Analysis

  • max time kernel
    4s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-05-2022 02:15

General

  • Target

    d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd.exe

  • Size

    5.1MB

  • MD5

    7ee9f8c7cb8eac1f789629fc5cf9d925

  • SHA1

    9bea3ec9a088e4b595f3f87a01298465f980d865

  • SHA256

    d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd

  • SHA512

    344d3c8396dac5a1a793508157268adf6aa5f513f29e0b734d9f58527e6627aee0c607d806df25264baa97c8f1982b8c92b4b4b1a9bd48f63f7bf5152625805f

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd.exe
    "C:\Users\Admin\AppData\Local\Temp\d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Users\Admin\AppData\Local\Temp\3582-490\d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:960
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 960 -s 652
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1212

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd.exe

    Filesize

    1.5MB

    MD5

    d54e726382449172f57f050a40fbb524

    SHA1

    da5621d4ea04f273a2595e2396add5978a551cc4

    SHA256

    48f1534affeb9e3eed45251ce07cea6646cde84ed8d0ab439518a7d16a7b3f91

    SHA512

    a60cb684650e9ee58ebd06185e211902a158d68a3eaf83630f899e4780abd956bcb6a9fb6516292c09d452ae9fb670ad6d5ccbe754a3e70959e162dbe5f1f39e

  • C:\Users\Admin\AppData\Local\Temp\3582-490\d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd.exe

    Filesize

    1.5MB

    MD5

    0aeb51b8d4dc58fb41e80ee9488f7885

    SHA1

    cdf6ba6854ce0ba5dc445e3b415e6f3872046058

    SHA256

    04a21ae9ca9ec013c1cf3879b1797767187621d331770271c49234aaa81cec76

    SHA512

    9531f638308ddecd945c761ca11433b4f6539944809df62d6e0bb753161204d9669a1373b86c342cd64cd51d6230d21787b169145d8534459025c76ad1c87449

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd.exe

    Filesize

    1.9MB

    MD5

    8f65f7a03e15e70df01cc714a38feab1

    SHA1

    b27e2f9ad4b638050e650a719942077ac11cc77e

    SHA256

    2a5bc82612625f973beaf054e89b4b6cbd11fd810190cd1e721f4354136e2b95

    SHA512

    5fdd9eb89ae4f3a72763d550c6a0c17f4686879455a3e5590efa2c54f721b9ff184cc602fe716fb4ca17707feb2ca9e39c6a048eb62b7fa9e24e7fd7e1509fc3

  • \Users\Admin\AppData\Local\Temp\3582-490\d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd.exe

    Filesize

    1.9MB

    MD5

    41e7b3a25ed9dcd7c6f5fb72402ec0f5

    SHA1

    491652ac320988213d3aa28222cb40d4a2e533af

    SHA256

    4edd5c1a67308e773b9ba2478a30757160645ca5472bc42556b401f7e325208d

    SHA512

    357aa88b988167b5b54da92c44c73613d314d63847e0ac04125f7b9e83c6b9dc9458cc8cae8b5e87eb82020a3d5929f7cd24b6750a1ad5e896674424b77a5f55

  • \Users\Admin\AppData\Local\Temp\3582-490\d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd.exe

    Filesize

    1.9MB

    MD5

    58dc3d75b2412b30cb93339dab38cc3e

    SHA1

    fed4fb03d272f7d86d7cb5e22edefe7a6511b362

    SHA256

    db6b103547e4a41f2c4a056c9dee22d51463d061bc13df0f92dac52bb6b05b2f

    SHA512

    36c66b040d2122b8a8be43562d05f8ab9e114801e8b24a22415eaf8ea6bf79834b9b7e22d60565407e1d1d892a0bd991214f6a10474f5942cfbb10b868af1010

  • \Users\Admin\AppData\Local\Temp\3582-490\d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd.exe

    Filesize

    2.1MB

    MD5

    82d87efd4feb125a2043333355c2ed1c

    SHA1

    e322cadb27e847abb1b85dc21f39aaa6c6e57b80

    SHA256

    c60ab294af25257d50c7d406403ba3f78234931c5b1623c21ff2cb589dd24603

    SHA512

    98a61ddbc294b6a1b17cfb11760396bd04d20b93a7528407af3a600cc8eb6866c0214377429f86bb282bbae984c27bf8a30eba9cbc08e0ad464805cf7531f614

  • \Users\Admin\AppData\Local\Temp\3582-490\d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd.exe

    Filesize

    1.7MB

    MD5

    970118934c969d8eaf2f6622eaab6ce9

    SHA1

    74963e216e3f99289f07b8dd942b34cbd5741d23

    SHA256

    2efaee4b586013bb2e1aa640f1d3569e1577a373609bbc1977d97e912d889407

    SHA512

    f29637cd178e5f5d9ac52ed07c752ea391010b0602cbdafef70f0e4d6fa767c9cef093ce1af92073e32c411df1793cd3974da654357a5c22ca6a804ec55bf2a3

  • \Users\Admin\AppData\Local\Temp\3582-490\d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd.exe

    Filesize

    2.0MB

    MD5

    8f3d2c9faa0db72cbe3159b44a161164

    SHA1

    c9016f2f7f5baca18427e537f0bec35a5645cd91

    SHA256

    55a536fb684d6a1b087e2fedc0b0558fda193dfd4b1b2a5b39565dde26ecb7a9

    SHA512

    4fcf067541cce699ef01c90ba1962c57f4eb23cfc53802b5ea975024fb213abe4f9e6609a85971dd81fd3e6f97c2d87191144dc34d3fc4763195eb21a827aa57

  • memory/316-54-0x00000000769D1000-0x00000000769D3000-memory.dmp

    Filesize

    8KB

  • memory/960-59-0x00000000011A0000-0x00000000016B0000-memory.dmp

    Filesize

    5.1MB

  • memory/960-56-0x0000000000000000-mapping.dmp

  • memory/1212-62-0x0000000000000000-mapping.dmp