Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2022 11:22

General

  • Target

    23c6008e50c0b6a655d9f61c8f7f6e5f0bc1410cfe5bf279ca4ee4d67fe4d09e.exe

  • Size

    178KB

  • MD5

    41203c855ad40eb8f2805b6d07330170

  • SHA1

    ff052d48fdae4a0fa2f0ea3ae6ad5a80396f0412

  • SHA256

    23c6008e50c0b6a655d9f61c8f7f6e5f0bc1410cfe5bf279ca4ee4d67fe4d09e

  • SHA512

    96c4e5183f372cee9f334264c528c45e9a6f2fff811559c676dc40736434a17f883e8858c0fde8841e35d799fac18e303c439c807ce71cccc82f198c4000623b

  • SSDEEP

    3072:sr85CsCY4MS+d6c0Q3p37DauwpkJrQ4gS8Qatcwdba:k9HY6+ddlDaTStaFba

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23c6008e50c0b6a655d9f61c8f7f6e5f0bc1410cfe5bf279ca4ee4d67fe4d09e.exe
    "C:\Users\Admin\AppData\Local\Temp\23c6008e50c0b6a655d9f61c8f7f6e5f0bc1410cfe5bf279ca4ee4d67fe4d09e.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Users\Admin\AppData\Local\Temp\3582-490\23c6008e50c0b6a655d9f61c8f7f6e5f0bc1410cfe5bf279ca4ee4d67fe4d09e.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\23c6008e50c0b6a655d9f61c8f7f6e5f0bc1410cfe5bf279ca4ee4d67fe4d09e.exe"
      2⤵
      • Executes dropped EXE
      PID:4984
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 4984 -s 392
        3⤵
        • Program crash
        PID:5104
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 424 -p 4984 -ip 4984
    1⤵
      PID:2036

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\3582-490\23c6008e50c0b6a655d9f61c8f7f6e5f0bc1410cfe5bf279ca4ee4d67fe4d09e.exe

      Filesize

      138KB

      MD5

      de381a33319c952d815b791064e65685

      SHA1

      178f5d718d515e27ff17ccf3886914b1f586d969

      SHA256

      77b5ede735710506ef1fb4cbd0fc0c799136d0c579f510ed944f71dce6694dc8

      SHA512

      1fea5c1576d6c5db5d0f04e1e207093813e87542b148443596d2c001aad34c584b2bab18861f10024395195728bcfcc54fbbdcf0fb77b78c225ffd0cd22cb3b0

    • C:\Users\Admin\AppData\Local\Temp\3582-490\23c6008e50c0b6a655d9f61c8f7f6e5f0bc1410cfe5bf279ca4ee4d67fe4d09e.exe

      Filesize

      138KB

      MD5

      de381a33319c952d815b791064e65685

      SHA1

      178f5d718d515e27ff17ccf3886914b1f586d969

      SHA256

      77b5ede735710506ef1fb4cbd0fc0c799136d0c579f510ed944f71dce6694dc8

      SHA512

      1fea5c1576d6c5db5d0f04e1e207093813e87542b148443596d2c001aad34c584b2bab18861f10024395195728bcfcc54fbbdcf0fb77b78c225ffd0cd22cb3b0

    • memory/4984-132-0x0000000000000000-mapping.dmp

    • memory/4984-135-0x0000000140000000-0x000000014004C000-memory.dmp

      Filesize

      304KB