Analysis

  • max time kernel
    186s
  • max time network
    198s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-11-2022 22:32

General

  • Target

    2d5a9f309145ee31ed84daa697610cc2f5d4a02ef77a80a6751b3de894ac0d56.exe

  • Size

    184KB

  • MD5

    544d6fc5b26a1bb61f09bdfef3b5cd60

  • SHA1

    af020b87a912a08606f64d38aa3d04d679162a42

  • SHA256

    2d5a9f309145ee31ed84daa697610cc2f5d4a02ef77a80a6751b3de894ac0d56

  • SHA512

    7907f7c2fe602c53c3f68ce8bb8fc653afa3de0cd0cf369bf5ee2da33ccdf5c0176ee7d216e22c4af7aceebd93036ba8d3aa6a91915326396e3154a502cf8be1

  • SSDEEP

    3072:jyH99g4byc6H5c6HcT66vlmm+3vIqoma4zhz/4zhgWbX5WvmRUq8Ga:jyH7xOc6H5c6HcT66vlmrQE5gHUeRUq8

Malware Config

Signatures

  • Detect Neshta payload 2 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d5a9f309145ee31ed84daa697610cc2f5d4a02ef77a80a6751b3de894ac0d56.exe
    "C:\Users\Admin\AppData\Local\Temp\2d5a9f309145ee31ed84daa697610cc2f5d4a02ef77a80a6751b3de894ac0d56.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\2d5a9f309145ee31ed84daa697610cc2f5d4a02ef77a80a6751b3de894ac0d56.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3080
      • C:\Users\Admin\AppData\Local\Temp\2d5a9f309145ee31ed84daa697610cc2f5d4a02ef77a80a6751b3de894ac0d56.exe
        "C:\Users\Admin\AppData\Local\Temp\2d5a9f309145ee31ed84daa697610cc2f5d4a02ef77a80a6751b3de894ac0d56.exe"
        3⤵
        • Modifies system executable filetype association
        • Executes dropped EXE
        • Checks computer location settings
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:812
        • C:\Users\Admin\AppData\Local\Temp\3582-490\2d5a9f309145ee31ed84daa697610cc2f5d4a02ef77a80a6751b3de894ac0d56.exe
          "C:\Users\Admin\AppData\Local\Temp\3582-490\2d5a9f309145ee31ed84daa697610cc2f5d4a02ef77a80a6751b3de894ac0d56.exe"
          4⤵
          • Executes dropped EXE
          PID:1052
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:2504

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2d5a9f309145ee31ed84daa697610cc2f5d4a02ef77a80a6751b3de894ac0d56.exe

    Filesize

    149KB

    MD5

    ba54a8005364c7911eef8d8ed877d22a

    SHA1

    74e58b98e26eb5ce543416eb328bc4c1ec13437f

    SHA256

    1a470ffa49183b897aa34f5716b7faac464b5cb7b4962a76e58e878c38d2a222

    SHA512

    932f52aebf4a4aebadd04270dea2771af9df248b2bc49ca7eaee1c27056e17e37e1a52d6083a521cc0350e3cd624804ae6b831ccd94670e43014ddafd32a7369

  • C:\Users\Admin\AppData\Local\Temp\2d5a9f309145ee31ed84daa697610cc2f5d4a02ef77a80a6751b3de894ac0d56.exe

    Filesize

    149KB

    MD5

    ba54a8005364c7911eef8d8ed877d22a

    SHA1

    74e58b98e26eb5ce543416eb328bc4c1ec13437f

    SHA256

    1a470ffa49183b897aa34f5716b7faac464b5cb7b4962a76e58e878c38d2a222

    SHA512

    932f52aebf4a4aebadd04270dea2771af9df248b2bc49ca7eaee1c27056e17e37e1a52d6083a521cc0350e3cd624804ae6b831ccd94670e43014ddafd32a7369

  • C:\Users\Admin\AppData\Local\Temp\3582-490\2d5a9f309145ee31ed84daa697610cc2f5d4a02ef77a80a6751b3de894ac0d56.exe

    Filesize

    108KB

    MD5

    c06c18047c8574fb3ed3913cca2b940b

    SHA1

    55e818ab8382339eb9f68156d569154931c83a6e

    SHA256

    0d68d4916aee07d4a283ab747532081c96badf3a1dc1d86fcc5da23db825059a

    SHA512

    7062561e19fdf14bff00e96e15f542f9a23c1777ada49eea2d42f9d0a8d07bef3863d9c2bcac47124caec0005d47bba51ef472fde4d56513b04d787b8931e3b4

  • C:\Users\Admin\AppData\Local\Temp\3582-490\2d5a9f309145ee31ed84daa697610cc2f5d4a02ef77a80a6751b3de894ac0d56.exe

    Filesize

    108KB

    MD5

    c06c18047c8574fb3ed3913cca2b940b

    SHA1

    55e818ab8382339eb9f68156d569154931c83a6e

    SHA256

    0d68d4916aee07d4a283ab747532081c96badf3a1dc1d86fcc5da23db825059a

    SHA512

    7062561e19fdf14bff00e96e15f542f9a23c1777ada49eea2d42f9d0a8d07bef3863d9c2bcac47124caec0005d47bba51ef472fde4d56513b04d787b8931e3b4

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • memory/812-135-0x0000000000000000-mapping.dmp

  • memory/1052-139-0x0000000000000000-mapping.dmp

  • memory/3080-132-0x0000000000000000-mapping.dmp