Analysis

  • max time kernel
    101s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-05-2022 02:15

General

  • Target

    d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd.exe

  • Size

    5.1MB

  • MD5

    7ee9f8c7cb8eac1f789629fc5cf9d925

  • SHA1

    9bea3ec9a088e4b595f3f87a01298465f980d865

  • SHA256

    d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd

  • SHA512

    344d3c8396dac5a1a793508157268adf6aa5f513f29e0b734d9f58527e6627aee0c607d806df25264baa97c8f1982b8c92b4b4b1a9bd48f63f7bf5152625805f

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd.exe
    "C:\Users\Admin\AppData\Local\Temp\d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Users\Admin\AppData\Local\Temp\3582-490\d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd.exe"
      2⤵
      • Executes dropped EXE
      PID:920
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 1052
        3⤵
        • Program crash
        PID:1484
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 920 -ip 920
    1⤵
      PID:2936

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\3582-490\d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd.exe

      Filesize

      5.0MB

      MD5

      5d1039fe523572cfedde563906f27224

      SHA1

      c733d04d03bfe5bc205026917069989b748a2ea5

      SHA256

      c700605982053e674d26af9de9391f778936b34496c9e60a0c7affc05bd6687e

      SHA512

      f758b433c01186846d027fc058c0b947ac23b41799be2518f8920f9967c8f0c06aadddf0458db7766a9e94898b5a2434f35d0a5cc09a50f3c5f0e30cb75908da

    • C:\Users\Admin\AppData\Local\Temp\3582-490\d74b5fb7e713594ef98658cf083aa9b63bdcf63e30382a4c170a445ca9a284fd.exe

      Filesize

      5.0MB

      MD5

      5d1039fe523572cfedde563906f27224

      SHA1

      c733d04d03bfe5bc205026917069989b748a2ea5

      SHA256

      c700605982053e674d26af9de9391f778936b34496c9e60a0c7affc05bd6687e

      SHA512

      f758b433c01186846d027fc058c0b947ac23b41799be2518f8920f9967c8f0c06aadddf0458db7766a9e94898b5a2434f35d0a5cc09a50f3c5f0e30cb75908da

    • memory/920-130-0x0000000000000000-mapping.dmp

    • memory/920-133-0x00000000008F0000-0x0000000000E00000-memory.dmp

      Filesize

      5.1MB