Analysis

  • max time kernel
    156s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    22-02-2022 19:27

General

  • Target

    0e98fe18a87242d8365fa52a20b9532885f31ade09576016b033d151e5051648.exe

  • Size

    2.1MB

  • MD5

    552774bfe6e8d480407d751bc3f369b3

  • SHA1

    08e79d9809e15f6a6c8cf2cf0b6d035b895d395d

  • SHA256

    0e98fe18a87242d8365fa52a20b9532885f31ade09576016b033d151e5051648

  • SHA512

    0b2c5e56244849f2180b51588901bfea30f3f2e67e853e4eea017a131d2f8c2aa86a77a0289e2ace52ddc97ca6a3a182b67c80d71a04abb453f98611a131f8e7

Malware Config

Signatures

  • Detect Neshta Payload 18 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • NirSoft WebBrowserPassView 5 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 5 IoCs
  • Executes dropped EXE 3 IoCs
  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e98fe18a87242d8365fa52a20b9532885f31ade09576016b033d151e5051648.exe
    "C:\Users\Admin\AppData\Local\Temp\0e98fe18a87242d8365fa52a20b9532885f31ade09576016b033d151e5051648.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4872
    • C:\Users\Admin\AppData\Local\Temp\3582-490\0e98fe18a87242d8365fa52a20b9532885f31ade09576016b033d151e5051648.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\0e98fe18a87242d8365fa52a20b9532885f31ade09576016b033d151e5051648.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1168
      • C:\Windows\svchost.com
        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\TEMPLA~1\MST4LF~1.EXE" /stext C:\Users\Admin\AppData\Local\Temp\3582-490\output.txt
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:364
        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\TEMPLA~1\MST4LF~1.EXE
          C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\TEMPLA~1\MST4LF~1.EXE /stext C:\Users\Admin\AppData\Local\Temp\3582-490\output.txt
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:3332

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe
    MD5

    5791075058b526842f4601c46abd59f5

    SHA1

    b2748f7542e2eebcd0353c3720d92bbffad8678f

    SHA256

    5c3ef3ec7594c040146e908014791dd15201ba58b4d70032770bb661b6a0e394

    SHA512

    83e303971ed64019fde9e4ba6f6e889f8fb105088490dfa7dcf579a12baff20ef491f563d132d60c7b24a4fd3cac29bd9dc974571cd162000fae8fba4e0e54fb

  • C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe
    MD5

    522c12509a9fde92565e673f2f47a0b9

    SHA1

    3cb06efb8b369eb72c55a83f2e89732a924a96f8

    SHA256

    5cbea72c5565c342e07edfc8902eeea7cfb450362f2ce0cb7b1b184dbf72ef64

    SHA512

    b112b9d568cf9c14cd289b1dc9dc173d800b0b70c63221cbcc326f6727d56027dcc7355599a0bc9a4c6d9abb39281456cc5a138f625147efef9819ebee9fea35

  • C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE
    MD5

    cbd96ba6abe7564cb5980502eec0b5f6

    SHA1

    74e1fe1429cec3e91f55364e5cb8385a64bb0006

    SHA256

    405b8bd647fa703e233b8b609a18999abe465a8458168f1daf23197bd2ea36aa

    SHA512

    a551001853f6b93dfbc6cf6a681820af31330a19d5411076ff3dbce90937b3d92173085a15f29ebf56f2ef12a4e86860ac6723ebc89c98ea31ea7a6c7e3d7cdc

  • C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE
    MD5

    9e63bd6a4360beabbc82ed4a2f03522e

    SHA1

    10961b7873ce3b99939ab5abd634b0f771dc6436

    SHA256

    c8f05c107ecdc905dd2b3c708c40eb50118a65d497e12df6958ce5e1a53af108

    SHA512

    ae72061d3c198cdd9dd4eb17651b6532f3d6016651d943ae23c82d11d1b8b8c86679f0d516d1050f258e445edd7447019fbdb24d897bb919807ff8c449e04925

  • C:\PROGRA~2\Google\Update\DISABL~1.EXE
    MD5

    2a226fd810c5ce7b825ff7982bc22a0b

    SHA1

    58be5cb790336a8e751e91b1702a87fc0521a1d8

    SHA256

    af9e01dab96c2a54e2751a0d703cc55fdcc5ac00c40f0be2e13fd85c09b66132

    SHA512

    f122ce37b07871b88e322b0ca2e42f3170704d4165167d6d7b02883da9d2be5d2d62bdbd9f7e18d1c0c5e60e9e707a3b64ddb99150c99028333818dfa769deeb

  • C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe
    MD5

    5d656c152b22ddd4f875306ca928243a

    SHA1

    177ff847aa898afa1b786077ae87b5ae0c7687c7

    SHA256

    4d87b0eb331443b473c90650d31b893d00373ff88dcbcb3747f494407799af69

    SHA512

    d5e50ee909ea06e69fc0d9999c6d142f9154e6f63462312b4e950cf6e26a7d395dbb50c8e2a8c4f4e1cfb7b2c6ae8ad19e3b7c204c20e7557daa1a0deb454160

