Analysis

  • max time kernel
    158s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 21:39

General

  • Target

    7686b70034aaffb5edde2a88d4818ce61e148d5316ce29197203363be956a156.exe

  • Size

    40KB

  • MD5

    0619c4dd7a4fb1e7720ca3410a5a8278

  • SHA1

    0eff3c3912ce752e7c2fdb0c276d020188f9f77e

  • SHA256

    7686b70034aaffb5edde2a88d4818ce61e148d5316ce29197203363be956a156

  • SHA512

    15accb47e1ee04e0e5f513068f86d4171bbd68308aef0ccf8986d6d3e844b6d87186e24d63051b88d24217c7499508cda0c66d59a2dd135434be8655d3b77488

  • SSDEEP

    768:eyxqjQl/EMQt4Oei7RwsHxyP7nbxzOQdJAZF:JxqjQ+P04wsmJC

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies registry class 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7686b70034aaffb5edde2a88d4818ce61e148d5316ce29197203363be956a156.exe
    "C:\Users\Admin\AppData\Local\Temp\7686b70034aaffb5edde2a88d4818ce61e148d5316ce29197203363be956a156.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    PID:2548

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads