e79a06cea9

  • SHA512

    6b883b247ecfd902b97cdf39d74f0e290ceafe9380ad98a05f56ce0b62f4428ae225287c2a5358480847c81564d61e72a354e809544994146e1fc30e7ad525fd

Malware Config

Signatures

  • Detect Neshta Payload 18 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3de8650be06b7baef11e68977865d0aa4747d0cc6b8c0274185a5e79a06cea9.exe
    "C:\Users\Admin\AppData\Local\Temp\d3de8650be06b7baef11e68977865d0aa4747d0cc6b8c0274185a5e79a06cea9.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\3582-490\d3de8650be06b7baef11e68977865d0aa4747d0cc6b8c0274185a5e79a06cea9.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\d3de8650be06b7baef11e68977865d0aa4747d0cc6b8c0274185a5e79a06cea9.exe"
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:988
      • C:\Windows\svchost.com
        "C:\Windows\svchost.com" "C:\PROGRA~2\Adobe\READER~1.0\Reader\READER~1.EXE"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1520
        • C:\PROGRA~2\Adobe\READER~1.0\Reader\READER~1.EXE
          C:\PROGRA~2\Adobe\READER~1.0\Reader\READER~1.EXE
          4⤵
            PID:804

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE
      MD5

      800a1137f071b2496a7a5f1f01a0cdb9

      SHA1

      cace2af7d4787dfbe65a0a58e7e4e83f33996659

      SHA256

      1f8f5de0307742d954f03bd8305d26f47562c9d18562327cf2676654a0e51c86

      SHA512

      1e30431cf852d0523f10e0ed8248c86182be9c06497fcea573d222f52a101f0ca46c4f94db6c1f4017ae3df8932f2c00c6b24bde8c27ac6a9563c565f8fa2d34

    • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe
      MD5

      f7181ade22083ab6aa5f76e3f9cdb562

      SHA1

      a1068ddbfa248f6735dd161296296c56935dcef8

      SHA256

      8a8cee277ce355dce1e0da2482e3f0fd8e13346f332d7e5329dff2f1f600fd62

      SHA512

      ba4e5dc9438adaeb62439e5cbfb58dbe9f869f9b0fbe4186f55bc43f3d4ff1c04b0042d28162324aa3401f17f50a65649181efa455ed20cb02deaa87d02defb6

    • C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe
      MD5

      06784697ca07d42f773e8ef81acd87a0

      SHA1

      7230d04e1f54c993abb06d336573e7347bdce351

      SHA256

      170bb0a1a5433e7079b2b070ab34250a3d7366247664507cf6b3f48e319f706a

      SHA512

      64e11162a45883a542f8286415ee19817f0a5905003b753204bb3b40cddf3ffdfe2ee20684eb815f5d80cdc7f73242e9c474c1777d55aeae022154e2740f4f06

    • C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe
      MD5

      6e79dd718441b6e7fc54ecf9a04d398b

      SHA1

      9db4c9a4d1cbd8c473aef656cd5caa24e10a7ed5

      SHA256

      7dd653028202bc3d590020f8301d84d614faeb02acc2adc395138640b51489bf

      SHA512

      7ec1ebdcb1a73b8283a5dbc78924b3c0097a0ef4ab7570f187242853df5a5d2ee421e9fa1a2ceb99395aa5ca2f0ed0218a1c032eb391c0da23779803736b2d03

    • C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE
      MD5

      4a6be6130b402f1847ffa36cb4c51389

      SHA1

      4519bf4dc4a82c12d86ca7d2f01989c2ac971350

      SHA256

      c67453536be7ce46c4652c9fd91be38b56e9212f882f8edd41d9cc85088a8be6

      SHA512

      ba638ec755734cf19313d27efe3309ce2632378a673bcf81da51530903c506ff5d6aef71cb671cedd8316dbd6c2d4aca6ef502516950f50511753226109bcaf9

    • C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE
      MD5

      f1f93e1f7a2ae4ce4ad8c6bdb6c8c60b

      SHA1

      d00e160b5a96f589f9bb30da6b0b666daf46f408

      SHA256

      4e944ce5e42771ce2d7d628e1e3a345086a79abb30601b497b33d5cd306b9b1f

      SHA512

      e7a51359225f1d3137e2fb66a8957f4c7d3cefd578ef444456175ab45534dc9fa06ef138b91a6adb9803b483fadc11725a12f5a110261e868f0843e8152401be

