Analysis

  • max time kernel
    157s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    06-02-2022 11:08

General

  • Target

    879c28cf41c4f3c341214d05ff7bedc0c244f43c1beea4cce451ce1a3b680640.exe

  • Size

    1.5MB

  • MD5

    09f222a0aa9752f778bc5a5b576da9be

  • SHA1

    3570e76c59754b502f6c2b784acaf81b4ad4838d

  • SHA256

    879c28cf41c4f3c341214d05ff7bedc0c244f43c1beea4cce451ce1a3b680640

  • SHA512

    f3a82483f4b2cdfd8c7ba9510f49e3bbfeb116f1ced310063febd68522e38a1e553dd76d22aaa3bfc930e8590d8bcb7be90d83306c134953d29284d9436e8b44

Malware Config

Signatures

  • Detect Neshta Payload 26 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 51 IoCs
  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\879c28cf41c4f3c341214d05ff7bedc0c244f43c1beea4cce451ce1a3b680640.exe
    "C:\Users\Admin\AppData\Local\Temp\879c28cf41c4f3c341214d05ff7bedc0c244f43c1beea4cce451ce1a3b680640.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3452
    • C:\Users\Admin\AppData\Local\Temp\3582-490\879c28cf41c4f3c341214d05ff7bedc0c244f43c1beea4cce451ce1a3b680640.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\879c28cf41c4f3c341214d05ff7bedc0c244f43c1beea4cce451ce1a3b680640.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Checks whether UAC is enabled
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1752
      • C:\Windows\svchost.com
        "C:\Windows\svchost.com" "C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE"
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4084
        • C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE
          C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE
          4⤵
            PID:2792
    • C:\Windows\system32\MusNotifyIcon.exe
      %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
      1⤵
      • Checks processor information in registry
      PID:3856
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k NetworkService -p
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:2628

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE
      MD5

      3ad3461ef1d630f38ed3749838bbedc3

      SHA1

      8d85b0b392ae75c5d0b004ee9cf5a7b80b1b79e6

      SHA256

      32be2bca2b848da78c02140a288f1bb771cb66757f90d20126b1bcfd5bb40e62

      SHA512

      0e95e5181eab14d5820a3a4952018ac9b290fa3b17add8a5e13d893052f1d2a90a2323c62843f6a9e9af00f27e00108b60e0bce2f848e0a4d8ce0cce153db1ba

    • C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\armsvc.exe
      MD5

      74f5380f58ef544acb1c72b1850c3a73

      SHA1

      ab635d8b36df1b82361237fe607d91bef3eb8854

      SHA256

      2ef9b15411bf393ec3715afe61b7da18826aabde1074ef5b8cf3d5d346567ffa

      SHA512

      36dc9e73865e2f8ee2d791be18916915044591c24a101c4e64a1ecde9fbd5e33205e20cab11b6ed129aebd62910f7471a1d15372de6f956c68b8d87b850abd66

    • C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE
      MD5

      fafb18b930b2b05ac8c5ddb988e9062f

      SHA1

      825ea5069601fb875f8d050aa01300eac03d3826

      SHA256

      c17785fe7e6b5e08fe5a4ca3679fee85ba6f2e5efcce0fb9807727cf8aa25265

      SHA512

      be034e7377bd27092aad02e13a152fb80ff74c1ba2fb63ccb344cd55315d115ee47e46727cbe55ca808efafa58d7924e3eed965e9a2fd3b9ae2dff7834383e54

    • C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE
      MD5

      33cb4562e84c8bbbc8184b961e2e49ee

      SHA1

      d6549a52911eaeebcceb5bc39d71272d3b8f5111

      SHA256

      1f455ea6bab09377e5fdfbd5df102f79c5cbbb5fe5ce456f2fbb34f94ec848bb

      SHA512

      0b638a6e86816ba5d83de5fc381c85371f2f4fe0a2fdff40141859a42e255a082903e5692a49ef253265a42ec99924e5a0aa150cb7ed6cd5521f42f6c9fe27a9

    • C:\PROGRA~2\Google\Update\DISABL~1.EXE
      MD5

      dd5586c90fad3d0acb402c1aab8f6642

      SHA1

      3440cd9e78d4e4b3c2f5ba31435cedaa559e5c7f

      SHA256

      fba2b9270ade0ce80e8dfc5e3279db683324502f6103e451cd090c69da56415e

      SHA512

      e56f6d6b446411ba4ed24f0d113953d9c9e874b2ac4511d33e5c5b85dddd81216579695e35c34b6054c187b00ee214d5648594dad498297f487f2fd47f040a4d

