Analysis

  • max time kernel
    151s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    16-02-2022 06:23

General

  • Target

    b16522c76d4129c5381c2568b1e31581_5-NS new.exe

  • Size

    165KB

  • MD5

    b16522c76d4129c5381c2568b1e31581

  • SHA1

    6fa7e62cf9aa3264298ff58d75fa505cd5bf583e

  • SHA256

    21f78b4d9829db5e3e7d21ff3ad03991b9d00df9d05518ff49b8cdfb2d46e282

  • SHA512

    e58be82fa8d181644a6c50606c0e32ec0020e9b26eb84f2e58c37c2ba5f0f0c831a46700789a3f95480402cb923498604371f760efb135926eae9be3ce257e48

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 51 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b16522c76d4129c5381c2568b1e31581_5-NS new.exe
    "C:\Users\Admin\AppData\Local\Temp\b16522c76d4129c5381c2568b1e31581_5-NS new.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Users\Admin\AppData\Local\Temp\3582-490\b16522c76d4129c5381c2568b1e31581_5-NS new.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\b16522c76d4129c5381c2568b1e31581_5-NS new.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3832
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c cls
        3⤵
          PID:3616
    • C:\Windows\system32\MusNotifyIcon.exe
      %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
      1⤵
      • Checks processor information in registry
      PID:3096
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k NetworkService -p
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:2476
    • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
      C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3988

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\3582-490\b16522c76d4129c5381c2568b1e31581_5-NS new.exe
      MD5

      6bffc6c7caa2eb2fa90fac0317f63338

      SHA1

      bd5354cd813130687c66ecc132d50770d48417cf

      SHA256

      92c65b58c4925534c2ce78e54b0e11ecaf45ed8cf0344ebff46cdfc4f2fe0d84

      SHA512

      dc8fad291057faa036ebcdabbc87146911bdc25e922be8fa7ad896dd533f9956ebfaeeb40d80d7ca0a18c225a1cdad6a75e04618cb3e0d8bae72db4877a9ac94

    • C:\Users\Admin\AppData\Local\Temp\3582-490\b16522c76d4129c5381c2568b1e31581_5-NS new.exe
      MD5

      6bffc6c7caa2eb2fa90fac0317f63338

      SHA1

      bd5354cd813130687c66ecc132d50770d48417cf

      SHA256

      92c65b58c4925534c2ce78e54b0e11ecaf45ed8cf0344ebff46cdfc4f2fe0d84

      SHA512

      dc8fad291057faa036ebcdabbc87146911bdc25e922be8fa7ad896dd533f9956ebfaeeb40d80d7ca0a18c225a1cdad6a75e04618cb3e0d8bae72db4877a9ac94