Analysis

  • max time kernel
    188s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 02:56

General

  • Target

    90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe

  • Size

    137KB

  • MD5

    13ad7a2ea9b4364b1c1d68033bae3b5e

  • SHA1

    7e6b9d51941bb24dd3104d13d852dc068b5be848

  • SHA256

    90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b

  • SHA512

    8ff13ab209ab3956e71dd485c04ec9a36375f5a1c803a004b0f9ebb2d2014bb55b444af07429a6381b2a21689cb022410bbab5bffacb3c5454ac6e0d8870bd10

  • SSDEEP

    3072:sr85CQPowYJE+OjioVknZE8/HK52+f9W9TPyYPowYJE+OjioVknZE8/HK5W:k9idioV0r/WR9t6dioV0r/WW

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe
    "C:\Users\Admin\AppData\Local\Temp\90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:268
    • C:\Users\Admin\AppData\Local\Temp\3582-490\90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\3582-490\DNS.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1864
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /flushdnsipconfig/releaseipconfig/renew
          4⤵
          • Gathers network information
          PID:1712
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 1296
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1528

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe

    Filesize

    96KB

    MD5

    eb9e93957687314c8beb7f653d971286

    SHA1

    fd9bc5ed8f90d66a58d7d46185ba8b037d8c5558

    SHA256

    06fe78ca204b9b9027af20f5456d0cfec8e654375ee23030203948075315b6c9

    SHA512

    11b213570151b42f0a1ecad24a7d35a33085707e03375075eec7c93f5acbf88beaf5cd8ffa65f0e3e2e788cc74ceef9e69e7955f04672c2f82d0292dfa14fee9

  • C:\Users\Admin\AppData\Local\Temp\3582-490\90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe

    Filesize

    96KB

    MD5

    eb9e93957687314c8beb7f653d971286

    SHA1

    fd9bc5ed8f90d66a58d7d46185ba8b037d8c5558

    SHA256

    06fe78ca204b9b9027af20f5456d0cfec8e654375ee23030203948075315b6c9

    SHA512

    11b213570151b42f0a1ecad24a7d35a33085707e03375075eec7c93f5acbf88beaf5cd8ffa65f0e3e2e788cc74ceef9e69e7955f04672c2f82d0292dfa14fee9

  • C:\Users\Admin\AppData\Local\Temp\3582-490\DNS.bat

    Filesize

    47B

    MD5

    4b403bd7ff6fe021fcf3ecdd2c029f87

    SHA1

    890642fc02dbfffd5d3aef0ec652fa636a48c3ee

    SHA256

    267c9197388ab6b34c7516e728a3529df2b7aab5029588ffb47540bbe651f654

    SHA512

    3bdef29cfeab451d45182420bd179f9450a0da5c842992260a420728e212635f90cc1f394687c8ac852ccd8caf529e9bdb4aff24e2d07f6705594931b3ef5e6d

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe

    Filesize

    96KB

    MD5

    eb9e93957687314c8beb7f653d971286

    SHA1

    fd9bc5ed8f90d66a58d7d46185ba8b037d8c5558

    SHA256

    06fe78ca204b9b9027af20f5456d0cfec8e654375ee23030203948075315b6c9

    SHA512

    11b213570151b42f0a1ecad24a7d35a33085707e03375075eec7c93f5acbf88beaf5cd8ffa65f0e3e2e788cc74ceef9e69e7955f04672c2f82d0292dfa14fee9

  • \Users\Admin\AppData\Local\Temp\3582-490\90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe

    Filesize

    96KB

    MD5

    eb9e93957687314c8beb7f653d971286

    SHA1

    fd9bc5ed8f90d66a58d7d46185ba8b037d8c5558

    SHA256

    06fe78ca204b9b9027af20f5456d0cfec8e654375ee23030203948075315b6c9

    SHA512

    11b213570151b42f0a1ecad24a7d35a33085707e03375075eec7c93f5acbf88beaf5cd8ffa65f0e3e2e788cc74ceef9e69e7955f04672c2f82d0292dfa14fee9

  • \Users\Admin\AppData\Local\Temp\3582-490\90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe

    Filesize

    96KB

    MD5

    eb9e93957687314c8beb7f653d971286

    SHA1

    fd9bc5ed8f90d66a58d7d46185ba8b037d8c5558

    SHA256

    06fe78ca204b9b9027af20f5456d0cfec8e654375ee23030203948075315b6c9

    SHA512

    11b213570151b42f0a1ecad24a7d35a33085707e03375075eec7c93f5acbf88beaf5cd8ffa65f0e3e2e788cc74ceef9e69e7955f04672c2f82d0292dfa14fee9

  • \Users\Admin\AppData\Local\Temp\3582-490\90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe

    Filesize

    96KB

    MD5

    eb9e93957687314c8beb7f653d971286

    SHA1

    fd9bc5ed8f90d66a58d7d46185ba8b037d8c5558

    SHA256

    06fe78ca204b9b9027af20f5456d0cfec8e654375ee23030203948075315b6c9

    SHA512

    11b213570151b42f0a1ecad24a7d35a33085707e03375075eec7c93f5acbf88beaf5cd8ffa65f0e3e2e788cc74ceef9e69e7955f04672c2f82d0292dfa14fee9

  • \Users\Admin\AppData\Local\Temp\3582-490\90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe

    Filesize

    96KB

    MD5

    eb9e93957687314c8beb7f653d971286

    SHA1

    fd9bc5ed8f90d66a58d7d46185ba8b037d8c5558

    SHA256

    06fe78ca204b9b9027af20f5456d0cfec8e654375ee23030203948075315b6c9

    SHA512

    11b213570151b42f0a1ecad24a7d35a33085707e03375075eec7c93f5acbf88beaf5cd8ffa65f0e3e2e788cc74ceef9e69e7955f04672c2f82d0292dfa14fee9

  • \Users\Admin\AppData\Local\Temp\3582-490\90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe

    Filesize

    96KB

    MD5

    eb9e93957687314c8beb7f653d971286

    SHA1

    fd9bc5ed8f90d66a58d7d46185ba8b037d8c5558

    SHA256

    06fe78ca204b9b9027af20f5456d0cfec8e654375ee23030203948075315b6c9

    SHA512

    11b213570151b42f0a1ecad24a7d35a33085707e03375075eec7c93f5acbf88beaf5cd8ffa65f0e3e2e788cc74ceef9e69e7955f04672c2f82d0292dfa14fee9

  • memory/268-54-0x0000000075F01000-0x0000000075F03000-memory.dmp

    Filesize

    8KB

  • memory/1528-64-0x0000000000000000-mapping.dmp

  • memory/1628-56-0x0000000000000000-mapping.dmp

  • memory/1628-59-0x0000000000980000-0x000000000099E000-memory.dmp

    Filesize

    120KB

  • memory/1712-63-0x0000000000000000-mapping.dmp

  • memory/1864-61-0x0000000000000000-mapping.dmp