Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:20
Behavioral task
behavioral1
Sample
faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe
Resource
win10v2004-20221111-en
General
-
Target
faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe
-
Size
136KB
-
MD5
43129af9a35950bda6543b7bc95ddc52
-
SHA1
bf3215a555868125e598bb8851b3fbda55e26bea
-
SHA256
faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271
-
SHA512
807ab29e14088fbade1e36631c5589469b19bd3fab6280634e84d6fdc284d83e6e3753944fb7a46637c755f9d7a12b0092518acf002982cfba35c5f8f7b08f9c
-
SSDEEP
1536:JxqjQ+P04wsmJCRp/i55b8MfoN5MEjhNbo6FG5Z:sr85CRp/Abp8dY6FG5Z
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 1 IoCs
Processes:
faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exepid process 2868 faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe -
Drops file in Program Files directory 15 IoCs
Processes:
faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exedescription ioc process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe -
Drops file in Windows directory 1 IoCs
Processes:
faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exedescription ioc process File opened for modification C:\Windows\svchost.com faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exedescription pid process target process PID 4912 wrote to memory of 2868 4912 faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe PID 4912 wrote to memory of 2868 4912 faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe PID 4912 wrote to memory of 2868 4912 faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe"C:\Users\Admin\AppData\Local\Temp\faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe"1⤵
- Modifies system executable filetype association
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe"2⤵
- Executes dropped EXE
PID:2868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3582-490\faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe
Filesize96KB
MD5e8daa0b7989b7d4dc11541a0c8919d20
SHA1a03eb714ec70fb9f0d031b0966111902ed6c026d
SHA2565dc11658f0b73da5727a14487193ff2a64396d8804869670e388239b28d5af30
SHA5120a049af034f571b24026c4d4c37299278515a2583d6956b9b8d95bd5b356e5800aa594ad244438db30dfdde2d8f48dc1f8b4d20e9effc5e97a21a5e05222849c
-
C:\Users\Admin\AppData\Local\Temp\3582-490\faa2575a69e2ace3f31fd12e055bcd62e99a0581c27e10e81a62c518a1676271.exe
Filesize96KB
MD5e8daa0b7989b7d4dc11541a0c8919d20
SHA1a03eb714ec70fb9f0d031b0966111902ed6c026d
SHA2565dc11658f0b73da5727a14487193ff2a64396d8804869670e388239b28d5af30
SHA5120a049af034f571b24026c4d4c37299278515a2583d6956b9b8d95bd5b356e5800aa594ad244438db30dfdde2d8f48dc1f8b4d20e9effc5e97a21a5e05222849c