Analysis

  • max time kernel
    90s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    25-06-2022 01:31

General

  • Target

    374c55eb20213eccb0e6e4628fe5b037f7671825c636012a02b780742078b58d.exe

  • Size

    6.8MB

  • MD5

    4dce371ad817a4ff4f19c7963a63ad6d

  • SHA1

    603fa53519041f7e8d829dd70701283dfe4aa5ee

  • SHA256

    374c55eb20213eccb0e6e4628fe5b037f7671825c636012a02b780742078b58d

  • SHA512

    b49fe6569420a1bcff3408967d4b7f3fd80d9e50ba2a0665dfd2c95556e4d025ca3154fdafef9039182541497c821856b1e3f8b884c013a05ad1876f076891b2

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\374c55eb20213eccb0e6e4628fe5b037f7671825c636012a02b780742078b58d.exe
    "C:\Users\Admin\AppData\Local\Temp\374c55eb20213eccb0e6e4628fe5b037f7671825c636012a02b780742078b58d.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Users\Admin\AppData\Local\Temp\3582-490\374c55eb20213eccb0e6e4628fe5b037f7671825c636012a02b780742078b58d.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\374c55eb20213eccb0e6e4628fe5b037f7671825c636012a02b780742078b58d.exe"
      2⤵
      • Executes dropped EXE
      PID:4672
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 1104
        3⤵
        • Program crash
        PID:4848
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4672 -ip 4672
    1⤵
      PID:3552

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Change Default File Association

    1
    T1042

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\3582-490\374c55eb20213eccb0e6e4628fe5b037f7671825c636012a02b780742078b58d.exe
      Filesize

      6.8MB

      MD5

      448e20b4a21d220b6fe2e3338d434cd5

      SHA1

      553e4d46ac8ecde1ab5fa11ffc58a8168b451a3c

      SHA256

      311e5fa078aa584754402addb135b20db472578ff033ba02c36c968d63bb9c9f

      SHA512

      d6198501dcfc39a94472d3c3ec8d4a6fd2a27591ecb6486d541ffefb80d06a44d284e73a3b73632593772947a5b116f485e10dacca3a65ba885accc52b4be664

    • C:\Users\Admin\AppData\Local\Temp\3582-490\374c55eb20213eccb0e6e4628fe5b037f7671825c636012a02b780742078b58d.exe
      Filesize

      6.8MB

      MD5

      448e20b4a21d220b6fe2e3338d434cd5

      SHA1

      553e4d46ac8ecde1ab5fa11ffc58a8168b451a3c

      SHA256

      311e5fa078aa584754402addb135b20db472578ff033ba02c36c968d63bb9c9f

      SHA512

      d6198501dcfc39a94472d3c3ec8d4a6fd2a27591ecb6486d541ffefb80d06a44d284e73a3b73632593772947a5b116f485e10dacca3a65ba885accc52b4be664

    • memory/4672-130-0x0000000000000000-mapping.dmp
    • memory/4672-133-0x00000000005A0000-0x0000000000C6C000-memory.dmp
      Filesize

      6.8MB

    • memory/4672-134-0x000000000E440000-0x000000000E9E4000-memory.dmp
      Filesize

      5.6MB

    • memory/4672-135-0x000000000DF70000-0x000000000E002000-memory.dmp
      Filesize

      584KB

    • memory/4672-136-0x000000000DF10000-0x000000000DF1A000-memory.dmp
      Filesize

      40KB