    • C:\PROGRA~2\MICROS~1\EDGEUP~1\13153~1.55\MI391D~1.EXE
      MD5

      7baa7810184d98714901cd5002062033

      SHA1

      bc5504f8989e536f7b168c68aa7649772b1374d3

      SHA256

      76c1b75cd25adc853657b6340b0e2a5cd7a2903e9eafb09ea2fbadbc8e28f87f

      SHA512

      14e2d76ebf905b3cae2793968b49e99881691235c982b0f511f7348b752219e147cf90b3e967244cdcfce92448da468b60ab4fa2be33eb2913802b3768232f64

    • C:\PROGRA~3\Adobe\ARM\S\30428\ADOBEA~1.EXE
      MD5

      866c885d4d4247ebd901823b77d111ba

      SHA1

      1e32e2e7c35fcabd58087a7c5346095d54415d77

      SHA256

      c726f5bbe3fe7807ac6392dfb0adec2371a9c123ba77a0c406caaccd87a1d985

      SHA512

      a36d4ddf78684590443ed41972aae03e03f859f88b582682afccc23adb890c1fe749c0616ebd10a32ec0614211c658f9a076813e31886c91691bbb97cfe9c45c

    • C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE
      MD5

      0d9146d70ac6a41ead1ea2d50d729508

      SHA1

      b9e6ff83a26aaf105640f5d5cdab213c989dc370

      SHA256

      0b876ddeefd88d5e98de7e409c5b6546ba8ffa195c168f9a4b6ba33b44d437ab

      SHA512

      c9394decfd469bfedd883095d604e11208aa290334ff5c0dce852f2ca74fba27c37ba2984dab8b27430e573681e22c9f903e53b01510a4b77d337cbd92c56cb3

    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
      MD5

      4b2192864374f21ee6cb90b81c8b98a9

      SHA1

      131c29e7354fe6e32153d5dcf4d52c8f9c9d3091

      SHA256

      b29d2b87e91f82d764ee7ab5947dbf9f3e2b9dc473e571ef1b67622d35cb9b9a

      SHA512

      2361cfb375b597f6100dd0c84340c34041db4da2ca0bd72e1aba7782e73c43c9ef920c83e367eb16bf213ecb3518e97c6417a5f666a298deefd23f4260b52f2b

    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\acrord32.exe
      MD5

      12fd9fcb97cb1e45c020e7bac06b2c91

      SHA1

      90c6fce6c9c40666ecc0c3964308bb2401676703

      SHA256

      8cec6976f1f5c004627ac249302e29127f4c7d2cda4df8263bf75281edec7a25

      SHA512

      c805cc4ca9bbc3e4c961e2685712d44c85aed275cdfd2f6c3c20898c647efbd442fb0b8da0186d06fce88288e9fdec25830c48cb107b73da466098ab19353953

    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe
      MD5

      92dc0a5b61c98ac6ca3c9e09711e0a5d

      SHA1

      f809f50cfdfbc469561bced921d0bad343a0d7b4

      SHA256

      3e9da97a7106122245e77f13f3f3cc96c055d732ab841eb848d03ac25401c1bc

      SHA512

      d9eefb19f82e0786d9be0dbe5e339d25473fb3a09682f40c6d190d4c320cca5556abb72b5d97c6b0da4f8faefdc6d39ac9d0415fdf94ebcc90ecdf2e513c6a31

    • C:\Users\ALLUSE~1\Adobe\ARM\S\30428\ADOBEA~1.EXE
      MD5

      bcd0f32f28d3c2ba8f53d1052d05252d

      SHA1

      c29b4591df930dabc1a4bd0fa2c0ad91500eafb2

      SHA256

      bb07d817b8b1b6b4c25e62b6120e51dec10118557d7b6b696ad084a5ba5bfdeb

      SHA512

      79f407735853f82f46870c52058ceee4d91857a89db14868ee1169abd5c0fd2e3fa1ed230ab90b5f479a9581b88998643d69b0df498defea29e73b0d487f3b10

    • C:\Users\ALLUSE~1\Adobe\Setup\{AC76B~1\setup.exe
      MD5

      05bdfd8a3128ab14d96818f43ebe9c0e

      SHA1

      495cbbd020391e05d11c52aa23bdae7b89532eb7

      SHA256

      7b945c7e6b8bfbb489f003ecd1d0dcd4803042003de4646d4206114361a0fbbb

      SHA512

      8d9b9fc407986bd53fe3b56c96b7371cc782b4bac705253bfb0a2b0b1e6883fdb022f1ac87b8bfd7005291991b6a3dfbaceab54f5d494e0af70f0435a0b8b0da

    • C:\Users\ALLUSE~1\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE
      MD5

