Analysis

  • max time kernel
    103s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 00:16

General

  • Target

    44bbee7bf7b76ff02b0691f7772bb24c251e6273ddba5c29e7d12cb546992a5f.exe

  • Size

    373KB

  • MD5

    4a47394029bb4c0d16997f6a0b65a790

  • SHA1

    e85d54e20c4c180f229e6463bf170156e86e5aa7

  • SHA256

    44bbee7bf7b76ff02b0691f7772bb24c251e6273ddba5c29e7d12cb546992a5f

  • SHA512

    8e46572fa8c4f0e5072698ef1e82530f1e97d9730ea3feda9296ed4804afcf9569a1e77c859c028475ea31c247d0138b5e5bff0617dec03f2af06be1616c191a

  • SSDEEP

    6144:k9LU8XEIcR59HNGHDpAxlmCU1MYmWtr1wWYJrb880+JhAbf24c/gqqR+H3:oU8XquHFA3pKMqp1wWoo80+Jd4c/W+X

Malware Config

Signatures

  • Detect Neshta payload 15 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44bbee7bf7b76ff02b0691f7772bb24c251e6273ddba5c29e7d12cb546992a5f.exe
    "C:\Users\Admin\AppData\Local\Temp\44bbee7bf7b76ff02b0691f7772bb24c251e6273ddba5c29e7d12cb546992a5f.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Users\Admin\AppData\Local\Temp\3582-490\44bbee7bf7b76ff02b0691f7772bb24c251e6273ddba5c29e7d12cb546992a5f.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\44bbee7bf7b76ff02b0691f7772bb24c251e6273ddba5c29e7d12cb546992a5f.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1520
      • C:\Windows\svchost.com
        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\KISA(1~1.EXE"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:628
        • C:\Users\Admin\AppData\Local\Temp\KISA(1~1.EXE
          C:\Users\Admin\AppData\Local\Temp\KISA(1~1.EXE
          4⤵
          • Executes dropped EXE
          PID:1204

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE

    Filesize

    859KB

    MD5

    02ee6a3424782531461fb2f10713d3c1

    SHA1

    b581a2c365d93ebb629e8363fd9f69afc673123f

    SHA256

    ead58c483cb20bcd57464f8a4929079539d634f469b213054bf737d227c026dc

    SHA512

    6c9272cb1b6bde3ee887e1463ab30ea76568cb1a285d11393337b78c4ad1c3b7e6ce47646a92ab6d70bff4b02ab9d699b84af9437b720e52dcd35579fe2693ec

  • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe

    Filesize

    547KB

    MD5

    cf6c595d3e5e9667667af096762fd9c4

    SHA1

    9bb44da8d7f6457099cb56e4f7d1026963dce7ce

    SHA256

    593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d

    SHA512

    ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80

  • C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe

    Filesize

    186KB

    MD5

    58b58875a50a0d8b5e7be7d6ac685164

    SHA1

    1e0b89c1b2585c76e758e9141b846ed4477b0662

    SHA256

    2a0aa0763fdef9c38c5dd4d50703f0c7e27f4903c139804ec75e55f8388139ae

    SHA512

    d67214077162a105d01b11a8e207fab08b45b08fbfba0615a2ea146e1dd99eea35e4f02958a1754d3192292c00caf777f186f0a362e4b8b0da51fabbdb76375b

  • C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe

    Filesize

    1.1MB

    MD5

    566ed4f62fdc96f175afedd811fa0370

    SHA1

    d4b47adc40e0d5a9391d3f6f2942d1889dd2a451

    SHA256

    e17cd94c08fc0e001a49f43a0801cea4625fb9aee211b6dfebebec446c21f460

    SHA512

    cdf8f508d396a1a0d2e0fc25f2ae46398b25039a0dafa0919737cc44e3e926ebae4c3aa26f1a3441511430f1a36241f8e61c515a5d9bd98ad4740d4d0f7b8db7

  • C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE

    Filesize

    167KB

    MD5

    60e84e3ffd19317a248b05f36613757b

    SHA1

    47505b74bacc90b74627340ec5b06934634548f6

    SHA256

    05eafcb9eab1761af5854073aa9012a189a30c9c67c6f5cacae89e6f890874a7

    SHA512

    1c537c15f99840e1be9b5c8791e059f457e0a5b8e731be240eafb8dcffdb37c906bfd22820dd7bfecc573c1e3812fe14aed6f368110a82d3560d5dbc5b2bac7a

