Analysis

  • max time kernel
    151s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    06-02-2022 11:37

General

  • Target

    7626258b25bb7cb90dcf8c7e1f4f2df2705dffeaaedd41fa25775e59ea81da2b.exe

  • Size

    1.5MB

  • MD5

    1104498260ca07ce5518fac937b5a749

  • SHA1

    1f3d96baf83f6bcf4ba2a8d6540457c124cc1ecd

  • SHA256

    7626258b25bb7cb90dcf8c7e1f4f2df2705dffeaaedd41fa25775e59ea81da2b

  • SHA512

    82fbd5b4e8984350c15ab84b3bfddffd3da66e0ff760fd85419de43ca4215b030f11ee65638f914e4d40ed1b6acb4d9c6891ea01f7bc66b7809098f08ee0e473

Malware Config

Signatures

  • Detect Neshta Payload 10 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7626258b25bb7cb90dcf8c7e1f4f2df2705dffeaaedd41fa25775e59ea81da2b.exe
    "C:\Users\Admin\AppData\Local\Temp\7626258b25bb7cb90dcf8c7e1f4f2df2705dffeaaedd41fa25775e59ea81da2b.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Users\Admin\AppData\Local\Temp\3582-490\7626258b25bb7cb90dcf8c7e1f4f2df2705dffeaaedd41fa25775e59ea81da2b.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\7626258b25bb7cb90dcf8c7e1f4f2df2705dffeaaedd41fa25775e59ea81da2b.exe"
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1252
      • C:\Windows\svchost.com
        "C:\Windows\svchost.com" "C:\PROGRA~2\Adobe\READER~1.0\Reader\READER~1.EXE"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1568
        • C:\PROGRA~2\Adobe\READER~1.0\Reader\READER~1.EXE
          C:\PROGRA~2\Adobe\READER~1.0\Reader\READER~1.EXE
          4⤵
            PID:952

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE
      MD5

      9306f2a522a57b846007a08f1ca66f03

      SHA1

      df4ba0ea9393304bce52879d4b9344a0f1277d20

      SHA256

      0b3954c2f43c8c55e3d23bc7c97acf57022b9ced4360fe7d8660e77a1fbb3372

      SHA512

      dfc6336d1115a7337905341d0579700df3f821d4be340faa603a30668152e061818628e7544a2f0b4767c40baffe37554d040644dfd0d1da8ef3de0e25dd171b

    • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe
      MD5

      e0f2257e0ad4b04429c932673ead4884

      SHA1

      352fcc1fe1019cd069ab52b409b31bbd0a08ea9a

      SHA256

      6e11a49479c1d2b35f15901b0700e307712338f343e1c03fcfe715946fab5969

      SHA512

      d77e790e63b1b2307df2ef0bb774bcbfa5cdc716764050dfa055a23449cffa5c6f61759b0819712f3e3be06037cbc3469082ba2b02af990017f28658f0103763

    • C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe
      MD5

      05137767de39f2bb28b365b2238f32e1

      SHA1

      5e62f303be2d32f16da8ebe555eb80491f7c0efb

      SHA256

      ca65573ff40bd61e73cf21f24a122de99e5face2ce75a2e0753f93e10cf6495b

      SHA512

      9f29611adeac506c6db62a47d82fe5891688cfffc7217ad1dd076fc88e54ea4b9291974b168922245f6c8e302f4e03a273bf0ac9942ac4d1cf6c5a6099b9f0be

    • C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe
      MD5

      98359abd5f26fc75169bafd6edcf00cd

      SHA1

      c0bdcc5b5f48c72275f84d6166a42519cc5f2028

      SHA256

      958bf8d76d4de0bbba6aadea0c4aff0ec7be9cc69ab9fa61cd29dcecbf3528fa

      SHA512

      573e374866e93b14cec6b5192ba45529a89c140d023ec0e471bad563fd6893cbef2a2fb0b106732f40fd4a2629869c8074b991539b05ade3d38f32aa26751fe2

    • C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE
      MD5

      eada39c3d39e4909a7a3b4b64b848786

      SHA1

      79fbbbea98bc4eabc035a9de2f19155b06208ebc

      SHA256

      8fd6bddbedca702db9c3c796fe4ad15148f3179a563ec2b8edab6dc9cc656453

      SHA512

      8556fc832a8b9b23b7c22ac97252aa50cf744be490bf07083fb21ddbb5dd87fa32ecb3bc13abba48f306389722118d2d3b8c4af171388789a89d68f8ded2eb2c