      63dc05e27a0b43bf25f151751b481b8c

      SHA1

      b20321483dac62bce0aa0cef1d193d247747e189

      SHA256

      7d607fb69c69a72a5bf4305599279f46318312ce1082b6a34ac9100b8c7762ce

      SHA512

      374d705704d456cc5f9f79b7f465f6ec7c775dc43001c840e9d6efbbdef20926ed1fa97f8a9b1e73161e17f72520b96c05fa58ac86b3945208b405f9166e7ba3

    • C:\Users\ALLUSE~1\PACKAG~1\{33D1F~1\VCREDI~1.EXE
      MD5

      413ec51a9880e79324c712c0548674c1

      SHA1

      032d114c78c8df6d98186eeffd9cba24589e93bb

      SHA256

      80eee8d364db4b281b1643a1a52a5dd1c334b4f20c2519c5e0ba7aa9a49c2bd7

      SHA512

      4a1f74751793c32729ebe1e01b8b79ffe1a812e6972a21c17a688f52ea828c9d179151026597cae202b3cc46ecd0909d78b47cba5b3e2dc954832cd378657555

    • C:\Users\ALLUSE~1\PACKAG~1\{4D8DC~1\VC_RED~1.EXE
      MD5

      24179b4581907abfef8a55ab41c97999

      SHA1

      e4de417476f43da4405f4340ebf6044f6b094337

      SHA256

      a8b960bcbf3045bedd2f6b59c521837ac4aee9c566001c01d8fc43b15b1dfdc7

      SHA512

      6fb0621ea3755db8af58d86bdc4f5324ba0832790e83375d07c378b6f569a109e14a78ed7d1a5e105b7a005194a31bd7771f3008b2026a0938d695e62f6ea6b8

    • C:\Users\ALLUSE~1\PACKAG~1\{57A73~1\VC_RED~1.EXE
      MD5

      06366e48936df8d5556435c9820e9990

      SHA1

      0e3ed1da26a0c96f549720684e87352f1b58ef45

      SHA256

      cd47cce50016890899413b2c3609b3b49cb1b65a4dfcaa34ece5a16d8e8f6612

      SHA512

      bea7342a6703771cb9b11cd164e9972eb981c33dcfe3e628b139f9e45cf1e24ded1c55fcdfa0697bf48772a3359a9ddd29e4bb33c796c94727afd1c4d5589ea3

    • C:\Users\ALLUSE~1\PACKAG~1\{61087~1\VCREDI~1.EXE
      MD5

      31685b921fcd439185495e2bdc8c5ebf

      SHA1

      5d171dd1f2fc2ad55bde2e3c16a58abff07ae636

      SHA256

      4798142637154af13e3ed0e0b508459cf71d2dc1ae2f80f8439d14975617e05c

      SHA512

      04a414a89e02f9541b0728c82c38f0c64af1e95074f00699a48c82a5e99f4a6488fd7914ff1fa7a5bf383ce85d2dceab7f686d4ee5344ab36e7b9f13ceec9e7f

    • C:\Users\ALLUSE~1\PACKAG~1\{CA675~1\VCREDI~1.EXE
      MD5

      0d9146d70ac6a41ead1ea2d50d729508

      SHA1

      b9e6ff83a26aaf105640f5d5cdab213c989dc370

      SHA256

      0b876ddeefd88d5e98de7e409c5b6546ba8ffa195c168f9a4b6ba33b44d437ab

      SHA512

      c9394decfd469bfedd883095d604e11208aa290334ff5c0dce852f2ca74fba27c37ba2984dab8b27430e573681e22c9f903e53b01510a4b77d337cbd92c56cb3

    • C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE
      MD5

      07e194ce831b1846111eb6c8b176c86e

      SHA1

      b9c83ec3b0949cb661878fb1a8b43a073e15baf1

      SHA256

      d882f673ddf40a7ea6d89ce25e4ee55d94a5ef0b5403aa8d86656fd960d0e4ac

      SHA512

      55f9b6d3199aa60d836b6792ae55731236fb2a99c79ce8522e07e579c64eabb88fa413c02632deb87a361dd8490361aa1424beed2e01ba28be220f8c676a1bb5

    • C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\181510~1.001\FILECO~1.EXE
      MD5

      346d2ff654d6257364a7c32b1ec53c09

      SHA1

      224301c0f56a870f20383c45801ec16d01dc48d1

      SHA256

      a811042693bc2b31be7e3f454b12312f67bc97f2b15335a97e8d8f2ba0a6b255

      SHA512

      223545e3fc9f3cd66c5cbcb50dd7103743788f03a9db398da6dd2744ccaeee291f385ce4f2758d4504fc0f6b968fabbfe16ba03b5f546b743c51dacad7a049c3

