Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 19:44

General

  • Target

    de0d9d375c0fbfbb0efe538b46148cc113eacad6cb2b02fd70fa034fc3505906.exe

  • Size

    554KB

  • MD5

    3c03b064689d40dfaf3e59309c900680

  • SHA1

    0affe674a97e29e2312b987335e08bf8b43fab49

  • SHA256

    de0d9d375c0fbfbb0efe538b46148cc113eacad6cb2b02fd70fa034fc3505906

  • SHA512

    291cfc7ec06c81d7d8749714710ee35d975ba786110e0b88fb7fe777a387267965ceaa0e26880206d66a916fe8b5b22584118d1e392de9c3f66878f728afa950

  • SSDEEP

    12288:pA3DvE1NyDtee5MOggiLtpBVFAMPX229jKC88y7gNvIKL:a3Ds1wz6tpHFL9jn88y7giKL

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de0d9d375c0fbfbb0efe538b46148cc113eacad6cb2b02fd70fa034fc3505906.exe
    "C:\Users\Admin\AppData\Local\Temp\de0d9d375c0fbfbb0efe538b46148cc113eacad6cb2b02fd70fa034fc3505906.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:464
    • C:\Users\Admin\AppData\Local\Temp\3582-490\de0d9d375c0fbfbb0efe538b46148cc113eacad6cb2b02fd70fa034fc3505906.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\de0d9d375c0fbfbb0efe538b46148cc113eacad6cb2b02fd70fa034fc3505906.exe"
      2⤵
      • Executes dropped EXE
      PID:1396

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\3582-490\de0d9d375c0fbfbb0efe538b46148cc113eacad6cb2b02fd70fa034fc3505906.exe

          Filesize

          514KB

          MD5

          678870fd7e5db0d7b64105ae3c4649c4

          SHA1

          25e88350b1df8fe38ba00da2b1dfd8e035dfefee

          SHA256

          1d806e30c58043864f52ce4971b49d206510b4582bf33e899255c41a7dc3e4f1

          SHA512

          4ad48e806c961e2f55cd7495b62b853150b2b594ef0232728fd67b69e85ab7d50299a56c15cafe96171456819da898c2a347d551fcedbc328a94c6168a1c3afc

        • C:\Users\Admin\AppData\Local\Temp\3582-490\de0d9d375c0fbfbb0efe538b46148cc113eacad6cb2b02fd70fa034fc3505906.exe

          Filesize

          514KB

          MD5

          678870fd7e5db0d7b64105ae3c4649c4

          SHA1

          25e88350b1df8fe38ba00da2b1dfd8e035dfefee

          SHA256

          1d806e30c58043864f52ce4971b49d206510b4582bf33e899255c41a7dc3e4f1

          SHA512

          4ad48e806c961e2f55cd7495b62b853150b2b594ef0232728fd67b69e85ab7d50299a56c15cafe96171456819da898c2a347d551fcedbc328a94c6168a1c3afc