    • C:\Users\ALLUSE~1\PACKAG~1\{CA675~1\VCREDI~1.EXE
      MD5

      30f41c2c0417dd0328ce0f0c150275a9

      SHA1

      10c85349c26d746fcd93528ff2c0155daf703fb7

      SHA256

      00098459575636cfeb2c7df17a1d7971b7a61a2e6c14125d758baa13f870963e

      SHA512

      288d429fac506b6d844b72885d2552f86a92ff09b9274fe2a629da9577c3681de8aa92b0cda315a0b0b9282194e29545e40cbcd60f4e58faa4c7c70edb8de317

    • C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE
      MD5

      9857d2c34225f1a8dcc013c6bfea988e

      SHA1

      00bc17e0ccc30790eded16b7008f62fe311ab696

      SHA256

      ecf10fef616c17cedc5e89f167d36aaf740767e4a626aac6e2524514f9e78786

      SHA512

      3d0f1574919de1d6ef007337cc06123a017d365cbe795af61dc9944cd7391367efd1ded5a1782310a8da2a7f7a6b89f2327fc64fa5acdfd34f056f239552b64e

    • C:\Users\ALLUSE~1\PACKAG~1\{F4220~1\VC_RED~1.EXE
      MD5

      c1566cf691ffb790c54f38c07dd792fb

      SHA1

      3002b88f5a59941a6ff6b40b49dc33003bfbcdcb

      SHA256

      da1569616a37956a9cf58a7f7323d3c44d27089f8e61392228132bc3fff499a4

      SHA512

      7e60b0b24cef3ce9a3640f81918c96a27302f15d1f735c35b6cb9d1e4359724026168846fa985cce1f37b9c709e576f11a418cbc82706ad6c40a62cd96b93e74

    • C:\Users\Admin\AppData\Local\Temp\3582-490\7626258b25bb7cb90dcf8c7e1f4f2df2705dffeaaedd41fa25775e59ea81da2b.exe
      MD5

      4eb5d80cdb10e827692c029635f171a7

      SHA1

      46029f69ba21eea4d701d55480fee9b991f9c052

      SHA256

      5ded8a12139ad93d44491706f2f0124f532d0b43a136179604ae905e2d1ccb01

      SHA512

      051944536afbae0619ebe272e1b6379eab66ef3eedfd4f87dce4c22a6269e69a50523c445bbda7b7d2bc8aaa112d5704609731af87d51f2a15763d564575a464

    • C:\Windows\svchost.com
      MD5

      a2e215261e4a78871d24b0479f85dc87

      SHA1

      7f129adbc892e5463396dc2494db092de5930acf

      SHA256

      8e783b4bf8f824dbb73575de04c1ffff3d8870f797e40809024046624113bf22

      SHA512

      f22bdff7665eeaa963d5e449a81aaf5b727dd75f8ca7f0ee33a05753e3404b8a10d489f6c587f0bb6ba99a269c4f681b6435993d5d9558a7521a93c9ed3f66ce

    • C:\Windows\svchost.com
      MD5

      a2e215261e4a78871d24b0479f85dc87

      SHA1

      7f129adbc892e5463396dc2494db092de5930acf

      SHA256

      8e783b4bf8f824dbb73575de04c1ffff3d8870f797e40809024046624113bf22

      SHA512

      f22bdff7665eeaa963d5e449a81aaf5b727dd75f8ca7f0ee33a05753e3404b8a10d489f6c587f0bb6ba99a269c4f681b6435993d5d9558a7521a93c9ed3f66ce

    • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
      MD5

      9e2b9928c89a9d0da1d3e8f4bd96afa7

      SHA1

      ec66cda99f44b62470c6930e5afda061579cde35

      SHA256

      8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

      SHA512

      2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

    • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
      MD5

      9e2b9928c89a9d0da1d3e8f4bd96afa7

      SHA1

      ec66cda99f44b62470c6930e5afda061579cde35

      SHA256

      8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

      SHA512

      2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

    • \Users\Admin\AppData\Local\Temp\3582-490\7626258b25bb7cb90dcf8c7e1f4f2df2705dffeaaedd41fa25775e59ea81da2b.exe
      MD5

      4eb5d80cdb10e827692c029635f171a7

      SHA1

      46029f69ba21eea4d701d55480fee9b991f9c052

      SHA256

      5ded8a12139ad93d44491706f2f0124f532d0b43a136179604ae905e2d1ccb01

      SHA512

      051944536afbae0619ebe272e1b6379eab66ef3eedfd4f87dce4c22a6269e69a50523c445bbda7b7d2bc8aaa112d5704609731af87d51f2a15763d564575a464

    • memory/1492-54-0x00000000769D1000-0x00000000769D3000-memory.dmp
      Filesize

      8KB