Analysis

  • max time kernel
    53s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2022 21:38

General

  • Target

    fd9d171bcdcc7750ca7cbdcb83c3210a0c17f67f8bf5050ff0c8b2298209251b.exe

  • Size

    84KB

  • MD5

    0f403373e7ea600c1af5a0ea93a0edd0

  • SHA1

    5900cbe589c6af13778e94431ae15058444dfcef

  • SHA256

    fd9d171bcdcc7750ca7cbdcb83c3210a0c17f67f8bf5050ff0c8b2298209251b

  • SHA512

    d9044bd74f142115a00ffb25d4be66f9389df9bd14c4f071a791ab20d052269c8dded29c36426d1152d88b40e5abd33532d4a6935be7cc136fbac99262f24eb5

  • SSDEEP

    1536:JxqjQ+P04wsmJCkA03k/zd2jrk12EmGWK:sr85CZd/zKa2EmLK

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd9d171bcdcc7750ca7cbdcb83c3210a0c17f67f8bf5050ff0c8b2298209251b.exe
    "C:\Users\Admin\AppData\Local\Temp\fd9d171bcdcc7750ca7cbdcb83c3210a0c17f67f8bf5050ff0c8b2298209251b.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Users\Admin\AppData\Local\Temp\3582-490\fd9d171bcdcc7750ca7cbdcb83c3210a0c17f67f8bf5050ff0c8b2298209251b.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\fd9d171bcdcc7750ca7cbdcb83c3210a0c17f67f8bf5050ff0c8b2298209251b.exe"
      2⤵
      • Executes dropped EXE
      PID:884

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\fd9d171bcdcc7750ca7cbdcb83c3210a0c17f67f8bf5050ff0c8b2298209251b.exe

    Filesize

    44KB

    MD5

    b631ad67456cb884a1609593e93de136

    SHA1

    c2d1119638b2dc8a6e96e9cc13effea5c41b32dd

    SHA256

    6050a8a6b6f1d8505f64105b3a23ed22d63707b68fd0a272b6b0e68edf8fd604

    SHA512

    d2e78ae50b8d81d830b8171fa37a2206cb27c29b587e5e13f5cbd48408524008a087bf70764bf86f93e505e95c35cfbba9d82bb1d5bb348aec34fda34b15ac89

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\fd9d171bcdcc7750ca7cbdcb83c3210a0c17f67f8bf5050ff0c8b2298209251b.exe

    Filesize

    44KB

    MD5

    b631ad67456cb884a1609593e93de136

    SHA1

    c2d1119638b2dc8a6e96e9cc13effea5c41b32dd

    SHA256

    6050a8a6b6f1d8505f64105b3a23ed22d63707b68fd0a272b6b0e68edf8fd604

    SHA512

    d2e78ae50b8d81d830b8171fa37a2206cb27c29b587e5e13f5cbd48408524008a087bf70764bf86f93e505e95c35cfbba9d82bb1d5bb348aec34fda34b15ac89

  • memory/1392-54-0x0000000075521000-0x0000000075523000-memory.dmp

    Filesize

    8KB