Analysis

  • max time kernel
    84s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2022 17:42

General

  • Target

    8d858f2f38e4c229f36322d21aa043ee513073919ca0101a10d93d0622366c4c.exe

  • Size

    373KB

  • MD5

    51ffdcd9823ad0de4b89b17a5a38ae2c

  • SHA1

    635da00ada9864de6f028b31af140384ddaef975

  • SHA256

    8d858f2f38e4c229f36322d21aa043ee513073919ca0101a10d93d0622366c4c

  • SHA512

    ce10894685bd1814a4e7a843b36c2d4bfdebfa93a9472fcc3a7c9b3fce2fa52646a21b5097cdfeb6a81d3a78bd3c031f9ce34b8286f4a1e59220ba7f8e238131

Malware Config

Signatures

  • Detect Neshta payload 3 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Sodinokibi/Revil sample 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d858f2f38e4c229f36322d21aa043ee513073919ca0101a10d93d0622366c4c.exe
    "C:\Users\Admin\AppData\Local\Temp\8d858f2f38e4c229f36322d21aa043ee513073919ca0101a10d93d0622366c4c.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Users\Admin\AppData\Local\Temp\3582-490\8d858f2f38e4c229f36322d21aa043ee513073919ca0101a10d93d0622366c4c.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\8d858f2f38e4c229f36322d21aa043ee513073919ca0101a10d93d0622366c4c.exe"
      2⤵
      • Executes dropped EXE
      PID:1076

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\8d858f2f38e4c229f36322d21aa043ee513073919ca0101a10d93d0622366c4c.exe

    Filesize

    333KB

    MD5

    b1f9a581691e31624cb17a98515de8e1

    SHA1

    cc9f0b221efe29892adb88e800aab9de1f6c91d7

    SHA256

    bf7e618c8fe8709a934a1b1928814a3c691a562d92087848ca0cb4094e5b6b30

    SHA512

    b69266f8e6818362222c369897d813e6116c2933853a85390bec3472087c23ed0ddea2acb82a5cd2ae74acb2b47066ff976375b162d71a1876dc291cfa4431e5

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\8d858f2f38e4c229f36322d21aa043ee513073919ca0101a10d93d0622366c4c.exe

    Filesize

    333KB

    MD5

    b1f9a581691e31624cb17a98515de8e1

    SHA1

    cc9f0b221efe29892adb88e800aab9de1f6c91d7

    SHA256

    bf7e618c8fe8709a934a1b1928814a3c691a562d92087848ca0cb4094e5b6b30

    SHA512

    b69266f8e6818362222c369897d813e6116c2933853a85390bec3472087c23ed0ddea2acb82a5cd2ae74acb2b47066ff976375b162d71a1876dc291cfa4431e5

  • \Users\Admin\AppData\Local\Temp\3582-490\8d858f2f38e4c229f36322d21aa043ee513073919ca0101a10d93d0622366c4c.exe

    Filesize

    333KB

    MD5

    b1f9a581691e31624cb17a98515de8e1

    SHA1

    cc9f0b221efe29892adb88e800aab9de1f6c91d7

    SHA256

    bf7e618c8fe8709a934a1b1928814a3c691a562d92087848ca0cb4094e5b6b30

    SHA512

    b69266f8e6818362222c369897d813e6116c2933853a85390bec3472087c23ed0ddea2acb82a5cd2ae74acb2b47066ff976375b162d71a1876dc291cfa4431e5

  • memory/1076-58-0x0000000000000000-mapping.dmp

  • memory/1536-54-0x0000000000575000-0x0000000000580000-memory.dmp

    Filesize

    44KB

  • memory/1536-55-0x0000000076921000-0x0000000076923000-memory.dmp

    Filesize

    8KB

  • memory/1536-62-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/1536-61-0x0000000000220000-0x000000000022C000-memory.dmp

    Filesize

    48KB

  • memory/1536-60-0x0000000000575000-0x0000000000580000-memory.dmp

    Filesize

    44KB

  • memory/1536-64-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB