Analysis

  • max time kernel
    151s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 08:04

General

  • Target

    dbfe97ff3dfd3889ca63c32b43dd67911e8706fe98f2c35f6cd342a70b24a0b2.exe

  • Size

    916KB

  • MD5

    0e6eccc2cb4555748e5b1dec1ea8e0b0

  • SHA1

    3eba614e98ff631ecb30bcc1cc3cfe4824747dff

  • SHA256

    dbfe97ff3dfd3889ca63c32b43dd67911e8706fe98f2c35f6cd342a70b24a0b2

  • SHA512

    75926bd3d19ef06f38581ad03a95eb99dfed1b0505484680abc633e36200e02bc8fb72bbe1caf4241446edd398650f0ad3a3ecc12b78e2758c29adc843703452

  • SSDEEP

    12288:aW6VgX0SyGUsp8Qd/zDdz+A+hi6+pE30vwmC46oSVISpn7awwgoSPpi6:a/lGl6Qp3R+hos4w74YGwJpi6

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbfe97ff3dfd3889ca63c32b43dd67911e8706fe98f2c35f6cd342a70b24a0b2.exe
    "C:\Users\Admin\AppData\Local\Temp\dbfe97ff3dfd3889ca63c32b43dd67911e8706fe98f2c35f6cd342a70b24a0b2.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\3582-490\dbfe97ff3dfd3889ca63c32b43dd67911e8706fe98f2c35f6cd342a70b24a0b2.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\dbfe97ff3dfd3889ca63c32b43dd67911e8706fe98f2c35f6cd342a70b24a0b2.exe"
      2⤵
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:588

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\dbfe97ff3dfd3889ca63c32b43dd67911e8706fe98f2c35f6cd342a70b24a0b2.exe
    Filesize

    875KB

    MD5

    2c1ef6485eeb834187fc69556a64eafe

    SHA1

    c959e7d82203d234eb4912c61f05a450417c8c36

    SHA256

    7f25b9bbec978f3f3810d1e064d2ca9330061bd9d0f7df9c3370f020e9d38e56

    SHA512

    7f8041ec2d84ed23dd31a4733680e3228bdd12564109f107a57aa341dbd2813d016f154ae0f6dd0957aa67bb4d2ba96bbd6ce555cb366ebd163e9ca9c78e27f7

  • C:\Users\Admin\AppData\Local\Temp\3582-490\dbfe97ff3dfd3889ca63c32b43dd67911e8706fe98f2c35f6cd342a70b24a0b2.exe
    Filesize

    875KB

    MD5

    2c1ef6485eeb834187fc69556a64eafe

    SHA1

    c959e7d82203d234eb4912c61f05a450417c8c36

    SHA256

    7f25b9bbec978f3f3810d1e064d2ca9330061bd9d0f7df9c3370f020e9d38e56

    SHA512

    7f8041ec2d84ed23dd31a4733680e3228bdd12564109f107a57aa341dbd2813d016f154ae0f6dd0957aa67bb4d2ba96bbd6ce555cb366ebd163e9ca9c78e27f7

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\dbfe97ff3dfd3889ca63c32b43dd67911e8706fe98f2c35f6cd342a70b24a0b2.exe
    Filesize

    875KB

    MD5

    2c1ef6485eeb834187fc69556a64eafe

    SHA1

    c959e7d82203d234eb4912c61f05a450417c8c36

    SHA256

    7f25b9bbec978f3f3810d1e064d2ca9330061bd9d0f7df9c3370f020e9d38e56

    SHA512

    7f8041ec2d84ed23dd31a4733680e3228bdd12564109f107a57aa341dbd2813d016f154ae0f6dd0957aa67bb4d2ba96bbd6ce555cb366ebd163e9ca9c78e27f7

  • memory/588-56-0x0000000000000000-mapping.dmp
  • memory/588-61-0x0000000000400000-0x0000000000953000-memory.dmp
    Filesize

    5.3MB

  • memory/588-63-0x0000000000400000-0x0000000000953000-memory.dmp
    Filesize

    5.3MB

  • memory/2024-54-0x0000000074D81000-0x0000000074D83000-memory.dmp
    Filesize

    8KB

  • memory/2024-60-0x00000000025F0000-0x0000000002B43000-memory.dmp
    Filesize

    5.3MB

  • memory/2024-62-0x00000000025F0000-0x0000000002B43000-memory.dmp
    Filesize

    5.3MB