Analysis

  • max time kernel
    104s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-05-2022 03:34

General

  • Target

    b9cf68589937f874c1b247cacec8f6e5ea21ed9f7a91f262a19c9fd1323f99b1.exe

  • Size

    802KB

  • MD5

    0a0f18968171592d780c37040b0cc8f7

  • SHA1

    b3ac11608c14718a2dda2e473404ad3be148381c

  • SHA256

    b9cf68589937f874c1b247cacec8f6e5ea21ed9f7a91f262a19c9fd1323f99b1

  • SHA512

    d26b9c704da351a78009636792653a57d3fa763a6fdb99c61d04ff66b9ce340cb39ee1dc795270dccf786e3a9a6df725eea4437bb673f622faa192f87f34bc06

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9cf68589937f874c1b247cacec8f6e5ea21ed9f7a91f262a19c9fd1323f99b1.exe
    "C:\Users\Admin\AppData\Local\Temp\b9cf68589937f874c1b247cacec8f6e5ea21ed9f7a91f262a19c9fd1323f99b1.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Users\Admin\AppData\Local\Temp\3582-490\b9cf68589937f874c1b247cacec8f6e5ea21ed9f7a91f262a19c9fd1323f99b1.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\b9cf68589937f874c1b247cacec8f6e5ea21ed9f7a91f262a19c9fd1323f99b1.exe"
      2⤵
      • Executes dropped EXE
      PID:1976
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1976 -s 804
        3⤵
        • Program crash
        PID:4804
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 432 -p 1976 -ip 1976
    1⤵
      PID:3188

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\3582-490\b9cf68589937f874c1b247cacec8f6e5ea21ed9f7a91f262a19c9fd1323f99b1.exe
      Filesize

      762KB

      MD5

      88cfb214afe57fc40a580f62d6a0e11b

      SHA1

      3f1be26a5846781fc3226330454ff558a7cbdd93

      SHA256

      e78ffec8206e64a0d608381b03a06bdf648971c2cb514bec2ea818969e3fd4f1

      SHA512

      8a33e7328a692bc3ad210f3b3264b1d48df908d27fe82bfbe68179fea52ac304bc47c13410748a2561f9ae45c4dba853788b230f34a18ec14fafe591feb98393

    • C:\Users\Admin\AppData\Local\Temp\3582-490\b9cf68589937f874c1b247cacec8f6e5ea21ed9f7a91f262a19c9fd1323f99b1.exe
      Filesize

      762KB

      MD5

      88cfb214afe57fc40a580f62d6a0e11b

      SHA1

      3f1be26a5846781fc3226330454ff558a7cbdd93

      SHA256

      e78ffec8206e64a0d608381b03a06bdf648971c2cb514bec2ea818969e3fd4f1

      SHA512

      8a33e7328a692bc3ad210f3b3264b1d48df908d27fe82bfbe68179fea52ac304bc47c13410748a2561f9ae45c4dba853788b230f34a18ec14fafe591feb98393

    • memory/1976-130-0x0000000000000000-mapping.dmp
    • memory/1976-133-0x0000000000600000-0x00000000006C4000-memory.dmp
      Filesize

      784KB

    • memory/1976-134-0x00007FFECCC70000-0x00007FFECD731000-memory.dmp
      Filesize

      10.8MB