Analysis

  • max time kernel
    91s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-07-2022 16:14

General

  • Target

    ea827737a0330d253102ed2ae77218147c741cd83e69e3f04ed4c165504bfc66.exe

  • Size

    5.1MB

  • MD5

    3bd3dbf2413f58ebc8c14f70cb8fa971

  • SHA1

    f4b97872e84e7686a81f0a6024142b58eddaf9df

  • SHA256

    ea827737a0330d253102ed2ae77218147c741cd83e69e3f04ed4c165504bfc66

  • SHA512

    7b65386c04693b12738c0ef6011857266ef39dc711f60d49af169b2874666a49eeab53debc59ddf03ac803c30b020ccfaaf671b40222f9316a675573424189e1

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea827737a0330d253102ed2ae77218147c741cd83e69e3f04ed4c165504bfc66.exe
    "C:\Users\Admin\AppData\Local\Temp\ea827737a0330d253102ed2ae77218147c741cd83e69e3f04ed4c165504bfc66.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    PID:4312

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4312-130-0x0000000000400000-0x0000000000C5C000-memory.dmp

    Filesize

    8.4MB

  • memory/4312-132-0x0000000000400000-0x0000000000C5C000-memory.dmp

    Filesize

    8.4MB

  • memory/4312-133-0x0000000000400000-0x0000000000C5C000-memory.dmp

    Filesize

    8.4MB

  • memory/4312-134-0x0000000000400000-0x0000000000C5C000-memory.dmp

    Filesize

    8.4MB