Analysis

  • max time kernel
    186s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 18:12

General

  • Target

    Monkey Island Crypter/Merged.exe

  • Size

    455KB

  • MD5

    9b94fed379a1df2b83fdbef292a5c2ef

  • SHA1

    6b6e18e90afaa434b7d8a5dbc27a187b71324180

  • SHA256

    f6adf8932350281f08f2357eb2ed14d2e2ace877b33f8e1d521c9ab04f227643

  • SHA512

    c5b4c1ab96ebebe32c9dd43a6832176b70ec0e3ee0c7cf6f78c55989e6be2648f21fa6b0af6db96e52b54c4fa7c1d86c65afc8c465e262496e5d7b731d349cdc

  • SSDEEP

    12288:mU9sjjUzqAApXhTRhGgJpcmWnour2ub2IxyuK79+:pzKX9R8gJpcmqoDumuKI

Malware Config

Signatures

  • Detect Neshta payload 2 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2532
      • C:\Users\Admin\AppData\Local\Temp\Monkey Island Crypter\Merged.exe
        "C:\Users\Admin\AppData\Local\Temp\Monkey Island Crypter\Merged.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:3380
        • C:\Users\Admin\AppData\Local\Temp\file2.exe
          "C:\Users\Admin\AppData\Local\Temp\file2.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4140
        • C:\Users\Admin\AppData\Local\Temp\file1.exe
          "C:\Users\Admin\AppData\Local\Temp\file1.exe"
          3⤵
          • Modifies system executable filetype association
          • Executes dropped EXE
          • Checks computer location settings
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1136
          • C:\Users\Admin\AppData\Local\Temp\3582-490\file1.exe
            "C:\Users\Admin\AppData\Local\Temp\3582-490\file1.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:4732

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\3582-490\file1.exe
      Filesize

      372KB

      MD5

      4f9d091e86e2a9718cad1719e04ea5fc

      SHA1

      d244d117ff9b908762988b6004119b06a06ac8f8

      SHA256

      828bbea0c8ba168c2e9fee36b42cde378f64537574430124924d2388507435bf

      SHA512

      0340391ced1c25e84540aead0bf50ca8e21da514b080bb2a50aa74fb36c542200fab0871277735952f6a5fd2058c746e95a6ca51672d7196459a257814275297

    • C:\Users\Admin\AppData\Local\Temp\3582-490\file1.exe
      Filesize

      372KB

      MD5

      4f9d091e86e2a9718cad1719e04ea5fc

      SHA1

      d244d117ff9b908762988b6004119b06a06ac8f8

      SHA256

      828bbea0c8ba168c2e9fee36b42cde378f64537574430124924d2388507435bf

      SHA512

      0340391ced1c25e84540aead0bf50ca8e21da514b080bb2a50aa74fb36c542200fab0871277735952f6a5fd2058c746e95a6ca51672d7196459a257814275297

    • C:\Users\Admin\AppData\Local\Temp\file1.exe
      Filesize

      412KB

      MD5

      292c796c2e2bbf7275de25c5cf3a5eec

      SHA1

      9ecaac42bc9bf107137e049f2cd430f4621fb067

      SHA256

      c7b8c5c8d08cc8b89ba7c038e473272595250b19b961683d8255dc322908498e

      SHA512

      7f0f5f08bfb6dcce66e56a49e791ec2d5795538636ac84bf05d319263aedd064ed8b28715e9dff909b8f76ffe378872212440cbfec19df92bb90ff1a4944668e

    • C:\Users\Admin\AppData\Local\Temp\file1.exe
      Filesize

      412KB

      MD5

      292c796c2e2bbf7275de25c5cf3a5eec

      SHA1

      9ecaac42bc9bf107137e049f2cd430f4621fb067

      SHA256

      c7b8c5c8d08cc8b89ba7c038e473272595250b19b961683d8255dc322908498e

      SHA512

      7f0f5f08bfb6dcce66e56a49e791ec2d5795538636ac84bf05d319263aedd064ed8b28715e9dff909b8f76ffe378872212440cbfec19df92bb90ff1a4944668e

    • C:\Users\Admin\AppData\Local\Temp\file2.exe
      Filesize

      39KB

      MD5

      18be43c31cfe75d34280cb0e6261bb5f

      SHA1

      c3eef4ae4b87143774a0e8f7c40d6f4c1c570d41

      SHA256

      c4376229d61d6f01ef5ff9da823828c20e76a1d93e1faf4bc4a85d6c56291ad2

      SHA512

      a97905de9083e0c710334c43c65bf8210e6ac7da00bebe30014fb45b2ba5395a75f237f7721ff26d9d9fcb6fa756d6b748e08031ebf453e7abc039b9dff247a0

    • C:\Users\Admin\AppData\Local\Temp\file2.exe
      Filesize

      39KB

      MD5

      18be43c31cfe75d34280cb0e6261bb5f

      SHA1

      c3eef4ae4b87143774a0e8f7c40d6f4c1c570d41

      SHA256

      c4376229d61d6f01ef5ff9da823828c20e76a1d93e1faf4bc4a85d6c56291ad2

      SHA512

      a97905de9083e0c710334c43c65bf8210e6ac7da00bebe30014fb45b2ba5395a75f237f7721ff26d9d9fcb6fa756d6b748e08031ebf453e7abc039b9dff247a0

    • memory/1136-138-0x0000000000000000-mapping.dmp
    • memory/2532-142-0x000000007FFC0000-0x000000007FFC6000-memory.dmp
      Filesize

      24KB

    • memory/3380-141-0x0000000000400000-0x0000000000403000-memory.dmp
      Filesize

      12KB

    • memory/3380-132-0x0000000000400000-0x0000000000403000-memory.dmp
      Filesize

      12KB

    • memory/4140-136-0x0000000000400000-0x000000000040B000-memory.dmp
      Filesize

      44KB

    • memory/4140-137-0x0000000010000000-0x0000000010012000-memory.dmp
      Filesize

      72KB

    • memory/4140-133-0x0000000000000000-mapping.dmp
    • memory/4732-143-0x0000000000000000-mapping.dmp