    • C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE
      MD5

      c67dbc91fcf6a0b54476163934108e29

      SHA1

      441c24461442d9f6d2f18eece0beb4ec659d0966

      SHA256

      b0f6cf691d0b3869604e039e83386dd93a45e0ce8a0ce6c84737e15ed23718a3

      SHA512

      30d9fe6f4d90f86ef7b702fdee47d4ee5427dfa0ade652ecaf93e37d41eeb28d34c0ed49ed623c2bb94ce05e11cd8a3ecbec253fc4f7cf5602a396a08aed05c5

    • C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe
      MD5

      0fa1d404bda3f77601726f39a22e1eb2

      SHA1

      b60a5567a6481850cc9e6f7cf8d484669685793a

      SHA256

      2d5a31304858e603acee5df6ce087861f3a57b2763916d42893138d9011dbda3

      SHA512

      4d81cb6a1156a348f0da3510af79a371f29b816049d8db3362a3661ee4306eb7e30b34920c62da1d22da685e0b6cfaf135a550c88e4a50b5fbed1dd2f8130b19

    • C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe
      MD5

      b179661faf8d7b9ab1b936fa60f051e3

      SHA1

      b244c814155e478640e945439c1cefa15864a47d

      SHA256

      447cf1d59a462c04a4c37c3d6d173993b42493ec962f9cbe548d484c5ac11113

      SHA512

      3f90ed8ab94b236da6851c6a6763e8d7b49f45d8051f949c09d974a23aa9a7a1bc56521c66ed9776f0236754b1274fb3aa79a57755d10afccddd8067d3000949

    • C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE
      MD5

      f139034df8741b2dc2766957ef5ffad2

      SHA1

      b591474a34d03034bd77e00a1b436bf93cdf95e7

      SHA256

      6563b2cfc7bc1872e5656db8a5a5e87e271d91880336cf9d5cb475de19d1ec10

      SHA512

      000deb3990094f5547478bb8a394428c374b8656e362b32fe578a38e61d13556fc5be384376be8115699717bf5bbfd252866887954c768bc031257ca341fed97

    • C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE
      MD5

      188a868e137db91a26394c5533ef3b74

      SHA1

      cfd9406c90e9c7db8b7a28faf47f629a0924e110

      SHA256

      0b05f67530bea01a1de80ceb063c8466a390b354e50152e13ac58ba4030c3ad2

      SHA512

      202a2b71b3e133d338e147a7cd0bece8317c793288b4bdd076df125cf9c08582252306710f3936c5c441c8c512a38f1a4ad0f255055bef1e0f86d9a0dd8b7b99

    • C:\Users\ALLUSE~1\PACKAG~1\{CA675~1\VCREDI~1.EXE
      MD5

      944080c1de1c4a3e699b87a1f2f04110

      SHA1

      dc698d41a9b1ea06efaa46e5501640f3e071b8b0

      SHA256

      e3d0678bc5a15388085da82a6a07db1df00a6ee1c79b6de356d0cbd857d24244

      SHA512

      21ec0719003485a8983f5e72d12b64033472649358643e32e8bd7f2ab219f6ec35cb64042ccca13d5032672b31021cd2de555341bd8a653c2721b8a598e74da9

    • C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE
      MD5

      04928a5046b3435c7a2e0b7854856900

      SHA1

      7e384699cc4106efc543553f5ea5e4a627f6bfb4

      SHA256

      b61ef2bd9018f46c61acf98dbcdf0a69d1cf535773e32f44f334b2946907795f

      SHA512

      b24dad38d052ec9fc5a81255f788515c6a59f121d01d7f77a70fa6fc0295e612bb8de6562b9baf06c77b63acc9c80c4a98d11d80b525d3f0597e25eab6652884

    • C:\Users\ALLUSE~1\PACKAG~1\{F4220~1\VC_RED~1.EXE
      MD5

      a500df030bb46f69cf3209a013927b51

      SHA1

      dff8ed29e34902b6974eb0cc7030922dc426cb18

      SHA256

      23c79d6753d97b53a6e58eb8a0ab151d77c98e4cc097dfda8b77e12d8bda91d0

      SHA512

      05eb0070ad2d9a687eda27ce3a31387cc8b818ca6225003850a1dc7308db32ab21afa4f9d61679e0ad361495ceb7b359a76b42c6a6289eff87332b469c3c89d3

