Analysis
-
max time kernel
91s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
29-05-2022 09:04
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220414-en
General
-
Target
tmp.exe
-
Size
377KB
-
MD5
c547b83eb19d7b7f3b452bb00f3af774
-
SHA1
9aa5a18b9cfaeccc91fe7f4d8015c10ed44bce92
-
SHA256
741d106ef5db0d61b16df07eecb4054c432c2e152c25d3d3b6512148de1049ac
-
SHA512
f3796167ba7fbc3f5d178da3588e2987cabc54c33b10d1bc5fd8cd24237bd972eac6b43c38bc1588828a8ca0f53cd328c5c591f6d2488319a9a26e9ac4a95442
Malware Config
Signatures
-
Detect Neshta Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1528-60-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral1/memory/1528-62-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral1/memory/1528-63-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
tmp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" tmp.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 1 IoCs
Processes:
tmp.exepid process 836 tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
tmp.exepid process 1528 tmp.exe 1528 tmp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
tmp.exedescription ioc process File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe tmp.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE tmp.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE tmp.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe tmp.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE tmp.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe tmp.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe tmp.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE tmp.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE tmp.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE tmp.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE tmp.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE tmp.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe tmp.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe tmp.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE tmp.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE tmp.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE tmp.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe tmp.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe tmp.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe tmp.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe tmp.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE tmp.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE tmp.exe -
Drops file in Windows directory 1 IoCs
Processes:
tmp.exedescription ioc process File opened for modification C:\Windows\svchost.com tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
tmp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" tmp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
tmp.exedescription pid process target process PID 1528 wrote to memory of 836 1528 tmp.exe tmp.exe PID 1528 wrote to memory of 836 1528 tmp.exe tmp.exe PID 1528 wrote to memory of 836 1528 tmp.exe tmp.exe PID 1528 wrote to memory of 836 1528 tmp.exe tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\tmp.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\tmp.exe"2⤵
- Executes dropped EXE
PID:836
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD54724e888466f75a9342825103977822a
SHA126bd7335b3783fc5d1a69fabebcf164e3895b773
SHA2566cb4c36711b19010654bf683a2ced1c3e8fb17710a9a7d08a7488bc0e2bfb273
SHA512785f3d5c2d3ad6904261e3149c1852c662886f430cb48d8a2332c9c932192673a247471e38b90b87f591aa39817ef5b454307ad82f588318360ca5779d735478
-
Filesize
336KB
MD54724e888466f75a9342825103977822a
SHA126bd7335b3783fc5d1a69fabebcf164e3895b773
SHA2566cb4c36711b19010654bf683a2ced1c3e8fb17710a9a7d08a7488bc0e2bfb273
SHA512785f3d5c2d3ad6904261e3149c1852c662886f430cb48d8a2332c9c932192673a247471e38b90b87f591aa39817ef5b454307ad82f588318360ca5779d735478
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
336KB
MD54724e888466f75a9342825103977822a
SHA126bd7335b3783fc5d1a69fabebcf164e3895b773
SHA2566cb4c36711b19010654bf683a2ced1c3e8fb17710a9a7d08a7488bc0e2bfb273
SHA512785f3d5c2d3ad6904261e3149c1852c662886f430cb48d8a2332c9c932192673a247471e38b90b87f591aa39817ef5b454307ad82f588318360ca5779d735478