Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2022 11:51

General

  • Target

    ddd6cf10bf1cf4e376407bd125d4444fad837e74f3d4b14f7470b5b086213c82.exe

  • Size

    85KB

  • MD5

    49fe82fed15d3e3527ebc6c725e15ec0

  • SHA1

    f3e26e38056804a001fec5e3f7c4fad10f6057c2

  • SHA256

    ddd6cf10bf1cf4e376407bd125d4444fad837e74f3d4b14f7470b5b086213c82

  • SHA512

    8641f098e0df6ec9364ba93e45d6611f9bbd49bf8e2bea2fa68521b52710586391878a547f098f05bdac80b1a07d36dbedaae829f1d1358464c07a5d1b86712a

  • SSDEEP

    1536:yxqjQ+P04wsZLnDrC/YNmCivHx8+nrLxPhel/sq:zr8WDrC+qHe+/bel0q

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ddd6cf10bf1cf4e376407bd125d4444fad837e74f3d4b14f7470b5b086213c82.exe
    "C:\Users\Admin\AppData\Local\Temp\ddd6cf10bf1cf4e376407bd125d4444fad837e74f3d4b14f7470b5b086213c82.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Local\Temp\3582-490\ddd6cf10bf1cf4e376407bd125d4444fad837e74f3d4b14f7470b5b086213c82.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\ddd6cf10bf1cf4e376407bd125d4444fad837e74f3d4b14f7470b5b086213c82.exe"
      2⤵
      • Executes dropped EXE
      PID:3384

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\ddd6cf10bf1cf4e376407bd125d4444fad837e74f3d4b14f7470b5b086213c82.exe
    Filesize

    45KB

    MD5

    97236558e9374fe56b7c7d05dee21b4d

    SHA1

    c7e96f5789c6175b476f04bacc5c9fad6efe9654

    SHA256

    e63d3e1f405a62b5358ccb3ce9d4337a2d0fab9c95598f530316bf17dea4956d

    SHA512

    e9aaaf521d9ee457b074da3beb26008821f970c23e608f8a8e0abf73ef016e0872db7d75b10a8719fd9d4857aa7093aa766c0eb3010a05ec4c9cd810a3487af5

  • C:\Users\Admin\AppData\Local\Temp\3582-490\ddd6cf10bf1cf4e376407bd125d4444fad837e74f3d4b14f7470b5b086213c82.exe
    Filesize

    45KB

    MD5

    97236558e9374fe56b7c7d05dee21b4d

    SHA1

    c7e96f5789c6175b476f04bacc5c9fad6efe9654

    SHA256

    e63d3e1f405a62b5358ccb3ce9d4337a2d0fab9c95598f530316bf17dea4956d

    SHA512

    e9aaaf521d9ee457b074da3beb26008821f970c23e608f8a8e0abf73ef016e0872db7d75b10a8719fd9d4857aa7093aa766c0eb3010a05ec4c9cd810a3487af5

  • memory/3384-132-0x0000000000000000-mapping.dmp