Analysis

  • max time kernel
    3s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-05-2022 00:17

General

  • Target

    ce927bc414df3289b825ae68077068d475af2bc807b229920fc854b4e3f9bbbd.exe

  • Size

    705KB

  • MD5

    be57499ac57c784d6d4bf4a766d5a5fc

  • SHA1

    7d3c5dffa38ac47cd74ca5bf72acd4e3226eca17

  • SHA256

    ce927bc414df3289b825ae68077068d475af2bc807b229920fc854b4e3f9bbbd

  • SHA512

    55eca7b652fe7b325aa01dc254c83be5e6187a86a03cbf93c5a0ab3ebba17c086757ae31f723567e22cb2c2ecd87567ccd6a225f8cd2b9b5bb4c93ee45ce5d8b

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce927bc414df3289b825ae68077068d475af2bc807b229920fc854b4e3f9bbbd.exe
    "C:\Users\Admin\AppData\Local\Temp\ce927bc414df3289b825ae68077068d475af2bc807b229920fc854b4e3f9bbbd.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:916
    • C:\Users\Admin\AppData\Local\Temp\3582-490\ce927bc414df3289b825ae68077068d475af2bc807b229920fc854b4e3f9bbbd.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\ce927bc414df3289b825ae68077068d475af2bc807b229920fc854b4e3f9bbbd.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\ce927bc414df3289b825ae68077068d475af2bc807b229920fc854b4e3f9bbbd.exe
    Filesize

    664KB

    MD5

    9dcb19b3515920531152adbfdf2a986b

    SHA1

    ffd239e43a7ceabcc103cc305b80b1cce0cebc2b

    SHA256

    a1f29833644007e48d1ae16781810c264fe75c36139f994f4f65844b7076b17f

    SHA512

    81f36c339943a442a8e57c59bd4454b04ac0f4e0903c8d52ea4fa50b115256189663eba436bf1b028f611a17d2c9f455a13dd65d2f890fc5fea12ed800573154

  • C:\Users\Admin\AppData\Local\Temp\3582-490\ce927bc414df3289b825ae68077068d475af2bc807b229920fc854b4e3f9bbbd.exe
    Filesize

    664KB

    MD5

    9dcb19b3515920531152adbfdf2a986b

    SHA1

    ffd239e43a7ceabcc103cc305b80b1cce0cebc2b

    SHA256

    a1f29833644007e48d1ae16781810c264fe75c36139f994f4f65844b7076b17f

    SHA512

    81f36c339943a442a8e57c59bd4454b04ac0f4e0903c8d52ea4fa50b115256189663eba436bf1b028f611a17d2c9f455a13dd65d2f890fc5fea12ed800573154

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\ce927bc414df3289b825ae68077068d475af2bc807b229920fc854b4e3f9bbbd.exe
    Filesize

    664KB

    MD5

    9dcb19b3515920531152adbfdf2a986b

    SHA1

    ffd239e43a7ceabcc103cc305b80b1cce0cebc2b

    SHA256

    a1f29833644007e48d1ae16781810c264fe75c36139f994f4f65844b7076b17f

    SHA512

    81f36c339943a442a8e57c59bd4454b04ac0f4e0903c8d52ea4fa50b115256189663eba436bf1b028f611a17d2c9f455a13dd65d2f890fc5fea12ed800573154

  • memory/916-54-0x00000000753B1000-0x00000000753B3000-memory.dmp
    Filesize

    8KB

  • memory/956-56-0x0000000000000000-mapping.dmp