Analysis

  • max time kernel
    127s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2022 11:23

General

  • Target

    e8a612fe78e652476725efd558e5c826dfaa6e599412bd9ff79a4d644320a3ce.exe

  • Size

    110KB

  • MD5

    30822fd6bc8d2bea821978dda8c71d20

  • SHA1

    2628f564c8b68f031a686029a007594cb7ec6c7f

  • SHA256

    e8a612fe78e652476725efd558e5c826dfaa6e599412bd9ff79a4d644320a3ce

  • SHA512

    23a320af010c1e8dfb9ccac360bd678013524adc4f5760226670167bce1bf912e8001966ae070b918a3cc2f37d973bb65ae9c4f402e664418c8b70d7cabad48d

  • SSDEEP

    1536:JxqjQ+P04wsmJCH85QG55+vhYdv5O52MchcECycCNWBv+z7Pal:sr85CHOL5EvWJ5O52MchcEa4WBmg

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8a612fe78e652476725efd558e5c826dfaa6e599412bd9ff79a4d644320a3ce.exe
    "C:\Users\Admin\AppData\Local\Temp\e8a612fe78e652476725efd558e5c826dfaa6e599412bd9ff79a4d644320a3ce.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Users\Admin\AppData\Local\Temp\3582-490\e8a612fe78e652476725efd558e5c826dfaa6e599412bd9ff79a4d644320a3ce.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\e8a612fe78e652476725efd558e5c826dfaa6e599412bd9ff79a4d644320a3ce.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5100
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 5100 -s 1212
        3⤵
        • Program crash
        PID:4104
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 408 -p 5100 -ip 5100
    1⤵
      PID:816

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Change Default File Association

    1
    T1042

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\3582-490\e8a612fe78e652476725efd558e5c826dfaa6e599412bd9ff79a4d644320a3ce.exe
      Filesize

      70KB

      MD5

      c64fe1d7879159907608d5f2987f5331

      SHA1

      d242d1db29ca85017306d52f1346e4f7ccd48dfa

      SHA256

      1977d331aa7b779987a187ab574381f40113018cb0913c0b70a7dc9423265664

      SHA512

      0dec958f8c1df793106047ac3c350886291c91ee51c5faf2024111c35e321e101e78baa04cbea58a9ff4275dae27a36ecd11468e01c3454b0b8977bdc8cb6274

    • C:\Users\Admin\AppData\Local\Temp\3582-490\e8a612fe78e652476725efd558e5c826dfaa6e599412bd9ff79a4d644320a3ce.exe
      Filesize

      70KB

      MD5

      c64fe1d7879159907608d5f2987f5331

      SHA1

      d242d1db29ca85017306d52f1346e4f7ccd48dfa

      SHA256

      1977d331aa7b779987a187ab574381f40113018cb0913c0b70a7dc9423265664

      SHA512

      0dec958f8c1df793106047ac3c350886291c91ee51c5faf2024111c35e321e101e78baa04cbea58a9ff4275dae27a36ecd11468e01c3454b0b8977bdc8cb6274

    • memory/5100-132-0x0000000000000000-mapping.dmp
    • memory/5100-135-0x0000000000190000-0x00000000001A8000-memory.dmp
      Filesize

      96KB

    • memory/5100-136-0x00007FFFE1870000-0x00007FFFE2331000-memory.dmp
      Filesize

      10.8MB

    • memory/5100-137-0x00007FFFE1870000-0x00007FFFE2331000-memory.dmp
      Filesize

      10.8MB

    • memory/5100-138-0x000000001BB2A000-0x000000001BB2F000-memory.dmp
      Filesize

      20KB

    • memory/5100-139-0x00007FFFE1870000-0x00007FFFE2331000-memory.dmp
      Filesize

      10.8MB

    • memory/5100-140-0x000000001BB2A000-0x000000001BB2F000-memory.dmp
      Filesize

      20KB