Analysis

  • max time kernel
    157s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2022 17:58

General

  • Target

    4d5200e694b15456018b87a8235fd0de2dfdac4977fee431e0923ef997027d80.exe

  • Size

    40KB

  • MD5

    54ce9ef4355a789e4b8b9551c5d961b0

  • SHA1

    cd1544b0d9396b49a1e27e17dfc6fac24221456d

  • SHA256

    4d5200e694b15456018b87a8235fd0de2dfdac4977fee431e0923ef997027d80

  • SHA512

    2d4b906741682a71f8d19290fecb1ae9dae697390b6e21b6adfec537d6e4b06bf3ac88d60f65efb3c382db074e14bf5731d9c533f3b185d264d41242946fff68

  • SSDEEP

    768:eyxqjQl/EMQt4Oei7RwsHxyP7nbxzOQdJ:JxqjQ+P04wsmJC

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies registry class 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d5200e694b15456018b87a8235fd0de2dfdac4977fee431e0923ef997027d80.exe
    "C:\Users\Admin\AppData\Local\Temp\4d5200e694b15456018b87a8235fd0de2dfdac4977fee431e0923ef997027d80.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    PID:4952

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads