Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2022 11:23

General

  • Target

    fb3e6bcac169c1bf9b56002ddcace1e19f6c3c38828552e71a1d83bfa7cc7480.exe

  • Size

    692KB

  • MD5

    38fe8a92a7e43b48e6d9c9ae13e2e9c0

  • SHA1

    4d216a2a888f543ba196fa1aea22f4bc30e3189a

  • SHA256

    fb3e6bcac169c1bf9b56002ddcace1e19f6c3c38828552e71a1d83bfa7cc7480

  • SHA512

    6b2031a308da1ee6e422bc39ba8ccf53562b29d757979beb9a41d0e39e0b35a27b0cc5fc97b994822c5574c4adb46f42249d540b6b159fb0ee309410408a718c

  • SSDEEP

    12288:/1IrmedBigNA8BmUE5h4ytt0FPSQ1WjHo9zFaOw3D6S:8maB3FmUEj4ytt0FPB1SomB

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb3e6bcac169c1bf9b56002ddcace1e19f6c3c38828552e71a1d83bfa7cc7480.exe
    "C:\Users\Admin\AppData\Local\Temp\fb3e6bcac169c1bf9b56002ddcace1e19f6c3c38828552e71a1d83bfa7cc7480.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Users\Admin\AppData\Local\Temp\3582-490\fb3e6bcac169c1bf9b56002ddcace1e19f6c3c38828552e71a1d83bfa7cc7480.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\fb3e6bcac169c1bf9b56002ddcace1e19f6c3c38828552e71a1d83bfa7cc7480.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4784
      • C:\Users\Admin\AppData\Local\Temp\3582-490\fb3e6bcac169c1bf9b56002ddcace1e19f6c3c38828552e71a1d83bfa7cc7480mgr.exe
        C:\Users\Admin\AppData\Local\Temp\3582-490\fb3e6bcac169c1bf9b56002ddcace1e19f6c3c38828552e71a1d83bfa7cc7480mgr.exe
        3⤵
        • Executes dropped EXE
        PID:4708
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 264
          4⤵
          • Program crash
          PID:4612
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4708 -ip 4708
    1⤵
      PID:4752

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\3582-490\fb3e6bcac169c1bf9b56002ddcace1e19f6c3c38828552e71a1d83bfa7cc7480.exe

      Filesize

      652KB

      MD5

      97e25a6bd9697b04272696cb0ad46ec7

      SHA1

      4373d0d42c078f3297ca15975fac688ed110222f

      SHA256

      068c6871c56565ca8962b7f8e1377d137a517a16ea15642b69bac2dbe3d4c758

      SHA512

      55e67f23d40d0597eb49617d73fe8c5ad18e848eec452bd2147919d03d97f3a3e71e699c2da75df4c0cd580630a2bcb2d8f017007c327757d744bcb3d652fc4f

    • C:\Users\Admin\AppData\Local\Temp\3582-490\fb3e6bcac169c1bf9b56002ddcace1e19f6c3c38828552e71a1d83bfa7cc7480.exe

      Filesize

      652KB

      MD5

      97e25a6bd9697b04272696cb0ad46ec7

      SHA1

      4373d0d42c078f3297ca15975fac688ed110222f

      SHA256

      068c6871c56565ca8962b7f8e1377d137a517a16ea15642b69bac2dbe3d4c758

      SHA512

      55e67f23d40d0597eb49617d73fe8c5ad18e848eec452bd2147919d03d97f3a3e71e699c2da75df4c0cd580630a2bcb2d8f017007c327757d744bcb3d652fc4f

    • C:\Users\Admin\AppData\Local\Temp\3582-490\fb3e6bcac169c1bf9b56002ddcace1e19f6c3c38828552e71a1d83bfa7cc7480mgr.exe

      Filesize

      104KB

      MD5

      84b7783804fa7506672a409e9899c6be

      SHA1

      2da8a6e9c04662564e18cdf98f73e224a5662533

      SHA256

      b26a93c17ac6a412c6c191aa6a1543537f3185fe813c24153c6dec736fbad4ef

      SHA512

      8a867296b05f45dd79ab64b11b6cc0cc8fad835b2f5ba9b8469981cc9b3e15c91f98b688cbe7addfab7ea2bd55a1d475fc853c004afb24be1b5691f8183c897c

    • C:\Users\Admin\AppData\Local\Temp\3582-490\fb3e6bcac169c1bf9b56002ddcace1e19f6c3c38828552e71a1d83bfa7cc7480mgr.exe

      Filesize

      104KB

      MD5

      84b7783804fa7506672a409e9899c6be

      SHA1

      2da8a6e9c04662564e18cdf98f73e224a5662533

      SHA256

      b26a93c17ac6a412c6c191aa6a1543537f3185fe813c24153c6dec736fbad4ef

      SHA512

      8a867296b05f45dd79ab64b11b6cc0cc8fad835b2f5ba9b8469981cc9b3e15c91f98b688cbe7addfab7ea2bd55a1d475fc853c004afb24be1b5691f8183c897c

    • memory/4708-135-0x0000000000000000-mapping.dmp

    • memory/4708-139-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/4784-132-0x0000000000000000-mapping.dmp

    • memory/4784-138-0x0000000000400000-0x00000000004A7000-memory.dmp

      Filesize

      668KB