Analysis

  • max time kernel
    155s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2022 17:57

General

  • Target

    b2ffecd901e9b33e8c966986207904affe7648808b284e258fc3e7311f33837f.exe

  • Size

    1.9MB

  • MD5

    793d7609bcb5b230e46f0cb24cc9b830

  • SHA1

    cbe5a8b4c0ecaa6037ec5362b49355876095f7ae

  • SHA256

    b2ffecd901e9b33e8c966986207904affe7648808b284e258fc3e7311f33837f

  • SHA512

    6dd50a8c3c9142135a2b1226907db3ab91631d25b22eb11de0f7c4908de4a5eb90711c93a779f0706ad5dee6a2549e4bd63950ca3ef9ba470d5fe4e2915a3856

  • SSDEEP

    49152:387423EwnbG4tYq+MLdlzfnKpIRr7DIDGj:YbnNfnUIP

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2ffecd901e9b33e8c966986207904affe7648808b284e258fc3e7311f33837f.exe
    "C:\Users\Admin\AppData\Local\Temp\b2ffecd901e9b33e8c966986207904affe7648808b284e258fc3e7311f33837f.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Users\Admin\AppData\Local\Temp\3582-490\b2ffecd901e9b33e8c966986207904affe7648808b284e258fc3e7311f33837f.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\b2ffecd901e9b33e8c966986207904affe7648808b284e258fc3e7311f33837f.exe"
      2⤵
      • Executes dropped EXE
      PID:1172

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\b2ffecd901e9b33e8c966986207904affe7648808b284e258fc3e7311f33837f.exe

    Filesize

    1.9MB

    MD5

    66b5cfbbf528a357310e959e8adc7b24

    SHA1

    fb3156e41f5b2ac2ffa140168ea675dbac44e42f

    SHA256

    06294b9ed049893a612092cef4e6f37b767456e60ef5d7af87972e143ab2bd2d

    SHA512

    50677454735d05ee61c0dc1709f936bdf91c4d1a92108b2c424b1ae2016f83a9876dcca15e749bff185ff84ba5abd001d21a1d87932a23c8c69145fedc214041

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\b2ffecd901e9b33e8c966986207904affe7648808b284e258fc3e7311f33837f.exe

    Filesize

    1.9MB

    MD5

    66b5cfbbf528a357310e959e8adc7b24

    SHA1

    fb3156e41f5b2ac2ffa140168ea675dbac44e42f

    SHA256

    06294b9ed049893a612092cef4e6f37b767456e60ef5d7af87972e143ab2bd2d

    SHA512

    50677454735d05ee61c0dc1709f936bdf91c4d1a92108b2c424b1ae2016f83a9876dcca15e749bff185ff84ba5abd001d21a1d87932a23c8c69145fedc214041

  • \Users\Admin\AppData\Local\Temp\3582-490\b2ffecd901e9b33e8c966986207904affe7648808b284e258fc3e7311f33837f.exe

    Filesize

    1.9MB

    MD5

    66b5cfbbf528a357310e959e8adc7b24

    SHA1

    fb3156e41f5b2ac2ffa140168ea675dbac44e42f

    SHA256

    06294b9ed049893a612092cef4e6f37b767456e60ef5d7af87972e143ab2bd2d

    SHA512

    50677454735d05ee61c0dc1709f936bdf91c4d1a92108b2c424b1ae2016f83a9876dcca15e749bff185ff84ba5abd001d21a1d87932a23c8c69145fedc214041

  • memory/1172-57-0x0000000000000000-mapping.dmp

  • memory/1928-54-0x00000000762B1000-0x00000000762B3000-memory.dmp

    Filesize

    8KB