Analysis

  • max time kernel
    57s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 20:27

General

  • Target

    742c1d3c45649a93db4f293980e3c123b64be15961ccbb7cfc2dfae7a08191c2.exe

  • Size

    1003KB

  • MD5

    5dad1abf24eaa50c231e424cffd99622

  • SHA1

    c6fabd44012f416f1c778d1737ca67b38a4fd563

  • SHA256

    742c1d3c45649a93db4f293980e3c123b64be15961ccbb7cfc2dfae7a08191c2

  • SHA512

    99e4b54c7bacbfef343fe6ff5bf990b1e0306e4abfba97a4796f44d43f6cb7baa22f0d4e10937c68f8edabeee44eb656d46b6fdf80afe83da567ffbe25960002

  • SSDEEP

    24576:yvK0hl68rMsD5H7c5SARcjD17UR/tTrcjOd2cTNuyLAWzSXnJsYzrlYH:lUcOMoWRcrO2ylzSXJj2H

Malware Config

Signatures

  • Detect Neshta payload 7 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\742c1d3c45649a93db4f293980e3c123b64be15961ccbb7cfc2dfae7a08191c2.exe
    "C:\Users\Admin\AppData\Local\Temp\742c1d3c45649a93db4f293980e3c123b64be15961ccbb7cfc2dfae7a08191c2.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Users\Admin\AppData\Local\Temp\742c1d3c45649a93db4f293980e3c123b64be15961ccbb7cfc2dfae7a08191c2.exe
      C:\Users\Admin\AppData\Local\Temp\742c1d3c45649a93db4f293980e3c123b64be15961ccbb7cfc2dfae7a08191c2.exe
      2⤵
      • Modifies system executable filetype association
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies registry class
      PID:1636

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1636-57-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1636-56-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1636-59-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1636-60-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1636-61-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1636-62-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1636-63-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1636-65-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1636-66-0x00000000004080E4-mapping.dmp

  • memory/1636-67-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1636-68-0x00000000761F1000-0x00000000761F3000-memory.dmp

    Filesize

    8KB

  • memory/1636-69-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1636-70-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1636-71-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1636-72-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB