Analysis

  • max time kernel
    161s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-10-2022 02:52

General

  • Target

    4186d0c6f4550825bb2abafe6114cb7a400a2bcdafa781d608e9399aff5d0ff4.exe

  • Size

    297KB

  • MD5

    84bb8e9c93b7b7c3c8355647ff6d664d

  • SHA1

    de6edb24416f9bcc583b5a395a0a0f632c78bf72

  • SHA256

    4186d0c6f4550825bb2abafe6114cb7a400a2bcdafa781d608e9399aff5d0ff4

  • SHA512

    1bd3cd1c35566bcbe61337ef4ae7c5b081be845e8061ca1d485a68830850fafac77b201b9d174f139668cfec2a8197389220ea2fa4fd76eb98f7289d5abeec5c

  • SSDEEP

    6144:Pug4VhQEm7o1v4+SKsBY+76JL2OCKA9NNlZ67:LGF2oZ4KK7mOw

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4186d0c6f4550825bb2abafe6114cb7a400a2bcdafa781d608e9399aff5d0ff4.exe
    "C:\Users\Admin\AppData\Local\Temp\4186d0c6f4550825bb2abafe6114cb7a400a2bcdafa781d608e9399aff5d0ff4.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:64
    • C:\Users\Admin\AppData\Local\Temp\3582-490\4186d0c6f4550825bb2abafe6114cb7a400a2bcdafa781d608e9399aff5d0ff4.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\4186d0c6f4550825bb2abafe6114cb7a400a2bcdafa781d608e9399aff5d0ff4.exe"
      2⤵
      • Executes dropped EXE
      PID:4880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\4186d0c6f4550825bb2abafe6114cb7a400a2bcdafa781d608e9399aff5d0ff4.exe

    Filesize

    256KB

    MD5

    32ca05b266d3735d66be46fee3408bcb

    SHA1

    270b6b3a4c116036ecc5c5c96a76bb752e7d9553

    SHA256

    c0041f2327ba79cd54f2d9ff392df3cf17b9193506970ab64a746a98e4c08ae7

    SHA512

    c5bd4330da6253e1e8ba1a4817e2d0b0240aad02a4339912709fecd18b4cf71967638021eee06e4bfab65b09b1cdb9227cecb6e19f56ceaefc695c645b1dd332

  • C:\Users\Admin\AppData\Local\Temp\3582-490\4186d0c6f4550825bb2abafe6114cb7a400a2bcdafa781d608e9399aff5d0ff4.exe

    Filesize

    256KB

    MD5

    32ca05b266d3735d66be46fee3408bcb

    SHA1

    270b6b3a4c116036ecc5c5c96a76bb752e7d9553

    SHA256

    c0041f2327ba79cd54f2d9ff392df3cf17b9193506970ab64a746a98e4c08ae7

    SHA512

    c5bd4330da6253e1e8ba1a4817e2d0b0240aad02a4339912709fecd18b4cf71967638021eee06e4bfab65b09b1cdb9227cecb6e19f56ceaefc695c645b1dd332