Analysis

  • max time kernel
    89s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    12-07-2022 13:00

General

  • Target

    4a83d02a5cb7dee158e517690f67ab4b2dc6a2d554425f9c3aeae171546b48cf.exe

  • Size

    188KB

  • MD5

    194de9547b3d794b2fa14072a1d43efe

  • SHA1

    dc398f176adde0704971ebf867af869725603298

  • SHA256

    4a83d02a5cb7dee158e517690f67ab4b2dc6a2d554425f9c3aeae171546b48cf

  • SHA512

    5d94d6cf91f896bcb191d1110735177831a1aeea967a24a69e73f59b6c5e6a5e235074edc0ed86b5850c4ee8e4eecc5d2cc5a852ea519bf022b9aba15db02673

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a83d02a5cb7dee158e517690f67ab4b2dc6a2d554425f9c3aeae171546b48cf.exe
    "C:\Users\Admin\AppData\Local\Temp\4a83d02a5cb7dee158e517690f67ab4b2dc6a2d554425f9c3aeae171546b48cf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4552
    • C:\Users\Admin\AppData\Local\Temp\4a83d02a5cb7dee158e517690f67ab4b2dc6a2d554425f9c3aeae171546b48cf.exe
      C:\Users\Admin\AppData\Local\Temp\4a83d02a5cb7dee158e517690f67ab4b2dc6a2d554425f9c3aeae171546b48cf.exe
      2⤵
      • Modifies system executable filetype association
      • Checks computer location settings
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies registry class
      PID:5100
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:2396

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5100-132-0x0000000000000000-mapping.dmp

  • memory/5100-133-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/5100-134-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/5100-135-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/5100-136-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/5100-137-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB