Analysis

  • max time kernel
    91s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-05-2022 00:57

General

  • Target

    9731bcb4be13a02b6b0c2697431d1c0851e41efbe8e4784b98b6947fe1257bda.exe

  • Size

    306KB

  • MD5

    1b2fea5d24b3d85328af477a087530da

  • SHA1

    246d81f1cf1c919fbd4a46bd8fb0d92587db59b8

  • SHA256

    9731bcb4be13a02b6b0c2697431d1c0851e41efbe8e4784b98b6947fe1257bda

  • SHA512

    c721fc9f135c386240a713aaeeb20e6f25b863f14bb419660ccdbcb8045db4c5f266e25b9baf594bd065c9ea683f86e7189d3a73d096689d4ea7a6e14e774d7c

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9731bcb4be13a02b6b0c2697431d1c0851e41efbe8e4784b98b6947fe1257bda.exe
    "C:\Users\Admin\AppData\Local\Temp\9731bcb4be13a02b6b0c2697431d1c0851e41efbe8e4784b98b6947fe1257bda.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4828
    • C:\Users\Admin\AppData\Local\Temp\3582-490\9731bcb4be13a02b6b0c2697431d1c0851e41efbe8e4784b98b6947fe1257bda.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\9731bcb4be13a02b6b0c2697431d1c0851e41efbe8e4784b98b6947fe1257bda.exe"
      2⤵
      • Executes dropped EXE
      PID:4640
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 1144
        3⤵
        • Program crash
        PID:1220
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 4640 -ip 4640
    1⤵
      PID:4428

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\3582-490\9731bcb4be13a02b6b0c2697431d1c0851e41efbe8e4784b98b6947fe1257bda.exe

      Filesize

      266KB

      MD5

      60e683e53b3ab3d96d1dcd5ae2c15ffb

      SHA1

      0ed0d483458721f725f767358bfcd54ea3521a23

      SHA256

      d07226f508c2f21d5edad1bc9ffbb04b893c4cb1b877b2ee6b35a01e5e6c84b7

      SHA512

      842e5b63e7a818b28d3e1839a9b6c824cdb4ed92c1457f8ce52e4fcef3ebba2124527a36ab82ab3f13976b2bbee2050763daa8921986a286bcb01e60fa2c7965

    • C:\Users\Admin\AppData\Local\Temp\3582-490\9731bcb4be13a02b6b0c2697431d1c0851e41efbe8e4784b98b6947fe1257bda.exe

      Filesize

      266KB

      MD5

      60e683e53b3ab3d96d1dcd5ae2c15ffb

      SHA1

      0ed0d483458721f725f767358bfcd54ea3521a23

      SHA256

      d07226f508c2f21d5edad1bc9ffbb04b893c4cb1b877b2ee6b35a01e5e6c84b7

      SHA512

      842e5b63e7a818b28d3e1839a9b6c824cdb4ed92c1457f8ce52e4fcef3ebba2124527a36ab82ab3f13976b2bbee2050763daa8921986a286bcb01e60fa2c7965

    • memory/4640-130-0x0000000000000000-mapping.dmp

    • memory/4640-133-0x0000000000EE0000-0x0000000000F2C000-memory.dmp

      Filesize

      304KB