Analysis
-
max time kernel
135s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-09-2022 21:34
Behavioral task
behavioral1
Sample
d04efe3df296392aff917f485e0c3897.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d04efe3df296392aff917f485e0c3897.exe
Resource
win10v2004-20220812-en
General
-
Target
d04efe3df296392aff917f485e0c3897.exe
-
Size
5.5MB
-
MD5
d04efe3df296392aff917f485e0c3897
-
SHA1
1719eb1e23ab98027be23e4aef1b47950cc5dd4f
-
SHA256
968070cf4750158e7a88a559b8ca82c0a98866f77857c4dab8e55bcd32fc61df
-
SHA512
66dabe6f1d39b9635e5838fc68200cc952ba5b324efcb00290670230379bba989dc29ff1134b82da711cddea00697ec8078617126656a86ae8f57b27b7b931e1
-
SSDEEP
98304:KSiZkzOZrfJR+kCmzc8qdaMg5geYy05sZH6m9JPmlm5uRHzy+Il+crfMWHvZkby5:RzyDJEszedaR5ge1JMmnPmlXBzuXr/HZ
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
d04efe3df296392aff917f485e0c3897.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" d04efe3df296392aff917f485e0c3897.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 3 IoCs
Processes:
d04efe3df296392aff917f485e0c3897.exed04efe3df296392aff917f485e0c3897.tmpcloseapp.exepid process 1776 d04efe3df296392aff917f485e0c3897.exe 1936 d04efe3df296392aff917f485e0c3897.tmp 1088 closeapp.exe -
Loads dropped DLL 6 IoCs
Processes:
d04efe3df296392aff917f485e0c3897.exed04efe3df296392aff917f485e0c3897.exed04efe3df296392aff917f485e0c3897.tmppid process 1720 d04efe3df296392aff917f485e0c3897.exe 1776 d04efe3df296392aff917f485e0c3897.exe 1936 d04efe3df296392aff917f485e0c3897.tmp 1936 d04efe3df296392aff917f485e0c3897.tmp 1936 d04efe3df296392aff917f485e0c3897.tmp 1720 d04efe3df296392aff917f485e0c3897.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
d04efe3df296392aff917f485e0c3897.exedescription ioc process File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE d04efe3df296392aff917f485e0c3897.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE d04efe3df296392aff917f485e0c3897.exe -
Drops file in Windows directory 1 IoCs
Processes:
d04efe3df296392aff917f485e0c3897.exedescription ioc process File opened for modification C:\Windows\svchost.com d04efe3df296392aff917f485e0c3897.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
d04efe3df296392aff917f485e0c3897.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" d04efe3df296392aff917f485e0c3897.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
closeapp.exepid process 1088 closeapp.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
d04efe3df296392aff917f485e0c3897.exed04efe3df296392aff917f485e0c3897.exed04efe3df296392aff917f485e0c3897.tmpdescription pid process target process PID 1720 wrote to memory of 1776 1720 d04efe3df296392aff917f485e0c3897.exe d04efe3df296392aff917f485e0c3897.exe PID 1720 wrote to memory of 1776 1720 d04efe3df296392aff917f485e0c3897.exe d04efe3df296392aff917f485e0c3897.exe PID 1720 wrote to memory of 1776 1720 d04efe3df296392aff917f485e0c3897.exe d04efe3df296392aff917f485e0c3897.exe PID 1720 wrote to memory of 1776 1720 d04efe3df296392aff917f485e0c3897.exe d04efe3df296392aff917f485e0c3897.exe PID 1776 wrote to memory of 1936 1776 d04efe3df296392aff917f485e0c3897.exe d04efe3df296392aff917f485e0c3897.tmp PID 1776 wrote to memory of 1936 1776 d04efe3df296392aff917f485e0c3897.exe d04efe3df296392aff917f485e0c3897.tmp PID 1776 wrote to memory of 1936 1776 d04efe3df296392aff917f485e0c3897.exe d04efe3df296392aff917f485e0c3897.tmp PID 1776 wrote to memory of 1936 1776 d04efe3df296392aff917f485e0c3897.exe d04efe3df296392aff917f485e0c3897.tmp PID 1776 wrote to memory of 1936 1776 d04efe3df296392aff917f485e0c3897.exe d04efe3df296392aff917f485e0c3897.tmp PID 1776 wrote to memory of 1936 1776 d04efe3df296392aff917f485e0c3897.exe d04efe3df296392aff917f485e0c3897.tmp PID 1776 wrote to memory of 1936 1776 d04efe3df296392aff917f485e0c3897.exe d04efe3df296392aff917f485e0c3897.tmp PID 1936 wrote to memory of 1088 1936 d04efe3df296392aff917f485e0c3897.tmp closeapp.exe PID 1936 wrote to memory of 1088 1936 d04efe3df296392aff917f485e0c3897.tmp closeapp.exe PID 1936 wrote to memory of 1088 1936 d04efe3df296392aff917f485e0c3897.tmp closeapp.exe PID 1936 wrote to memory of 1088 1936 d04efe3df296392aff917f485e0c3897.tmp closeapp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d04efe3df296392aff917f485e0c3897.exe"C:\Users\Admin\AppData\Local\Temp\d04efe3df296392aff917f485e0c3897.