Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 01:15
Static task
static1
Behavioral task
behavioral1
Sample
e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe
Resource
win10v2004-20220414-en
General
-
Target
e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe
-
Size
2.4MB
-
MD5
66b936cb3969b8801feafb1dae2152dd
-
SHA1
4988d0840f4a7867bcf2141ab03b2fe0261e0c2e
-
SHA256
e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f
-
SHA512
2efa5b2fefd644c933f04a8f6ed8862a88e7e1514be76620c7a242dbd3d43d03e2ecaef1b501ccab7756167fd18688d1c1122461aac1071476b1585a01f08d41
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 1 IoCs
Processes:
e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exepid process 1748 e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe -
Loads dropped DLL 1 IoCs
Processes:
e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exepid process 1352 e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe -
Drops file in Windows directory 1 IoCs
Processes:
e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exedescription ioc process File opened for modification C:\Windows\svchost.com e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exedescription pid process target process PID 1352 wrote to memory of 1748 1352 e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe PID 1352 wrote to memory of 1748 1352 e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe PID 1352 wrote to memory of 1748 1352 e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe PID 1352 wrote to memory of 1748 1352 e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe"C:\Users\Admin\AppData\Local\Temp\e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\3582-490\e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe"2⤵
- Executes dropped EXE
PID:1748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3582-490\e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe
Filesize667KB
MD57d59f02c0c1a4cf9c55480c169affb72
SHA179b111ba23c5fdb71e41889c60a3f8450120ca38
SHA2561c385ec39739f195220de77067b6b382e33e5a7daff6a3db5e1b035fcb8ba891
SHA51215ce62af9173dd05cb9c039a78ef0669997e42ca1e8434409a4dcef00ffc924db76960d50bce2cace9ba217b446b66158bf53ff7466b7ecb64d72c4553303493
-
C:\Users\Admin\AppData\Local\Temp\3582-490\e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe
Filesize710KB
MD5029c97a8ac9e6277d56fe5685f299905
SHA17546b2d5ed72b686185ea8a239c4486a08d580e0
SHA2564e1ccec76435bc8435d17a0b318e779d3fd331c7c9155620fb774639984d4867
SHA512b5194ba42ee92c028b5017b2bdebf10a8235034b3713fe2ae111226a6f2e2bd95048f585717680f2dc4edde64066774d416c3a42ef616ff49dd1fee89503d46d
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
\Users\Admin\AppData\Local\Temp\3582-490\e7000e328ff4f4c4aca5e0f096cd873be6225ffd694f4723f2e48b5288849b3f.exe
Filesize637KB
MD5a4172081d6ced840834eb37035074862
SHA10ebaf93512c23336207f1eb16f4a163998fccbb7
SHA256c409c6ff756889c6b7889899326783260ca0b196d5465b18e2b4a04c1453df11
SHA512416729dc7e5c4e84f3d714ab37cad82d485b4622158809c8b021f4612e25ee95d29300b8beb0835d4ac76040118c114a8887e879abb37a7cdb6f435a51798898