  • C:\PROGRA~2\MICROS~1\EdgeCore\970107~1.55\COOKIE~1.EXE
    MD5

    516d67fed667e8d9f1a626ec42bc3ee7

    SHA1

    af6e3d4826783ce16ca40fa2ca7c70999ebc87dc

    SHA256

    707c9e0051847c1e8a70dbbae4dc429b22d4ba40039892be1a47026f29ffb373

    SHA512

    6b59ec1d986ef1cbc55ca566969bb70cc6e1aa9102fb6eb57bbae05cb903b21537c23d267424b612823b4e8560db49f5ee38a74be80a6a731c4dce3617ed48c2

  • C:\Users\ALLUSE~1\Adobe\Setup\{AC76B~1\setup.exe
    MD5

    051978153bcd2b1cf032fa1bf5a82020

    SHA1

    ec6d1d42905a1c92ccee5f4980898d7a1d72aa23

    SHA256

    88e90f04db57a472acacf1f4e7616d05a488fc7a1b41a468b357ac4419489940

    SHA512

    68dec8a12b2c10a9ff83907705c68c77284928d9349a8ba93808d09123752b84944505208d7d71540e340dcbb06e74c79fa24748098308eeecab5f80ab4e8d15

  • C:\Users\ALLUSE~1\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE
    MD5

    63dc05e27a0b43bf25f151751b481b8c

    SHA1

    b20321483dac62bce0aa0cef1d193d247747e189

    SHA256

    7d607fb69c69a72a5bf4305599279f46318312ce1082b6a34ac9100b8c7762ce

    SHA512

    374d705704d456cc5f9f79b7f465f6ec7c775dc43001c840e9d6efbbdef20926ed1fa97f8a9b1e73161e17f72520b96c05fa58ac86b3945208b405f9166e7ba3

  • C:\Users\ALLUSE~1\PACKAG~1\{33D1F~1\VCREDI~1.EXE
    MD5

    86749cd13537a694795be5d87ef7106d

    SHA1

    538030845680a8be8219618daee29e368dc1e06c

    SHA256

    8c35dcc975a5c7c687686a3970306452476d17a89787bc5bd3bf21b9de0d36a5

    SHA512

    7b6ae20515fb6b13701df422cbb0844d26c8a98087b2758427781f0bf11eb9ec5da029096e42960bf99ddd3d4f817db6e29ac172039110df6ea92547d331db4c

  • C:\Users\ALLUSE~1\PACKAG~1\{4D8DC~1\VC_RED~1.EXE
    MD5

    24179b4581907abfef8a55ab41c97999

    SHA1

    e4de417476f43da4405f4340ebf6044f6b094337

    SHA256

    a8b960bcbf3045bedd2f6b59c521837ac4aee9c566001c01d8fc43b15b1dfdc7

    SHA512

    6fb0621ea3755db8af58d86bdc4f5324ba0832790e83375d07c378b6f569a109e14a78ed7d1a5e105b7a005194a31bd7771f3008b2026a0938d695e62f6ea6b8

  • C:\Users\ALLUSE~1\PACKAG~1\{57A73~1\VC_RED~1.EXE
    MD5

    4cf3954a39b7e27f364cbb5e58a3a957

    SHA1

    4498a5dea907da2b85e30bf6a1ebddfbaba2eb18

    SHA256

    f24a6d80aff3ee9ee65a609376d1aa3fdb3a034847ebbc0e4e65ff20ab0893fb

    SHA512

    d7dd8c5ad15dda561ae309fbf18e5ad2e852e951e937ea062cc0cb035df74ecb5a9aa636c6813aef37271268cedb1b3c5d39a8b6519fd54f5346445a2a9ef57d

  • C:\Users\ALLUSE~1\PACKAG~1\{61087~1\VCREDI~1.EXE
    MD5

    31685b921fcd439185495e2bdc8c5ebf

    SHA1

    5d171dd1f2fc2ad55bde2e3c16a58abff07ae636

    SHA256

    4798142637154af13e3ed0e0b508459cf71d2dc1ae2f80f8439d14975617e05c

    SHA512

    04a414a89e02f9541b0728c82c38f0c64af1e95074f00699a48c82a5e99f4a6488fd7914ff1fa7a5bf383ce85d2dceab7f686d4ee5344ab36e7b9f13ceec9e7f

  • C:\Users\ALLUSE~1\PACKAG~1\{CA675~1\VCREDI~1.EXE
    MD5

    87f15006aea3b4433e226882a56f188d

    SHA1

    e3ad6beb8229af62b0824151dbf546c0506d4f65

    SHA256

    8d0045c74270281c705009d49441167c8a51ac70b720f84ff941b39fad220919

    SHA512

    b01a8af6dc836044d2adc6828654fa7a187c3f7ffe2a4db4c73021be6d121f9c1c47b1643513c3f25c0e1b5123b8ce2dc78b2ca8ce638a09c2171f158762c7c1