  • C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE

    Filesize

    674KB

    MD5

    9c10a5ec52c145d340df7eafdb69c478

    SHA1

    57f3d99e41d123ad5f185fc21454367a7285db42

    SHA256

    ccf37e88447a7afdb0ba4351b8c5606dbb05b984fb133194d71bcc00d7be4e36

    SHA512

    2704cfd1a708bfca6db7c52467d3abf0b09313db0cdd1ea8e5d48504c8240c4bf24e677f17c5df9e3ac1f6a678e0328e73e951dc4481f35027cb03b2966dc38f

  • C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE

    Filesize

    485KB

    MD5

    87f15006aea3b4433e226882a56f188d

    SHA1

    e3ad6beb8229af62b0824151dbf546c0506d4f65

    SHA256

    8d0045c74270281c705009d49441167c8a51ac70b720f84ff941b39fad220919

    SHA512

    b01a8af6dc836044d2adc6828654fa7a187c3f7ffe2a4db4c73021be6d121f9c1c47b1643513c3f25c0e1b5123b8ce2dc78b2ca8ce638a09c2171f158762c7c1

  • C:\Users\ALLUSE~1\PACKAG~1\{33D1F~1\VCREDI~1.EXE

    Filesize

    485KB

    MD5

    86749cd13537a694795be5d87ef7106d

    SHA1

    538030845680a8be8219618daee29e368dc1e06c

    SHA256

    8c35dcc975a5c7c687686a3970306452476d17a89787bc5bd3bf21b9de0d36a5

    SHA512

    7b6ae20515fb6b13701df422cbb0844d26c8a98087b2758427781f0bf11eb9ec5da029096e42960bf99ddd3d4f817db6e29ac172039110df6ea92547d331db4c

  • C:\Users\ALLUSE~1\PACKAG~1\{4D8DC~1\VC_RED~1.EXE

    Filesize

    674KB

    MD5

    97510a7d9bf0811a6ea89fad85a9f3f3

    SHA1

    2ac0c49b66a92789be65580a38ae9798237711db

    SHA256

    c48abbc29405559e68cc9f8fc6d218aa317a9d0023839c7846ca509c1f563fea

    SHA512

    2a93e2a3bd187fdde160f87ef777ccd1d1c398d547b7c869e6b64469b9418ad04d887cdfe94af7407476377bf2d009f576de3935c025b7aefbab26fbcd8f90fb

  • C:\Users\ALLUSE~1\PACKAG~1\{61087~1\VCREDI~1.EXE

    Filesize

    495KB

    MD5

    9597098cfbc45fae685d9480d135ed13

    SHA1

    84401f03a7942a7e4fcd26e4414b227edd9b0f09

    SHA256

    45966655baaed42df92cd6d8094b4172c0e7a0320528b59cf63fca7c25d66e9c

    SHA512

    16afbdffe4b4b2e54b4cc96fe74e49ca367dea50752321ddf334756519812ba8ce147ef5459e421dc42e103bc3456aab1d185588cc86b35fa2315ac86b2a0164

  • C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE

    Filesize

    536KB

    MD5

    3e8de969e12cd5e6292489a12a9834b6

    SHA1

    285b89585a09ead4affa32ecaaa842bc51d53ad5

    SHA256

    7a25fc3b1ce0f1d06a84dd344c8f5a6c4604732f7d13a8aaad504c4376b305cf

    SHA512

    b14a5936181a1d8c0f966d969a049254238bf1eacdb1da952c2dc084d5d6dcd5d611d2d058d4c00d6384c20046deef5e74ea865c0062bb0761a391a1eaf1640e

  • C:\Users\Admin\AppData\Local\Temp\3582-490\44bbee7bf7b76ff02b0691f7772bb24c251e6273ddba5c29e7d12cb546992a5f.exe

    Filesize

    332KB

    MD5

    08dea826159a902aa9c5d3fbf47c759d

    SHA1

    16dfe7edbdb729aae8844ba7fd402b7cfb73f059

    SHA256

    72ffc4b7b995eab74e3bbf696cc3fd88cd8aa94e73cee4cb453d661bf16b02af

    SHA512

    9025c172e64405c2b9aad7a3ce85130ab05336a30069df4468da2873fd090dd2067b23febb2fe14a85397d5852b6a450e8b41d663fdd7175540435c577ff22c4

