Analysis

  • max time kernel
    150s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2022 17:57

General

  • Target

    f4f2b302015940f79f4da7c4524d1a59fc52b8b09e3e110f5bfb9c2f0104cada.exe

  • Size

    764KB

  • MD5

    65f3f7fe70938b2912e6b484956aa070

  • SHA1

    5b253c720fa6f131d91458ddcc9d72089d6982c7

  • SHA256

    f4f2b302015940f79f4da7c4524d1a59fc52b8b09e3e110f5bfb9c2f0104cada

  • SHA512

    d714621bcaa251e6a81702c1586c6af6e0032674b760d536877af71c710024ff27afdd53c3a681c2c815b75a95a1217d246a8d2145b733affaa53f03d293629b

  • SSDEEP

    6144:PurKGZkeARTqB3NMP2YU05lUSfI1ftMgKi7sSRtpMeK33nG5OfEiPpm1XdWqRaNc:4ZkeARmB3WPN431XdhRP

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4f2b302015940f79f4da7c4524d1a59fc52b8b09e3e110f5bfb9c2f0104cada.exe
    "C:\Users\Admin\AppData\Local\Temp\f4f2b302015940f79f4da7c4524d1a59fc52b8b09e3e110f5bfb9c2f0104cada.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Users\Admin\AppData\Local\Temp\3582-490\f4f2b302015940f79f4da7c4524d1a59fc52b8b09e3e110f5bfb9c2f0104cada.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\f4f2b302015940f79f4da7c4524d1a59fc52b8b09e3e110f5bfb9c2f0104cada.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      PID:1800

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\f4f2b302015940f79f4da7c4524d1a59fc52b8b09e3e110f5bfb9c2f0104cada.exe

    Filesize

    724KB

    MD5

    348bfcd735ac3d97af161986092b778a

    SHA1

    398d1bf2e795c6627b3b6853b240a9b716dbd7b7

    SHA256

    0687e185d89c530aa01ca824dc52c4d4bd45515ad798c7bde7a836c1b6074969

    SHA512

    28d33cc53e4dfe0b461971cfc6a35bd0ddab92a5d84c92c7e7fef8344b1fbb3a0abd0d0b8c164433e7ea454fb2e75c75d11c7f06a5e597e319205ebcfd355502

  • C:\Users\Admin\AppData\Local\Temp\3582-490\f4f2b302015940f79f4da7c4524d1a59fc52b8b09e3e110f5bfb9c2f0104cada.exe

    Filesize

    724KB

    MD5

    348bfcd735ac3d97af161986092b778a

    SHA1

    398d1bf2e795c6627b3b6853b240a9b716dbd7b7

    SHA256

    0687e185d89c530aa01ca824dc52c4d4bd45515ad798c7bde7a836c1b6074969

    SHA512

    28d33cc53e4dfe0b461971cfc6a35bd0ddab92a5d84c92c7e7fef8344b1fbb3a0abd0d0b8c164433e7ea454fb2e75c75d11c7f06a5e597e319205ebcfd355502

  • memory/1800-132-0x0000000000000000-mapping.dmp