Analysis

  • max time kernel
    190s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-11-2022 22:27

General

  • Target

    2a8e8d065364899b9fa19d433fde0585aad4976995d03e1bf116797bf20437f1.exe

  • Size

    630KB

  • MD5

    3702b7d85365e613d63fb7b3d9e35020

  • SHA1

    f9b247fdbdd0e04420a813ff36b38acfe65657b0

  • SHA256

    2a8e8d065364899b9fa19d433fde0585aad4976995d03e1bf116797bf20437f1

  • SHA512

    3dbaf48f5b178c9da052ebabb08b2dbff49790e3340c37d8910fa30f58ec4fe19f6f7a0ac96a373e6fb20005f4fd6f0e33674c216472968941fb8ce782e6c80c

  • SSDEEP

    6144:k9n/1cibKq3asu+aa3HSZ0GXgU0bV28P7O7JN7ZB1EIH0U+JyDgrlTU2MQRz4L/o:+uq3zNiXSZvTy1nH0U+0gRU2P0LgJbcQ

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 4 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a8e8d065364899b9fa19d433fde0585aad4976995d03e1bf116797bf20437f1.exe
    "C:\Users\Admin\AppData\Local\Temp\2a8e8d065364899b9fa19d433fde0585aad4976995d03e1bf116797bf20437f1.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Users\Admin\AppData\Local\Temp\3582-490\2a8e8d065364899b9fa19d433fde0585aad4976995d03e1bf116797bf20437f1.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\2a8e8d065364899b9fa19d433fde0585aad4976995d03e1bf116797bf20437f1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: RenamesItself
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 584
        3⤵
        • Program crash
        PID:4424
      • C:\Users\Admin\AppData\Local\Temp\2a8e8d065364899b9fa19d433fde0585aad4976995d03e1bf116797bf20437f1.exe
        "C:\Users\Admin\AppData\Local\Temp\3582-490\2a8e8d065364899b9fa19d433fde0585aad4976995d03e1bf116797bf20437f1.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:3184
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 560
          4⤵
          • Program crash
          PID:3016
        • C:\Users\Admin\AppData\Local\Temp\2a8e8d065364899b9fa19d433fde0585aad4976995d03e1bf116797bf20437f1.exe
          start
          4⤵
          • Executes dropped EXE
          • Suspicious use of UnmapMainImage
          PID:3096
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 560
            5⤵
            • Program crash
            PID:1716
        • C:\Users\Admin\AppData\Local\Temp\2a8e8d065364899b9fa19d433fde0585aad4976995d03e1bf116797bf20437f1.exe
          watch
          4⤵
          • Executes dropped EXE
          • Suspicious use of UnmapMainImage
          PID:4200
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 572
            5⤵
            • Program crash
            PID:3752
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2708 -ip 2708
    1⤵
      PID:2448
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3184 -ip 3184
      1⤵
        PID:4604
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3096 -ip 3096
        1⤵
          PID:3444
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4200 -ip 4200
          1⤵
            PID:2108

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Change Default File Association

          1
          T1042

          Defense Evasion

          Modify Registry

          1
          T1112

          Credential Access

          Credentials in Files

          1
          T1081

          Discovery

          Query Registry

          1
          T1012

          System Information Discovery

          2
          T1082

          Collection

          Data from Local System

          1
          T1005

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\2a8e8d065364899b9fa19d433fde0585aad4976995d03e1bf116797bf20437f1.exe
            Filesize

            589KB

            MD5

            4b7b280b3c602b024d96ad24bc4c3d08

            SHA1

            644ee76c0968f66b18b68f415e81e6a26766f8ee

            SHA256

            fa79b68f89a9f750ef0ebb3b300dec2ad16c9ec27c2dc1a05f78a47ba509f1e1

            SHA512

            b800eb3c4cf68279329886056c445c4ddbc27bed09702d522d9d26b0af87439b7485d4b8bc03f667ca372dc7f4ca2b9a79d6c144653c8b3ad8b96e0713b4bb94

          • C:\Users\Admin\AppData\Local\Temp\2a8e8d065364899b9fa19d433fde0585aad4976995d03e1bf116797bf20437f1.exe
            Filesize

            589KB

            MD5

            4b7b280b3c602b024d96ad24bc4c3d08

            SHA1

            644ee76c0968f66b18b68f415e81e6a26766f8ee

            SHA256

            fa79b68f89a9f750ef0ebb3b300dec2ad16c9ec27c2dc1a05f78a47ba509f1e1

            SHA512

            b800eb3c4cf68279329886056c445c4ddbc27bed09702d522d9d26b0af87439b7485d4b8bc03f667ca372dc7f4ca2b9a79d6c144653c8b3ad8b96e0713b4bb94