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\d04efe3df296392aff917f485e0c3897.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\d04efe3df296392aff917f485e0c3897.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\is-SGMTD.tmp\d04efe3df296392aff917f485e0c3897.tmp"C:\Users\Admin\AppData\Local\Temp\is-SGMTD.tmp\d04efe3df296392aff917f485e0c3897.tmp" /SL5="$70122,4772887,898560,C:\Users\Admin\AppData\Local\Temp\3582-490\d04efe3df296392aff917f485e0c3897.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\is-LTC9P.tmp\closeapp.exe"C:\Users\Admin\AppData\Local\Temp\is-LTC9P.tmp\closeapp.exe" StartupStar4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD578b3ab2789f5f3e517acca846d8b951c
SHA16094cc5fe49b6bd9388748b99fdedab121643a73
SHA256117653c1f77dabca9652c2eb2ae9e63538083d4f135bb6400c8e1ea886d0b1c1
SHA5127b9eedb86ab887c37aa0c8c93279aea832dbbd98dc8cfa1e42156d5150e7c483ad3095f8540c8aeba04306ae64c734d746c7b946daca71e02274e01a4c6959b8
-
Filesize
5.5MB
MD578b3ab2789f5f3e517acca846d8b951c
SHA16094cc5fe49b6bd9388748b99fdedab121643a73
SHA256117653c1f77dabca9652c2eb2ae9e63538083d4f135bb6400c8e1ea886d0b1c1
SHA5127b9eedb86ab887c37aa0c8c93279aea832dbbd98dc8cfa1e42156d5150e7c483ad3095f8540c8aeba04306ae64c734d746c7b946daca71e02274e01a4c6959b8
-
Filesize
227KB
MD59a2bbf4de6279c9321969c6257f48939
SHA14fdf355fa10fbd61c1d4c47e21e66b09493a1621
SHA25640e33b4ded6db4e96b7ba89770b248d62ffd5f9175e2e0b58692084ce3b91a10
SHA5123afd50668327f518e0d5dfe8200f43ee29cdf8dea8667e31131005e1d0e67acb96f4c218b2ab1f7a3ee926bf600b57b046b5c21ba40de779acc03d130087a4cc
-
Filesize
3.1MB
MD5caf2a370fad05970f8a562cdfde6ac90
SHA1c657362c34bcb45ccb2cc4db42a6de6fb8547c6f
SHA256155a3f8e5fd95e92b0665f59233df532786cab5922e743b1171aeb478e09f481
SHA512ad8456b43d1cc7d5fc34af7c9c5cf4105ac7707984aecfce3fd04495d5bfadfd73216bcec78fbe6cf47338ee6b450d49ac05b3641fb861467d4d87ef25197ef2
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
5.5MB
MD578b3ab2789f5f3e517acca846d8b951c
SHA16094cc5fe49b6bd9388748b99fdedab121643a73
SHA256117653c1f77dabca9652c2eb2ae9e63538083d4f135bb6400c8e1ea886d0b1c1
SHA5127b9eedb86ab887c37aa0c8c93279aea832dbbd98dc8cfa1e42156d5150e7c483ad3095f8540c8aeba04306ae64c734d746c7b946daca71e02274e01a4c6959b8
-
Filesize
227KB
MD59a2bbf4de6279c9321969c6257f48939
SHA14fdf355fa10fbd61c1d4c47e21e66b09493a1621
SHA25640e33b4ded6db4e96b7ba89770b248d62ffd5f9175e2e0b58692084ce3b91a10
SHA5123afd50668327f518e0d5dfe8200f43ee29cdf8dea8667e31131005e1d0e67acb96f4c218b2ab1f7a3ee926bf600b57b046b5c21ba40de779acc03d130087a4cc
-
Filesize
227KB
MD59a2bbf4de6279c9321969c6257f48939
SHA14fdf355fa10fbd61c1d4c47e21e66b09493a1621
SHA25640e33b4ded6db4e96b7ba89770b248d62ffd5f9175e2e0b58692084ce3b91a10
SHA5123afd50668327f518e0d5dfe8200f43ee29cdf8dea8667e31131005e1d0e67acb96f4c218b2ab1f7a3ee926bf600b57b046b5c21ba40de779acc03d130087a4cc
-
Filesize
164KB
MD5735c1b6a6233ac5eca5eabb6edb8de3e
SHA1fbea3d1230f3cac2f1b67141fa0706ccc5e52759
SHA25617415e672d167bb83f865a73e0c399696f1d953edf43a21e55cf79c4e5320d23
SHA5129f3c933ce3a8d9799ee7de091f84a57b3f13f0bef23c28e8a26e7287dc6c37393a704785d3fa72c83c966f6d3431c30c2164e699d2149caff0799da7385a0060
-
Filesize
3.1MB
MD5caf2a370fad05970f8a562cdfde6ac90
SHA1c657362c34bcb45ccb2cc4db42a6de6fb8547c6f
SHA256155a3f8e5fd95e92b0665f59233df532786cab5922e743b1171aeb478e09f481
SHA512ad8456b43d1cc7d5fc34af7c9c5cf4105ac7707984aecfce3fd04495d5bfadfd73216bcec78fbe6cf47338ee6b450d49ac05b3641fb861467d4d87ef25197ef2