Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-07-2022 17:12

General

  • Target

    246743fe9cd9b0b42c14854c9cd38d6e730aea70e872085d18ba2bc51e0ddadc.exe

  • Size

    4.2MB

  • MD5

    13ab78915c0dc681764aeac3de95eaa4

  • SHA1

    b6ed8891cc3e8503b3b704d49ff5f00307e3b9db

  • SHA256

    246743fe9cd9b0b42c14854c9cd38d6e730aea70e872085d18ba2bc51e0ddadc

  • SHA512

    0b2acf48f9a7133c89eeaafe268cdf598ed63c590d9c4760e1038f437ca912b1f2426bb8612bad23c35847fcc6bd2fdd4ba6f6c541d06b7aa5a45dadff3ff11c

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\246743fe9cd9b0b42c14854c9cd38d6e730aea70e872085d18ba2bc51e0ddadc.exe
    "C:\Users\Admin\AppData\Local\Temp\246743fe9cd9b0b42c14854c9cd38d6e730aea70e872085d18ba2bc51e0ddadc.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\3582-490\246743fe9cd9b0b42c14854c9cd38d6e730aea70e872085d18ba2bc51e0ddadc.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\246743fe9cd9b0b42c14854c9cd38d6e730aea70e872085d18ba2bc51e0ddadc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2856
      • C:\Users\Admin\AppData\Local\Temp\is-93SLD.tmp\246743fe9cd9b0b42c14854c9cd38d6e730aea70e872085d18ba2bc51e0ddadc.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-93SLD.tmp\246743fe9cd9b0b42c14854c9cd38d6e730aea70e872085d18ba2bc51e0ddadc.tmp" /SL5="$A004C,4114873,57856,C:\Users\Admin\AppData\Local\Temp\3582-490\246743fe9cd9b0b42c14854c9cd38d6e730aea70e872085d18ba2bc51e0ddadc.exe"
        3⤵
        • Executes dropped EXE
        PID:3360

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\246743fe9cd9b0b42c14854c9cd38d6e730aea70e872085d18ba2bc51e0ddadc.exe
    Filesize

    4.2MB

    MD5

    3d019dd3c613ff7fef771504fc8ee652

    SHA1

    b86da42656874043c01003a559374b3904b95e1e

    SHA256

    ece8551443c5dc0a5bcfc2335edda3a66e5bea17e0274b97b4f4891f4b94456e

    SHA512

    fe69be4fdf90ef62b864f42098bc26b1311dd9adc59d05a2d05b4ae6a5e209fcc578d13fcb263a34034b1b01fe4b50306912db9b596a2ab43a115499fae2071c

  • C:\Users\Admin\AppData\Local\Temp\3582-490\246743fe9cd9b0b42c14854c9cd38d6e730aea70e872085d18ba2bc51e0ddadc.exe
    Filesize

    4.2MB

    MD5

    3d019dd3c613ff7fef771504fc8ee652

    SHA1

    b86da42656874043c01003a559374b3904b95e1e

    SHA256

    ece8551443c5dc0a5bcfc2335edda3a66e5bea17e0274b97b4f4891f4b94456e

    SHA512

    fe69be4fdf90ef62b864f42098bc26b1311dd9adc59d05a2d05b4ae6a5e209fcc578d13fcb263a34034b1b01fe4b50306912db9b596a2ab43a115499fae2071c

  • C:\Users\Admin\AppData\Local\Temp\is-93SLD.tmp\246743fe9cd9b0b42c14854c9cd38d6e730aea70e872085d18ba2bc51e0ddadc.tmp
    Filesize

    697KB

    MD5

    832dab307e54aa08f4b6cdd9b9720361

    SHA1

    ebd007fb7482040ecf34339e4bf917209c1018df

    SHA256

    cc783a04ccbca4edd06564f8ec88fe5a15f1e3bb26cec7de5e090313520d98f3

    SHA512

    358d43522fd460eb1511708e4df22ea454a95e5bc3c4841931027b5fa3fb1dda05d496d8ad0a8b9279b99e6be74220fe243db8f08ef49845e9fb35c350ef4b49

  • memory/2856-130-0x0000000000000000-mapping.dmp
  • memory/2856-132-0x0000000000400000-0x0000000000415000-memory.dmp
    Filesize

    84KB

  • memory/2856-137-0x0000000000400000-0x0000000000415000-memory.dmp
    Filesize

    84KB

  • memory/3360-135-0x0000000000000000-mapping.dmp