          • C:\Users\Admin\AppData\Local\Temp\2a8e8d065364899b9fa19d433fde0585aad4976995d03e1bf116797bf20437f1.exe
            Filesize

            589KB

            MD5

            4b7b280b3c602b024d96ad24bc4c3d08

            SHA1

            644ee76c0968f66b18b68f415e81e6a26766f8ee

            SHA256

            fa79b68f89a9f750ef0ebb3b300dec2ad16c9ec27c2dc1a05f78a47ba509f1e1

            SHA512

            b800eb3c4cf68279329886056c445c4ddbc27bed09702d522d9d26b0af87439b7485d4b8bc03f667ca372dc7f4ca2b9a79d6c144653c8b3ad8b96e0713b4bb94

          • C:\Users\Admin\AppData\Local\Temp\2a8e8d065364899b9fa19d433fde0585aad4976995d03e1bf116797bf20437f1.exe
            Filesize

            589KB

            MD5

            4b7b280b3c602b024d96ad24bc4c3d08

            SHA1

            644ee76c0968f66b18b68f415e81e6a26766f8ee

            SHA256

            fa79b68f89a9f750ef0ebb3b300dec2ad16c9ec27c2dc1a05f78a47ba509f1e1

            SHA512

            b800eb3c4cf68279329886056c445c4ddbc27bed09702d522d9d26b0af87439b7485d4b8bc03f667ca372dc7f4ca2b9a79d6c144653c8b3ad8b96e0713b4bb94

          • C:\Users\Admin\AppData\Local\Temp\3582-490\2a8e8d065364899b9fa19d433fde0585aad4976995d03e1bf116797bf20437f1.exe
            Filesize

            589KB

            MD5

            4b7b280b3c602b024d96ad24bc4c3d08

            SHA1

            644ee76c0968f66b18b68f415e81e6a26766f8ee

            SHA256

            fa79b68f89a9f750ef0ebb3b300dec2ad16c9ec27c2dc1a05f78a47ba509f1e1

            SHA512

            b800eb3c4cf68279329886056c445c4ddbc27bed09702d522d9d26b0af87439b7485d4b8bc03f667ca372dc7f4ca2b9a79d6c144653c8b3ad8b96e0713b4bb94

          • C:\Users\Admin\AppData\Local\Temp\3582-490\2a8e8d065364899b9fa19d433fde0585aad4976995d03e1bf116797bf20437f1.exe
            Filesize

            589KB

            MD5

            4b7b280b3c602b024d96ad24bc4c3d08

            SHA1

            644ee76c0968f66b18b68f415e81e6a26766f8ee

            SHA256

            fa79b68f89a9f750ef0ebb3b300dec2ad16c9ec27c2dc1a05f78a47ba509f1e1

            SHA512

            b800eb3c4cf68279329886056c445c4ddbc27bed09702d522d9d26b0af87439b7485d4b8bc03f667ca372dc7f4ca2b9a79d6c144653c8b3ad8b96e0713b4bb94

          • memory/2708-135-0x00000000020C0000-0x00000000020DF000-memory.dmp
            Filesize

            124KB

          • memory/2708-139-0x0000000000400000-0x0000000000493000-memory.dmp
            Filesize

            588KB

          • memory/2708-132-0x0000000000000000-mapping.dmp
          • memory/2708-136-0x0000000000400000-0x0000000000493000-memory.dmp
            Filesize

            588KB

          • memory/3096-150-0x0000000000400000-0x0000000000493000-memory.dmp
            Filesize

            588KB

          • memory/3096-141-0x0000000000000000-mapping.dmp
          • memory/3096-146-0x0000000000400000-0x0000000000493000-memory.dmp
            Filesize

            588KB

          • memory/3184-137-0x0000000000000000-mapping.dmp
          • memory/3184-145-0x0000000000400000-0x0000000000493000-memory.dmp
            Filesize

            588KB

          • memory/3184-140-0x0000000000400000-0x0000000000493000-memory.dmp
            Filesize

            588KB

          • memory/4200-147-0x0000000000400000-0x0000000000493000-memory.dmp
            Filesize

            588KB

          • memory/4200-148-0x0000000000400000-0x0000000000493000-memory.dmp
            Filesize

            588KB

          • memory/4200-142-0x0000000000000000-mapping.dmp
          • memory/4200-151-0x0000000000400000-0x0000000000493000-memory.dmp
            Filesize

            588KB