Analysis

  • max time kernel
    125s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-10-2022 02:53

General

  • Target

    fb79131fc1cc55b31134b2226b27ba540dbd531644ecc9e4f933455a3e02f493.exe

  • Size

    124KB

  • MD5

    847c539fa55aee9376bf955ea2ae2198

  • SHA1

    02872576a4effce53354567af57fc7c754052853

  • SHA256

    fb79131fc1cc55b31134b2226b27ba540dbd531644ecc9e4f933455a3e02f493

  • SHA512

    c6e63e278680488aee7f6fc27da0c34b9a8c5c29a585ec5b3b34bedc498b8634648ae5eae498fcd15259759c493147b1b2a7b65e4b1900dc082375212a6c2327

  • SSDEEP

    1536:JxqjQ+P04wsmJCfcKhsOZDDhMSPLjFi642nPK3UG6vskFf0x4eGkP9Ikw3KA50:sr85C/BZDDhMSPtK3UtpJQtGi943+

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb79131fc1cc55b31134b2226b27ba540dbd531644ecc9e4f933455a3e02f493.exe
    "C:\Users\Admin\AppData\Local\Temp\fb79131fc1cc55b31134b2226b27ba540dbd531644ecc9e4f933455a3e02f493.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Users\Admin\AppData\Local\Temp\3582-490\fb79131fc1cc55b31134b2226b27ba540dbd531644ecc9e4f933455a3e02f493.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\fb79131fc1cc55b31134b2226b27ba540dbd531644ecc9e4f933455a3e02f493.exe"
      2⤵
      • Executes dropped EXE
      PID:5092

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\fb79131fc1cc55b31134b2226b27ba540dbd531644ecc9e4f933455a3e02f493.exe

    Filesize

    83KB

    MD5

    84d7126f62a2863a7ce049bbe595a742

    SHA1

    597caec594a3706a79bda9ef5da18e48e229e818

    SHA256

    e53c192405bbd66cf6e622d9128e65c858ebdfeced0b1e70a2b4bba777c877e3

    SHA512

    cf135cd0c877420498e6a080a1a339cdf79d3629e5b18e23fbf9fb4ea8dd0d2389c3c932cac7b1ded5a517b788764a0f389a89cdf7d654ea1e000673cbab385c

  • C:\Users\Admin\AppData\Local\Temp\3582-490\fb79131fc1cc55b31134b2226b27ba540dbd531644ecc9e4f933455a3e02f493.exe

    Filesize

    83KB

    MD5

    84d7126f62a2863a7ce049bbe595a742

    SHA1

    597caec594a3706a79bda9ef5da18e48e229e818

    SHA256

    e53c192405bbd66cf6e622d9128e65c858ebdfeced0b1e70a2b4bba777c877e3

    SHA512

    cf135cd0c877420498e6a080a1a339cdf79d3629e5b18e23fbf9fb4ea8dd0d2389c3c932cac7b1ded5a517b788764a0f389a89cdf7d654ea1e000673cbab385c

  • memory/5092-132-0x0000000000000000-mapping.dmp