  • C:\Users\Admin\AppData\Local\Temp\KISA(1~1.EXE

    Filesize

    252KB

    MD5

    f50e14134c3c888f4e9149e156c75894

    SHA1

    4bf074a6edbf0bc38549c533444d42f0936eb5d3

    SHA256

    d3b414f27ab0c14befbbe2fc50bbf0193d3a76f0309346f65862792f4209685d

    SHA512

    fba4132a5f031d2a00b0a4ab976119cca67357fd8c050580177ec359d20d947d50bcecd60fd583c992fb7449fe40be375bb813c095892546d20d830180ab698e

  • C:\Users\Admin\AppData\Local\Temp\KISA(1~1.EXE

    Filesize

    252KB

    MD5

    f50e14134c3c888f4e9149e156c75894

    SHA1

    4bf074a6edbf0bc38549c533444d42f0936eb5d3

    SHA256

    d3b414f27ab0c14befbbe2fc50bbf0193d3a76f0309346f65862792f4209685d

    SHA512

    fba4132a5f031d2a00b0a4ab976119cca67357fd8c050580177ec359d20d947d50bcecd60fd583c992fb7449fe40be375bb813c095892546d20d830180ab698e

  • C:\Users\Admin\AppData\Local\Temp\tmp5023.tmp

    Filesize

    8B

    MD5

    298796827b0bfc895ced8bac2bec8113

    SHA1

    bf404ac5db892d59e8ca1ff774515011cab1713d

    SHA256

    33fd91a87ea44fc4dc9fd5f28692a1017a5c4444f1c660f883821eace0ad0e1f

    SHA512

    e74a10c1c83d0ecaf9ed71e966c4d51154416494df37db79c08235fe7fb0ab210702af6679c1aa61eb5f321908a7ecbdd9d45069295bee59e68f4df7278b04d9

  • C:\Windows\svchost.com

    Filesize

    40KB

    MD5

    c3a66555a457b8c9a7eeb0b2a973565e

    SHA1

    dc348d1108859d942f3843b2c5cc3c4f41a33703

    SHA256

    dcaca81520d448e9fa47229eeb526c1bb8994df919689479bbd72fef077850e9

    SHA512

    4a7990e96c683028ee3c3fc26cecc78dc12f1a74d0c9e754bf7aeeccfbbfe3a7f64c85ea0d0bfa131f1a1c746bdbd7d667f40022cd7c4e898a7d2bf65c5e6852

  • C:\Windows\svchost.com

    Filesize

    40KB

    MD5

    c3a66555a457b8c9a7eeb0b2a973565e

    SHA1

    dc348d1108859d942f3843b2c5cc3c4f41a33703

    SHA256

    dcaca81520d448e9fa47229eeb526c1bb8994df919689479bbd72fef077850e9

    SHA512

    4a7990e96c683028ee3c3fc26cecc78dc12f1a74d0c9e754bf7aeeccfbbfe3a7f64c85ea0d0bfa131f1a1c746bdbd7d667f40022cd7c4e898a7d2bf65c5e6852

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\44bbee7bf7b76ff02b0691f7772bb24c251e6273ddba5c29e7d12cb546992a5f.exe

    Filesize

    332KB

    MD5

    08dea826159a902aa9c5d3fbf47c759d

    SHA1

    16dfe7edbdb729aae8844ba7fd402b7cfb73f059

    SHA256

    72ffc4b7b995eab74e3bbf696cc3fd88cd8aa94e73cee4cb453d661bf16b02af

    SHA512

    9025c172e64405c2b9aad7a3ce85130ab05336a30069df4468da2873fd090dd2067b23febb2fe14a85397d5852b6a450e8b41d663fdd7175540435c577ff22c4

  • \Users\Admin\AppData\Local\Temp\KISA(1~1.EXE

    Filesize

    252KB

    MD5

    f50e14134c3c888f4e9149e156c75894

    SHA1

    4bf074a6edbf0bc38549c533444d42f0936eb5d3

    SHA256

    d3b414f27ab0c14befbbe2fc50bbf0193d3a76f0309346f65862792f4209685d

    SHA512

    fba4132a5f031d2a00b0a4ab976119cca67357fd8c050580177ec359d20d947d50bcecd60fd583c992fb7449fe40be375bb813c095892546d20d830180ab698e

  • memory/628-75-0x00000000002A0000-0x0000000000342000-memory.dmp

    Filesize

    648KB

  • memory/904-54-0x0000000075E11000-0x0000000075E13000-memory.dmp

    Filesize

    8KB

  • memory/904-57-0x0000000002750000-0x00000000027FB000-memory.dmp

    Filesize

    684KB

  • memory/1204-73-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/1520-74-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/1520-85-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB