Analysis

  • max time kernel
    151s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    08-06-2022 16:37

General

  • Target

    18ae5da058f597b41c996afbcc7611f30f51a82303e01e706874f14035fbf21d.exe

  • Size

    738KB

  • MD5

    74f42836efd1b8886031d90d850c0d0d

  • SHA1

    8414d9f0fdc45fad047f13da23c6d5de140e61a7

  • SHA256

    18ae5da058f597b41c996afbcc7611f30f51a82303e01e706874f14035fbf21d

  • SHA512

    6dfdae8fe68ade27108b4d46e9c42125f1e64e565eb38d3e8bcf9911f8e5a753e44890b459f22c5af96160f510dc4cb9ab80d5e9d6e83f5d96b6bd41209a360b

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18ae5da058f597b41c996afbcc7611f30f51a82303e01e706874f14035fbf21d.exe
    "C:\Users\Admin\AppData\Local\Temp\18ae5da058f597b41c996afbcc7611f30f51a82303e01e706874f14035fbf21d.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Users\Admin\AppData\Local\Temp\3582-490\18ae5da058f597b41c996afbcc7611f30f51a82303e01e706874f14035fbf21d.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\18ae5da058f597b41c996afbcc7611f30f51a82303e01e706874f14035fbf21d.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\18ae5da058f597b41c996afbcc7611f30f51a82303e01e706874f14035fbf21d.exe

    Filesize

    697KB

    MD5

    16bc95aaa13c133a0e13461c95ac699a

    SHA1

    7c26f1877461c0327d826dc30e8426c8e1ac52c6

    SHA256

    6b19aaa821631c4a5ca13b25e2abfbf1ea863211bb82239050b0f66b53c357e1

    SHA512

    4093fc1eaef8b7ea25781a7ab58c26a76e14967de896f49bcba55bfe45d354223579bf2542f71c90d6c9b12da578e459389b98f0a66486c87631e12bb5f6148c

  • C:\Users\Admin\AppData\Local\Temp\3582-490\18ae5da058f597b41c996afbcc7611f30f51a82303e01e706874f14035fbf21d.exe

    Filesize

    697KB

    MD5

    16bc95aaa13c133a0e13461c95ac699a

    SHA1

    7c26f1877461c0327d826dc30e8426c8e1ac52c6

    SHA256

    6b19aaa821631c4a5ca13b25e2abfbf1ea863211bb82239050b0f66b53c357e1

    SHA512

    4093fc1eaef8b7ea25781a7ab58c26a76e14967de896f49bcba55bfe45d354223579bf2542f71c90d6c9b12da578e459389b98f0a66486c87631e12bb5f6148c

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\18ae5da058f597b41c996afbcc7611f30f51a82303e01e706874f14035fbf21d.exe

    Filesize

    697KB

    MD5

    16bc95aaa13c133a0e13461c95ac699a

    SHA1

    7c26f1877461c0327d826dc30e8426c8e1ac52c6

    SHA256

    6b19aaa821631c4a5ca13b25e2abfbf1ea863211bb82239050b0f66b53c357e1

    SHA512

    4093fc1eaef8b7ea25781a7ab58c26a76e14967de896f49bcba55bfe45d354223579bf2542f71c90d6c9b12da578e459389b98f0a66486c87631e12bb5f6148c

  • \Users\Admin\AppData\Local\Temp\nst5DFA.tmp\System.dll

    Filesize

    9KB

    MD5

    ae182dc797cd9ad2c025066692fc041b

    SHA1

    7ee5f057be9febfa77f698a1b12213a5bbdd4742

    SHA256

    b214f6d6c4d27f749105f7e8846a7c2d475dbcc966876370b5a7dab6e4b8a471

    SHA512

    2a9a200d067df47638a86f4f058c6d78fb59bd064c65650cae5022a62a3714e33f93f6af1dd599fda180d5af18f432835a1f909807f4fb459aa9d6c24e3fbab7

  • memory/1908-54-0x0000000075FC1000-0x0000000075FC3000-memory.dmp

    Filesize

    8KB

  • memory/2044-56-0x0000000000000000-mapping.dmp