Analysis

  • max time kernel
    173s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    06-02-2022 12:41

General

  • Target

    55a338b1d8ac98b5075c7ea83e27eb457aa0df1684fd923864020e99f7817c2a.exe

  • Size

    1.6MB

  • MD5

    c4ad102a06da79a5ded9cc07a477261d

  • SHA1

    56d35fdc72491488a668dc14f9da84277d592391

  • SHA256

    55a338b1d8ac98b5075c7ea83e27eb457aa0df1684fd923864020e99f7817c2a

  • SHA512

    892a430372fd9457eb97e6cf68c588cd7d0ecd0f72fa4422aedadbcfd2889d545b6054fc87add716d013eb5a239217e9a438ef5f32db89aa0f1b1f52be2c19de

Malware Config

Signatures

  • Detect Neshta Payload 3 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55a338b1d8ac98b5075c7ea83e27eb457aa0df1684fd923864020e99f7817c2a.exe
    "C:\Users\Admin\AppData\Local\Temp\55a338b1d8ac98b5075c7ea83e27eb457aa0df1684fd923864020e99f7817c2a.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Local\Temp\3582-490\55a338b1d8ac98b5075c7ea83e27eb457aa0df1684fd923864020e99f7817c2a.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\55a338b1d8ac98b5075c7ea83e27eb457aa0df1684fd923864020e99f7817c2a.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Checks whether UAC is enabled
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4316
      • C:\Windows\svchost.com
        "C:\Windows\svchost.com" "C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4816
        • C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE
          C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE
          4⤵
            PID:2268
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
      1⤵
        PID:1852

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Adobe\ARM\Reader_19.010.20069\AcroRdrDCUpd1901020098.msp
        MD5

        3404522672187ad49ad74aec689075c0

        SHA1

        af6b91326f443b04088cd3718b93334a7247ce1a

        SHA256

        0ef813051b890501283103fb2999aaa01438227b681dcf711d09c10c5846d72d

        SHA512

        35d47d228977ae3e77b1510e67fc082da37a39f346a23d4d5f65d91ac46ae51581ccb3c507efe6b33a8ac26af11e58ee2128f98a16ba4b1f2bf9b14e70389f18

      • C:\Users\Admin\AppData\Local\Adobe\ARM\Reader_19.010.20069\ReaderDCManifest2.msi
        MD5

        6f014505b038aa70695dc6557662df8b

        SHA1

        25607777270af2b0a38da97d8d98ab9bc7926980

        SHA256

        52040d7492e91856c658e4779bdc2de38a81f47e5136d9a772f4559178fbe7fc

        SHA512

        25c53e4b7c273b3699be727e5a6688dbfad7b6633d78d29e753bc3446b8e2b5e8c752a8842870264fe10a2b3a0246c335bea7457daa289faec67f7ca7c2aaac0

      • C:\Users\Admin\AppData\Local\Adobe\ARM\S\ARM.msi
        MD5

        5c256b8910abfa6fb390b6b6986fbdc8

        SHA1

        f106a3257f64ff9be9314f099deae3cef5a75d52

        SHA256

        f0baf945e8ccda8d7ad3a5f76aa952c5b6ee1a8ce05c5e0eede9384d7b3f1bcc

        SHA512

        d6bae8fe0b0707a49bc54d62b508024fee0c25c2150483ba5f2608b9c4d9f75c2b3b9eea1d8feb08921cc5ff38488adc97e4d2ab167bdbd26706d562aff775af

      • C:\Users\Admin\AppData\Local\Adobe\ARM\S\ArmManifest3.msi
        MD5

        b6935ef524b1a039a12bd619da830fe0

        SHA1

        f39030ea87dabcaf46c2c59d43b7381ecf064119

        SHA256

        b0097ffd73d0d83cd1d81b7ffd3fe4f0e9275218630fd8d0793f20ee95985ac7

        SHA512

        1caf933ea5bd278c723e1478120f8b89b3acd58139a8eda8ee09c92df6c2068a9c8765b8eec9e46675bc4efe25784874d9a34d2e55c95a68fff2ca2cf7478c7d

      • C:\Users\Admin\AppData\Local\Temp\3582-490\55a338b1d8ac98b5075c7ea83e27eb457aa0df1684fd923864020e99f7817c2a.exe
        MD5

        8f9a1733d2a9aea90186f7f2899fb9db

        SHA1

        cf6b567610932fac8a104a2efccebd7bc732d749

        SHA256

        5682fc04d2034c28ad7882a207407022f541e3efe80337a447ca5a3b457002af

        SHA512

        bb8079624a61975b1d540a85f1bf4fa5474dad32b54f9ca916548c9dcbccc7a6fdedcc5ba29f7fc6aeba01c0f41a5386f892c6b767828e016c4eb51b3ca9d69c

      • C:\Users\Admin\AppData\Local\Temp\3582-490\55a338b1d8ac98b5075c7ea83e27eb457aa0df1684fd923864020e99f7817c2a.exe
        MD5

        8f9a1733d2a9aea90186f7f2899fb9db

        SHA1

        cf6b567610932fac8a104a2efccebd7bc732d749

        SHA256

        5682fc04d2034c28ad7882a207407022f541e3efe80337a447ca5a3b457002af

        SHA512

        bb8079624a61975b1d540a85f1bf4fa5474dad32b54f9ca916548c9dcbccc7a6fdedcc5ba29f7fc6aeba01c0f41a5386f892c6b767828e016c4eb51b3ca9d69c

      • C:\Windows\svchost.com
        MD5

        d1499f582a63bc6e26debc4d6c439773

        SHA1

        efff51429486363749484600cab910c0768e85a9

        SHA256

        8005691f4eff8d78f866243532f583826a4c2bdd009eab278c60ef64fc260209

        SHA512

        eadfee975290db3474ec669c83f98f974fe19d85873a4d5344a467ffaf2f689f538152dca598cb246a323a988a2ee9198543d8950bdba59c710c4f2efc412fca

      • C:\Windows\svchost.com
        MD5

        d1499f582a63bc6e26debc4d6c439773

        SHA1

        efff51429486363749484600cab910c0768e85a9

        SHA256

        8005691f4eff8d78f866243532f583826a4c2bdd009eab278c60ef64fc260209

        SHA512

        eadfee975290db3474ec669c83f98f974fe19d85873a4d5344a467ffaf2f689f538152dca598cb246a323a988a2ee9198543d8950bdba59c710c4f2efc412fca

      • C:\odt\OFFICE~1.EXE
        MD5

        3583a1dca8a996859a0f2c31fe688e78

        SHA1

        15e72e57b5843de75630529a0d8fc32d00b0a2e4

        SHA256

        c2cf6e5073cc78ca94730069c5deaebccd908d0366c46bdc14a7d1a0406929b6

        SHA512

        62bbb584618b005042170b12b3b37addf54036b6bed6be31f1369c8b4a05464abdd8380c5c4391287495041c4989a479b5f3e6322c4cda60b465ba9c938fa232