  • C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE
    MD5

    07e194ce831b1846111eb6c8b176c86e

    SHA1

    b9c83ec3b0949cb661878fb1a8b43a073e15baf1

    SHA256

    d882f673ddf40a7ea6d89ce25e4ee55d94a5ef0b5403aa8d86656fd960d0e4ac

    SHA512

    55f9b6d3199aa60d836b6792ae55731236fb2a99c79ce8522e07e579c64eabb88fa413c02632deb87a361dd8490361aa1424beed2e01ba28be220f8c676a1bb5

  • C:\Users\Admin\AppData\Local\Temp\3582-490\0e98fe18a87242d8365fa52a20b9532885f31ade09576016b033d151e5051648.exe
    MD5

    c02a182ecf0d7366c820c570d425efce

    SHA1

    9058741221c6fc2841db95d5b063d28a99dbb046

    SHA256

    91e5848af3d0ff75c5f9f6ef93b3aa0381c8ebee2cb8b525434a93e8f1ff004e

    SHA512

    fc9ab6ba6a85e1ae75036b49857e5afac242d59343a432c285adae8e997b0b6ff23accd680a3827d302e32e93807254c9e0009ad079e304b0108d5bc124a73a6

  • C:\Users\Admin\AppData\Local\Temp\3582-490\0e98fe18a87242d8365fa52a20b9532885f31ade09576016b033d151e5051648.exe
    MD5

    c02a182ecf0d7366c820c570d425efce

    SHA1

    9058741221c6fc2841db95d5b063d28a99dbb046

    SHA256

    91e5848af3d0ff75c5f9f6ef93b3aa0381c8ebee2cb8b525434a93e8f1ff004e

    SHA512

    fc9ab6ba6a85e1ae75036b49857e5afac242d59343a432c285adae8e997b0b6ff23accd680a3827d302e32e93807254c9e0009ad079e304b0108d5bc124a73a6

  • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\TEMPLA~1\MST4LF~1.EXE
    MD5

    053778713819beab3df309df472787cd

    SHA1

    99c7b5827df89b4fafc2b565abed97c58a3c65b8

    SHA256

    f999357a17e672e87fbed66d14ba2bebd6fb04e058a1aae0f0fdc49a797f58fe

    SHA512

    35a00001c718e36e956f49879e453f18f5d6c66bbc6a3e1aad6d5dd1109904539b173c3cad0009bc021d4513a67ae0003282f7d14b7aecaa20e59a22c6ad0ddb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\mst4lfpj.gb4.exe
    MD5

    053778713819beab3df309df472787cd

    SHA1

    99c7b5827df89b4fafc2b565abed97c58a3c65b8

    SHA256

    f999357a17e672e87fbed66d14ba2bebd6fb04e058a1aae0f0fdc49a797f58fe

    SHA512

    35a00001c718e36e956f49879e453f18f5d6c66bbc6a3e1aad6d5dd1109904539b173c3cad0009bc021d4513a67ae0003282f7d14b7aecaa20e59a22c6ad0ddb

  • C:\Windows\svchost.com
    MD5

    36fd5e09c417c767a952b4609d73a54b

    SHA1

    299399c5a2403080a5bf67fb46faec210025b36d

    SHA256

    980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2

    SHA512

    1813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92

  • C:\Windows\svchost.com
    MD5

    36fd5e09c417c767a952b4609d73a54b

    SHA1

    299399c5a2403080a5bf67fb46faec210025b36d

    SHA256

    980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2

    SHA512

    1813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92

  • C:\odt\OFFICE~1.EXE
    MD5

    02c3d242fe142b0eabec69211b34bc55

    SHA1

    ea0a4a6d6078b362f7b3a4ad1505ce49957dc16e

    SHA256

    2a1ed24be7e3859b46ec3ebc316789ead5f12055853f86a9656e04b4bb771842

    SHA512

    0efb08492eaaa2e923beddc21566e98fbbef3a102f9415ff310ec616f5c84fd2ba3a7025b05e01c0bdf37e5e2f64dfd845f9254a376144cc7d827e7577dbb099

  • memory/1168-132-0x0000000000D60000-0x00000000010A2000-memory.dmp
    Filesize

    3.3MB

  • memory/1168-133-0x0000000073B6E000-0x0000000073B6F000-memory.dmp
    Filesize

    4KB

  • memory/1168-136-0x0000000001A90000-0x0000000001A91000-memory.dmp
    Filesize

    4KB

  • memory/1168-137-0x000000000A780000-0x000000000AD24000-memory.dmp
    Filesize

    5.6MB