    • C:\Users\Admin\AppData\Local\Temp\3582-490\d3de8650be06b7baef11e68977865d0aa4747d0cc6b8c0274185a5e79a06cea9.exe
      MD5

      b8b96354dd88484208f17101f6704f7c

      SHA1

      68815c39f47a0b8f766d9191e7ac55d3199d1c96

      SHA256

      ad25d9f873a80f454ce2acbb75246463070e216c89b042ee87b9a6204dd146c0

      SHA512

      6ef740dea56bd0724e7f8a999ce46a2f2356aeb876bc47d127d96eb156d636c755a9f610fee7109ad4d044042c1e571bcfb88ca9402c6789edfde23073cdad32

    • C:\Windows\svchost.com
      MD5

      85d4f69a08d5b8915bb85b4b8f8677d5

      SHA1

      413d0397e73100811e8fe9dafaf64ac488d5f810

      SHA256

      0c59304ff54fc47adf3ce51740ea6eaa6acd67a228ead9886668e6617d39ac54

      SHA512

      0607fc92f9868e312135aaf3d7a1a31858e91a77186aa7c169644a94257313d9501267bc6839c767a7f1385e8168776458c638ad21daf8064c48932ec5a89ee6

    • C:\Windows\svchost.com
      MD5

      85d4f69a08d5b8915bb85b4b8f8677d5

      SHA1

      413d0397e73100811e8fe9dafaf64ac488d5f810

      SHA256

      0c59304ff54fc47adf3ce51740ea6eaa6acd67a228ead9886668e6617d39ac54

      SHA512

      0607fc92f9868e312135aaf3d7a1a31858e91a77186aa7c169644a94257313d9501267bc6839c767a7f1385e8168776458c638ad21daf8064c48932ec5a89ee6

    • \PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE
      MD5

      4a6be6130b402f1847ffa36cb4c51389

      SHA1

      4519bf4dc4a82c12d86ca7d2f01989c2ac971350

      SHA256

      c67453536be7ce46c4652c9fd91be38b56e9212f882f8edd41d9cc85088a8be6

      SHA512

      ba638ec755734cf19313d27efe3309ce2632378a673bcf81da51530903c506ff5d6aef71cb671cedd8316dbd6c2d4aca6ef502516950f50511753226109bcaf9

    • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
      MD5

      9e2b9928c89a9d0da1d3e8f4bd96afa7

      SHA1

      ec66cda99f44b62470c6930e5afda061579cde35

      SHA256

      8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

      SHA512

      2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

    • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
      MD5

      9e2b9928c89a9d0da1d3e8f4bd96afa7

      SHA1

      ec66cda99f44b62470c6930e5afda061579cde35

      SHA256

      8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

      SHA512

      2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

    • \PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE
      MD5

      f139034df8741b2dc2766957ef5ffad2

      SHA1

      b591474a34d03034bd77e00a1b436bf93cdf95e7

      SHA256

      6563b2cfc7bc1872e5656db8a5a5e87e271d91880336cf9d5cb475de19d1ec10

      SHA512

      000deb3990094f5547478bb8a394428c374b8656e362b32fe578a38e61d13556fc5be384376be8115699717bf5bbfd252866887954c768bc031257ca341fed97

    • \Users\Admin\AppData\Local\Temp\3582-490\d3de8650be06b7baef11e68977865d0aa4747d0cc6b8c0274185a5e79a06cea9.exe
      MD5

      b8b96354dd88484208f17101f6704f7c

      SHA1

      68815c39f47a0b8f766d9191e7ac55d3199d1c96

      SHA256

      ad25d9f873a80f454ce2acbb75246463070e216c89b042ee87b9a6204dd146c0

      SHA512

      6ef740dea56bd0724e7f8a999ce46a2f2356aeb876bc47d127d96eb156d636c755a9f610fee7109ad4d044042c1e571bcfb88ca9402c6789edfde23073cdad32

    • memory/1684-54-0x00000000766D1000-0x00000000766D3000-memory.dmp
      Filesize

      8KB