Analysis

  • max time kernel
    153s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 19:41

General

  • Target

    c2f700bc8b333ce7210ac7caee61bfb8d9b28eca6c5271f440e9ab45c7f5b18a.exe

  • Size

    1.7MB

  • MD5

    0f5ae684544dc52331e802d9e1471f26

  • SHA1

    eff3b8f69c81c4192ff0c99b65a7ffd4339ad5da

  • SHA256

    c2f700bc8b333ce7210ac7caee61bfb8d9b28eca6c5271f440e9ab45c7f5b18a

  • SHA512

    9529931793f64f95404b179cc6ce80694baec7d9161cc980e3c9be2035cd39bbaffa1a0a4e6c1f7a57f153437d64b6e90799d660afb8e6c20f84e7da71690fe3

  • SSDEEP

    24576:uCdTs3f/ebhYa7edBBLdH2vmuujgd/Bey8XLTIJw9Zl:uCdY3f/B+vyW/I5XLTIw9Zl

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2f700bc8b333ce7210ac7caee61bfb8d9b28eca6c5271f440e9ab45c7f5b18a.exe
    "C:\Users\Admin\AppData\Local\Temp\c2f700bc8b333ce7210ac7caee61bfb8d9b28eca6c5271f440e9ab45c7f5b18a.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\AppData\Local\Temp\3582-490\c2f700bc8b333ce7210ac7caee61bfb8d9b28eca6c5271f440e9ab45c7f5b18a.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\c2f700bc8b333ce7210ac7caee61bfb8d9b28eca6c5271f440e9ab45c7f5b18a.exe"
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      PID:2716

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\c2f700bc8b333ce7210ac7caee61bfb8d9b28eca6c5271f440e9ab45c7f5b18a.exe
    Filesize

    1.7MB

    MD5

    ca99dd593a24a7369d07ddef76023819

    SHA1

    c88d76106c34d093167bd69b433cff15f24cfe68

    SHA256

    26da2d1f83383091e735b74e10c87d69368817c5403c6757537eaeff0982173e

    SHA512

    a3f2fb49e8c9be8e7f3fd205983985876e3b04dc097aeb237dc5f057bab54b3b39324820ca3028e19439f5abbeae09dc6bc81f4af7811c1430ef57fd32d93b4f

  • C:\Users\Admin\AppData\Local\Temp\3582-490\c2f700bc8b333ce7210ac7caee61bfb8d9b28eca6c5271f440e9ab45c7f5b18a.exe
    Filesize

    1.7MB

    MD5

    ca99dd593a24a7369d07ddef76023819

    SHA1

    c88d76106c34d093167bd69b433cff15f24cfe68

    SHA256

    26da2d1f83383091e735b74e10c87d69368817c5403c6757537eaeff0982173e

    SHA512

    a3f2fb49e8c9be8e7f3fd205983985876e3b04dc097aeb237dc5f057bab54b3b39324820ca3028e19439f5abbeae09dc6bc81f4af7811c1430ef57fd32d93b4f

  • memory/2716-132-0x0000000000000000-mapping.dmp