Analysis

  • max time kernel
    151s
  • max time network
    65s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 21:31

General

  • Target

    3bf0c18fb6fdc4981fd4c16a0bee89fe07690168671b507b0e45ad8d324c866d.exe

  • Size

    850KB

  • MD5

    1e6bbe9cc2fe6d64457ab5a8bd61d181

  • SHA1

    cc9620887a85a8f80d0fa3353ef77398111fadf6

  • SHA256

    3bf0c18fb6fdc4981fd4c16a0bee89fe07690168671b507b0e45ad8d324c866d

  • SHA512

    c1b6943662f22f013f8debf7ef3e70cb87f6d9814b92722c138a1982ffdeda901dab85212cda4400d0b00ce20fd537e224906fda0748e720d141f970cee0655e

  • SSDEEP

    12288:RnbuFP8qrHtOZgcaHgkCyz114d96Gv6knCUnDelclIV03ykMDu:AFkvZ6CQO36Gv6knCUe1Du

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bf0c18fb6fdc4981fd4c16a0bee89fe07690168671b507b0e45ad8d324c866d.exe
    "C:\Users\Admin\AppData\Local\Temp\3bf0c18fb6fdc4981fd4c16a0bee89fe07690168671b507b0e45ad8d324c866d.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Users\Admin\AppData\Local\Temp\3582-490\3bf0c18fb6fdc4981fd4c16a0bee89fe07690168671b507b0e45ad8d324c866d.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\3bf0c18fb6fdc4981fd4c16a0bee89fe07690168671b507b0e45ad8d324c866d.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:840

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\3bf0c18fb6fdc4981fd4c16a0bee89fe07690168671b507b0e45ad8d324c866d.exe
    Filesize

    810KB

    MD5

    30d469b9782f47944adabd7e2a5c8f43

    SHA1

    263de3c112d04df98d346007124ed69ba731ef28

    SHA256

    d5b0c1b6ea5b4c7e04b9bd12a4f5e5f33b833178957bca11d30eb3151bce65ed

    SHA512

    876b475d19afd0a2c0e0b3527e1577e5ce2de9cfceb93cab529edba759f75c0267297cab8986d40172cc1eb78c3aaaadbdebc5d1aa53e9f9f950873f4efb5714

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\3bf0c18fb6fdc4981fd4c16a0bee89fe07690168671b507b0e45ad8d324c866d.exe
    Filesize

    810KB

    MD5

    30d469b9782f47944adabd7e2a5c8f43

    SHA1

    263de3c112d04df98d346007124ed69ba731ef28

    SHA256

    d5b0c1b6ea5b4c7e04b9bd12a4f5e5f33b833178957bca11d30eb3151bce65ed

    SHA512

    876b475d19afd0a2c0e0b3527e1577e5ce2de9cfceb93cab529edba759f75c0267297cab8986d40172cc1eb78c3aaaadbdebc5d1aa53e9f9f950873f4efb5714

  • \Users\Admin\AppData\Local\Temp\3582-490\3bf0c18fb6fdc4981fd4c16a0bee89fe07690168671b507b0e45ad8d324c866d.exe
    Filesize

    810KB

    MD5

    30d469b9782f47944adabd7e2a5c8f43

    SHA1

    263de3c112d04df98d346007124ed69ba731ef28

    SHA256

    d5b0c1b6ea5b4c7e04b9bd12a4f5e5f33b833178957bca11d30eb3151bce65ed

    SHA512

    876b475d19afd0a2c0e0b3527e1577e5ce2de9cfceb93cab529edba759f75c0267297cab8986d40172cc1eb78c3aaaadbdebc5d1aa53e9f9f950873f4efb5714

  • memory/840-57-0x0000000000000000-mapping.dmp
  • memory/1744-54-0x0000000076DC1000-0x0000000076DC3000-memory.dmp
    Filesize

    8KB