Analysis

  • max time kernel
    171s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2022 23:21

General

  • Target

    d8d8c25f5deb919119bec928bde489942adbfe9cd3d831969ef5d35417ad7d63.exe

  • Size

    639KB

  • MD5

    4252ada6d090e54ef59e088106f20340

  • SHA1

    15093e4433a995e25c7f45aab38744a73864a15c

  • SHA256

    d8d8c25f5deb919119bec928bde489942adbfe9cd3d831969ef5d35417ad7d63

  • SHA512

    4a1d331571654123bf26cca978b18585a9b427f79050996d04042567ff62149b2e3a4dbb2084cec516ae78e02d612fe0c98cf7634c5dce3fe7cf3fa7ff2dc434

  • SSDEEP

    12288:yb96EMvksFJluEV7k/qb5EXY6F4YtHK0WScr5w18zi3N6sgI7o:/bV7k/tqwHK0cr5w18zi3N6sp7o

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d8d8c25f5deb919119bec928bde489942adbfe9cd3d831969ef5d35417ad7d63.exe
    "C:\Users\Admin\AppData\Local\Temp\d8d8c25f5deb919119bec928bde489942adbfe9cd3d831969ef5d35417ad7d63.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Users\Admin\AppData\Local\Temp\3582-490\d8d8c25f5deb919119bec928bde489942adbfe9cd3d831969ef5d35417ad7d63.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\d8d8c25f5deb919119bec928bde489942adbfe9cd3d831969ef5d35417ad7d63.exe"
      2⤵
      • Executes dropped EXE
      • Looks for VMWare Tools registry key
      PID:1292

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\d8d8c25f5deb919119bec928bde489942adbfe9cd3d831969ef5d35417ad7d63.exe

    Filesize

    598KB

    MD5

    3b69bebd03aab806757dbca9c0c70fb3

    SHA1

    cb754e556e787a42b872bd12cf2c50910edfe46b

    SHA256

    de085b253dfa6f8550c3ef89307c2a16f5de2540f904088f33c469cd18ddd80b

    SHA512

    610375d30f64be3028033f6881351b4479735bbaf53440494b751d8fee86e003dc8015c571380bc7a0581e840c55e7c557f28b80ed575d12997e39d26f2004e2

  • C:\Users\Admin\AppData\Local\Temp\3582-490\d8d8c25f5deb919119bec928bde489942adbfe9cd3d831969ef5d35417ad7d63.exe

    Filesize

    598KB

    MD5

    3b69bebd03aab806757dbca9c0c70fb3

    SHA1

    cb754e556e787a42b872bd12cf2c50910edfe46b

    SHA256

    de085b253dfa6f8550c3ef89307c2a16f5de2540f904088f33c469cd18ddd80b

    SHA512

    610375d30f64be3028033f6881351b4479735bbaf53440494b751d8fee86e003dc8015c571380bc7a0581e840c55e7c557f28b80ed575d12997e39d26f2004e2

  • memory/1292-132-0x0000000000000000-mapping.dmp