Analysis

  • max time kernel
    137s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 07:16

General

  • Target

    9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe

  • Size

    1.7MB

  • MD5

    49e4da6c8df0140e55d868e3589449da

  • SHA1

    36b887189105f1975fe5d03a906f6bd6eba19e43

  • SHA256

    9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9

  • SHA512

    942598433b78f54a7fac5ec351389ab5b2f68c557175febdaa7552a9f9e66014223fc587faba1e80a75e8976db5948897907016506e3f4b027d36bc69bca3f8c

  • SSDEEP

    24576:ja/pczg/t9cxnrAwNwHwLgJFExKRJe2hSlY9f1Q5ch:OpaKAnrAwNwHwLgJlHhSlYt1Q5+

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe
    "C:\Users\Admin\AppData\Local\Temp\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4596
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:692
      • C:\Users\Admin\AppData\Local\Temp\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe
        "C:\Users\Admin\AppData\Local\Temp\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe"
        3⤵
        • Modifies system executable filetype association
        • Executes dropped EXE
        • Checks computer location settings
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4108
        • C:\Users\Admin\AppData\Local\Temp\3582-490\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe
          "C:\Users\Admin\AppData\Local\Temp\3582-490\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1316
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:4340

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe

    Filesize

    1.6MB

    MD5

    42ec148a2a78724c2c32a1f0813e86a7

    SHA1

    a9a92d9dd40f8197b42213cf774ab6f860000d82

    SHA256

    bd38206d7d1acfac3573c45dbdb54de2f92d31334cf7cbe57a4509564834c41b

    SHA512

    3b6840b363330ac1202271bf8dd93b8e3216fe89de739553916a49d3c01142af1993cf3b84026d2ed0e24bb60b7bde73d5d01c207331f5dee0e2d858874c56d1

  • C:\Users\Admin\AppData\Local\Temp\3582-490\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe

    Filesize

    1.6MB

    MD5

    42ec148a2a78724c2c32a1f0813e86a7

    SHA1

    a9a92d9dd40f8197b42213cf774ab6f860000d82

    SHA256

    bd38206d7d1acfac3573c45dbdb54de2f92d31334cf7cbe57a4509564834c41b

    SHA512

    3b6840b363330ac1202271bf8dd93b8e3216fe89de739553916a49d3c01142af1993cf3b84026d2ed0e24bb60b7bde73d5d01c207331f5dee0e2d858874c56d1

  • C:\Users\Admin\AppData\Local\Temp\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe

    Filesize

    1.6MB

    MD5

    6228ee0b8cc1b64f0e1bd2e3b63c2ba0

    SHA1

    7b7f84527f15c093f04614e250dc680f0a17af6b

    SHA256

    215cbd8fe5f42c1a4655072f9ca17c875500f77d9c473cf8b08dc6cae388d1f2

    SHA512

    e9568be47dea58d9b3f48410df4e32d687bea076ec7b19fb79f4a3653b527a29718a3b4a43f975c89075b76e946a8fab68162a6b98d5f3df7d3d2a5b70bdda96

  • C:\Users\Admin\AppData\Local\Temp\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe

    Filesize

    1.6MB

    MD5

    6228ee0b8cc1b64f0e1bd2e3b63c2ba0

    SHA1

    7b7f84527f15c093f04614e250dc680f0a17af6b

    SHA256

    215cbd8fe5f42c1a4655072f9ca17c875500f77d9c473cf8b08dc6cae388d1f2

    SHA512

    e9568be47dea58d9b3f48410df4e32d687bea076ec7b19fb79f4a3653b527a29718a3b4a43f975c89075b76e946a8fab68162a6b98d5f3df7d3d2a5b70bdda96

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b