Analysis

  • max time kernel
    190s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 08:03

General

  • Target

    6ac8a790062b14482471d3905eafecd331e37356be2415b4979cbfa140e0dd8c.exe

  • Size

    180KB

  • MD5

    eb2e9b858a7f8c25087a82a79653066e

  • SHA1

    18a0f6d4945cf4125ba23bd6d3a6f6c114675f21

  • SHA256

    6ac8a790062b14482471d3905eafecd331e37356be2415b4979cbfa140e0dd8c

  • SHA512

    c501cdddb754e1aa98d2e4d5e60280366c05ef53e49a8f56bf67b00c4ad45f19985412c155fa244d91d566f7c1462adf6d9b81d728dc8bb8e25b44a8b127936f

  • SSDEEP

    1536:yxqjQ+P04wsZLnDrCvfViTwxnOIZr3bKsKw3fGVGinQh6gogv9bPAK4BkI1iN8:zr8WDrC1BasVf/Vzogv9bv4BkI1s8

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ac8a790062b14482471d3905eafecd331e37356be2415b4979cbfa140e0dd8c.exe
    "C:\Users\Admin\AppData\Local\Temp\6ac8a790062b14482471d3905eafecd331e37356be2415b4979cbfa140e0dd8c.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:232
    • C:\Users\Admin\AppData\Local\Temp\3582-490\6ac8a790062b14482471d3905eafecd331e37356be2415b4979cbfa140e0dd8c.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\6ac8a790062b14482471d3905eafecd331e37356be2415b4979cbfa140e0dd8c.exe"
      2⤵
      • Executes dropped EXE
      PID:3988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\6ac8a790062b14482471d3905eafecd331e37356be2415b4979cbfa140e0dd8c.exe
    Filesize

    140KB

    MD5

    4f5ca907d9b9d760528bf30dba85ba47

    SHA1

    e59075594200d3855d2a0b90d106098cd5e44970

    SHA256

    7b706c048d6c3bb80f5d629e6614b56d36aae3c2ffbc392ab36c6328a0e77641

    SHA512

    a8caf74ea31266f3c93cc22e58ac1e320b8ad1c5bf194d983b78dff100c72c770b1bbfa375c5ca68eae5f65026d02178872303d1bd67a57f71ec51bb139919ec

  • C:\Users\Admin\AppData\Local\Temp\3582-490\6ac8a790062b14482471d3905eafecd331e37356be2415b4979cbfa140e0dd8c.exe
    Filesize

    140KB

    MD5

    4f5ca907d9b9d760528bf30dba85ba47

    SHA1

    e59075594200d3855d2a0b90d106098cd5e44970

    SHA256

    7b706c048d6c3bb80f5d629e6614b56d36aae3c2ffbc392ab36c6328a0e77641

    SHA512

    a8caf74ea31266f3c93cc22e58ac1e320b8ad1c5bf194d983b78dff100c72c770b1bbfa375c5ca68eae5f65026d02178872303d1bd67a57f71ec51bb139919ec

  • memory/3988-132-0x0000000000000000-mapping.dmp