Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 21:39

General

  • Target

    d4521eb31d41307d254465e86777d0fe78d95dc7db68d464adb54518670c10ee.exe

  • Size

    127KB

  • MD5

    05995838b83f0abd6bb59f8bbe14ef00

  • SHA1

    a53a150517a4118151580fb0b846cc098f3f614c

  • SHA256

    d4521eb31d41307d254465e86777d0fe78d95dc7db68d464adb54518670c10ee

  • SHA512

    3b6731bc8be1c14b862f871d940fea168a30f674a62cbc823fea0306a2ab52a9da9140c75ea357070241326b5033cb6c3f40aa398e76beafad5536d11441b946

  • SSDEEP

    1536:JxqjQ+P04wsmJCuMKJ3j5kLaT576SM3l0TcnM45QBejSRIZGra0WvKSr:sr85CuZ3VHd2z3UcM45ZGIEhSKC

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4521eb31d41307d254465e86777d0fe78d95dc7db68d464adb54518670c10ee.exe
    "C:\Users\Admin\AppData\Local\Temp\d4521eb31d41307d254465e86777d0fe78d95dc7db68d464adb54518670c10ee.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Users\Admin\AppData\Local\Temp\3582-490\d4521eb31d41307d254465e86777d0fe78d95dc7db68d464adb54518670c10ee.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\d4521eb31d41307d254465e86777d0fe78d95dc7db68d464adb54518670c10ee.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4316
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c C:\Users\Admin\AppData\Local\Temp\a96619.bat "C:\Users\Admin\AppData\Local\Temp\3582-490\d4521eb31d41307d254465e86777d0fe78d95dc7db68d464adb54518670c10ee.exe"
        3⤵
          PID:4940

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\3582-490\d4521eb31d41307d254465e86777d0fe78d95dc7db68d464adb54518670c10ee.exe

            Filesize

            87KB

            MD5

            5c10e7da7a833d6c81df9636d57c58e9

            SHA1

            3785d9ad31555c0fae58dd2c65af96be7f2f7323

            SHA256

            1db7189edf79a5d69c17219fa36d35752eaa5306d23835428aa3653bf6a18cb5

            SHA512

            129e30217dab79bd3b666f849eb84b402982f77db06bbb3b078fd694c7d0f2664f9a59a4ef46edd5699c9d350e1c047648ed83ddce3dbd6179b3ccee33db52d6

          • C:\Users\Admin\AppData\Local\Temp\3582-490\d4521eb31d41307d254465e86777d0fe78d95dc7db68d464adb54518670c10ee.exe

            Filesize

            87KB

            MD5

            5c10e7da7a833d6c81df9636d57c58e9

            SHA1

            3785d9ad31555c0fae58dd2c65af96be7f2f7323

            SHA256

            1db7189edf79a5d69c17219fa36d35752eaa5306d23835428aa3653bf6a18cb5

            SHA512

            129e30217dab79bd3b666f849eb84b402982f77db06bbb3b078fd694c7d0f2664f9a59a4ef46edd5699c9d350e1c047648ed83ddce3dbd6179b3ccee33db52d6

          • C:\Users\Admin\AppData\Local\Temp\a96619.bat

            Filesize

            57B

            MD5

            acce5ca0e1fac8ca8e7c1d77724f78de

            SHA1

            2e3335d667f21805809daed25e931c6f3f396aa4

            SHA256

            57786a30754d8b1ac5747d6cc9b48857fff5168148c5b75645c83350d9353f62

            SHA512

            75a1d7493819d5065927fc528e46983ab44e23320b15d9da92d30322d70b1fdb5983a31b1a007896b8ba54a723f186303bc01beade89b7ef00cb28ddbb82bcc6