Analysis

  • max time kernel
    153s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-10-2022 00:22

General

  • Target

    794e1729e8ec304e04ffd9fed333c2c3b5fa014481f115f98f54d47debc87da4.exe

  • Size

    918KB

  • MD5

    681ee92300c1b1d3daacbdbae5c68510

  • SHA1

    2532dd6b415f108236827f8b8b9fcbac54214c1a

  • SHA256

    794e1729e8ec304e04ffd9fed333c2c3b5fa014481f115f98f54d47debc87da4

  • SHA512

    398078aab6ef501d3d5b683a1c5b118185b78cd14a1b21f9609df7f60f44b13b48115a5f72756eee3dccff50b6e42006a98d72780734dc180758a0c2beccfab1

  • SSDEEP

    24576:L5jgiri7a4HKvkTgXuquveY+W2o8oT3ezMrl9cekcHhXh9HJUiWUXsmqsqzl87at:F0iriNHKvkTgXuquveY+W2o8oT3ezMrq

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\794e1729e8ec304e04ffd9fed333c2c3b5fa014481f115f98f54d47debc87da4.exe
    "C:\Users\Admin\AppData\Local\Temp\794e1729e8ec304e04ffd9fed333c2c3b5fa014481f115f98f54d47debc87da4.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:5032
    • C:\Users\Admin\AppData\Local\Temp\3582-490\794e1729e8ec304e04ffd9fed333c2c3b5fa014481f115f98f54d47debc87da4.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\794e1729e8ec304e04ffd9fed333c2c3b5fa014481f115f98f54d47debc87da4.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2680

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\794e1729e8ec304e04ffd9fed333c2c3b5fa014481f115f98f54d47debc87da4.exe

    Filesize

    878KB

    MD5

    5a4d834ac6e5f6999037db7487f1cf85

    SHA1

    64d749688f340e96c10225bd53f303b2fbe66e52

    SHA256

    1631f289a8b5c6c52ffaf74349ae00e1c76589034e36c5bbbc1d51cf311cc264

    SHA512

    541abad0deb46bb8d62ec271a9254399a57da8866aafe96ed1eb8440048dccf4730990fe778a31d683127d1805e01193c80995336e3bae5f26a230b4ea1bb0c4

  • C:\Users\Admin\AppData\Local\Temp\3582-490\794e1729e8ec304e04ffd9fed333c2c3b5fa014481f115f98f54d47debc87da4.exe

    Filesize

    878KB

    MD5

    5a4d834ac6e5f6999037db7487f1cf85

    SHA1

    64d749688f340e96c10225bd53f303b2fbe66e52

    SHA256

    1631f289a8b5c6c52ffaf74349ae00e1c76589034e36c5bbbc1d51cf311cc264

    SHA512

    541abad0deb46bb8d62ec271a9254399a57da8866aafe96ed1eb8440048dccf4730990fe778a31d683127d1805e01193c80995336e3bae5f26a230b4ea1bb0c4

  • C:\Users\Admin\AppData\Local\Temp\nslBEA2.tmp\System.dll

    Filesize

    11KB

    MD5

    959ea64598b9a3e494c00e8fa793be7e

    SHA1

    40f284a3b92c2f04b1038def79579d4b3d066ee0

    SHA256

    03cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b

    SHA512

    5e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64