    • C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\181510~1.001\FILESY~1.EXE
      MD5

      f3228c24035b3f54f78bb4fd11c36aeb

      SHA1

      2fe73d1f64575bc4abf1d47a9dddfe7e2d9c9cbb

      SHA256

      d2767c9c52835f19f6695c604081bf03cdd772a3731cd2e320d9db5e477d8af7

      SHA512

      b526c63338d9167060bc40ffa1d13a8c2e871f46680cd4a0efc2333d9f15bf21ae75af45f8932de857678c5bf785011a28862ce7879f4bffdb9753c8bc2c19b5

    • C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\ONEDRI~1.EXE
      MD5

      1319acbba64ecbcd5e3f16fc3acd693c

      SHA1

      f5d64f97194846bd0564d20ee290d35dd3df40b0

      SHA256

      8c6f9493c2045bb7c08630cf3709a63e221001f04289b311efb259de3eb76bce

      SHA512

      abbbb0abfff1698e2d3c4d27d84421b90abba1238b45884b82ace20d11ddfdd92bf206519fc01714235fb840258bb1c647c544b9a19d36f155bf3224916805b8

    • C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\OneDrive.exe
      MD5

      3a3a71a5df2d162555fcda9bc0993d74

      SHA1

      95c7400f85325eba9b0a92abd80ea64b76917a1a

      SHA256

      0a023355d1cc0a2348475d63aaf6aa0521d11e12a5c70102d7b3ebde092849e8

      SHA512

      9ad76ccce76ccfe8292bca8def5bc7255e7ea0ba6d92130c4350da49a3d7faef2d46b08aaef1955f3f4ea0a2e22451562b5e08783a79f794724584e409cf7837

    • C:\Users\Admin\AppData\Local\Temp\3582-490\879c28cf41c4f3c341214d05ff7bedc0c244f43c1beea4cce451ce1a3b680640.exe
      MD5

      b8b96354dd88484208f17101f6704f7c

      SHA1

      68815c39f47a0b8f766d9191e7ac55d3199d1c96

      SHA256

      ad25d9f873a80f454ce2acbb75246463070e216c89b042ee87b9a6204dd146c0

      SHA512

      6ef740dea56bd0724e7f8a999ce46a2f2356aeb876bc47d127d96eb156d636c755a9f610fee7109ad4d044042c1e571bcfb88ca9402c6789edfde23073cdad32

    • C:\Users\Admin\AppData\Local\Temp\3582-490\879c28cf41c4f3c341214d05ff7bedc0c244f43c1beea4cce451ce1a3b680640.exe
      MD5

      b8b96354dd88484208f17101f6704f7c

      SHA1

      68815c39f47a0b8f766d9191e7ac55d3199d1c96

      SHA256

      ad25d9f873a80f454ce2acbb75246463070e216c89b042ee87b9a6204dd146c0

      SHA512

      6ef740dea56bd0724e7f8a999ce46a2f2356aeb876bc47d127d96eb156d636c755a9f610fee7109ad4d044042c1e571bcfb88ca9402c6789edfde23073cdad32

    • C:\Windows\svchost.com
      MD5

      d1bb9002f9b41f1dd503b9b2d238e961

      SHA1

      12a1b2dca6a63dc395d327b7e4efe72c01869584

      SHA256

      b97b7dc1081d71bebacc15c20a2546e9029ec2c68294a78f29f0cce57ce49520

      SHA512

      40c33e27d80876b0326913f77dc70055f2e1cd89675eb7cec2e9a0c96182fdc16136009176d41be6ed959927bf4aac839586badfcb65622914a5ecce9398d860

    • C:\Windows\svchost.com
      MD5

      d1bb9002f9b41f1dd503b9b2d238e961

      SHA1

      12a1b2dca6a63dc395d327b7e4efe72c01869584

      SHA256

      b97b7dc1081d71bebacc15c20a2546e9029ec2c68294a78f29f0cce57ce49520

      SHA512

      40c33e27d80876b0326913f77dc70055f2e1cd89675eb7cec2e9a0c96182fdc16136009176d41be6ed959927bf4aac839586badfcb65622914a5ecce9398d860

    • C:\odt\OFFICE~1.EXE
      MD5

      02c3d242fe142b0eabec69211b34bc55

      SHA1

      ea0a4a6d6078b362f7b3a4ad1505ce49957dc16e

      SHA256

      2a1ed24be7e3859b46ec3ebc316789ead5f12055853f86a9656e04b4bb771842

      SHA512

      0efb08492eaaa2e923beddc21566e98fbbef3a102f9415ff310ec616f5c84fd2ba3a7025b05e01c0bdf37e5e2f64dfd845f9254a376144cc7d827e7577dbb099