Analysis

  • max time kernel
    174s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 08:04

General

  • Target

    7c60706fa150dbc340edbf0a134fab06507ed0abe61cdbd3fe7e00d55b4516fb.exe

  • Size

    1.1MB

  • MD5

    1c9527702352f60e80a4f0c1ea782aad

  • SHA1

    58614fdde61180bbd8f9cfa0961552f9fcf07b96

  • SHA256

    7c60706fa150dbc340edbf0a134fab06507ed0abe61cdbd3fe7e00d55b4516fb

  • SHA512

    3b52a17f6c9dd5e69fcd8aaed1f004731c38a990e46f65c598c463f3fd5a507a940dcc4845acee9c3f7a97c1a076c707bd153b61613f2069a1306d0fa11e3d68

  • SSDEEP

    24576:O5ffRG/U+LJjcBS5h3bXU+8VBkPS1BdRdb+mevJqDkrTLX8LvE8Z9Pw9:g8/U+LISf3bt8APS3IxLXAvEs9Pw9

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c60706fa150dbc340edbf0a134fab06507ed0abe61cdbd3fe7e00d55b4516fb.exe
    "C:\Users\Admin\AppData\Local\Temp\7c60706fa150dbc340edbf0a134fab06507ed0abe61cdbd3fe7e00d55b4516fb.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Users\Admin\AppData\Local\Temp\3582-490\7c60706fa150dbc340edbf0a134fab06507ed0abe61cdbd3fe7e00d55b4516fb.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\7c60706fa150dbc340edbf0a134fab06507ed0abe61cdbd3fe7e00d55b4516fb.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious use of WriteProcessMemory
      PID:2732
      • \??\c:\7f92dc80ae4\update\update.exe
        c:\7f92dc80ae4\update\update.exe
        3⤵
        • Executes dropped EXE
        • Enumerates system info in registry
        PID:4832

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\7f92dc80ae4\update\update.exe
    Filesize

    273KB

    MD5

    913e1622f99f34bf0ea509a6263cad70

    SHA1

    2676197585b4a192374a9e8f5dc4b4f0ade8e848

    SHA256

    4885e589817ee15a723b3146d93e6ba2791944b5de02f31f5d9a10a62afee518

    SHA512

    d70be96ca1090c70800a4494407daff89ad037d008ef5a18c3267d4f790233a0eda864307b87f6f56a05c55529b03174e74a54a1ce0e7b9630abd169d4d45485

  • C:\Users\Admin\AppData\Local\Temp\3582-490\7c60706fa150dbc340edbf0a134fab06507ed0abe61cdbd3fe7e00d55b4516fb.exe
    Filesize

    1.1MB

    MD5

    f6e17839f613103775997c9d793bb01f

    SHA1

    2ccd29707f60a769f8771766e984aa18682d652a

    SHA256

    355f1e3ba6fa2264818d257ff34011f1460ed5a9e273e5ec027308b4a2d2e639

    SHA512

    6c838d158230606c3654b2a35ca7cb3f1d7ca39d6791b09217586b692f0b73f63a418f54c7d310a65386f345159e40addb34edd50469acfc91a3514ae8b14668

  • C:\Users\Admin\AppData\Local\Temp\3582-490\7c60706fa150dbc340edbf0a134fab06507ed0abe61cdbd3fe7e00d55b4516fb.exe
    Filesize

    1.1MB

    MD5

    f6e17839f613103775997c9d793bb01f

    SHA1

    2ccd29707f60a769f8771766e984aa18682d652a

    SHA256

    355f1e3ba6fa2264818d257ff34011f1460ed5a9e273e5ec027308b4a2d2e639

    SHA512

    6c838d158230606c3654b2a35ca7cb3f1d7ca39d6791b09217586b692f0b73f63a418f54c7d310a65386f345159e40addb34edd50469acfc91a3514ae8b14668

  • \??\c:\7f92dc80ae4\update\update.exe
    Filesize

    273KB

    MD5

    913e1622f99f34bf0ea509a6263cad70

    SHA1

    2676197585b4a192374a9e8f5dc4b4f0ade8e848

    SHA256

    4885e589817ee15a723b3146d93e6ba2791944b5de02f31f5d9a10a62afee518

    SHA512

    d70be96ca1090c70800a4494407daff89ad037d008ef5a18c3267d4f790233a0eda864307b87f6f56a05c55529b03174e74a54a1ce0e7b9630abd169d4d45485

  • \??\c:\7f92dc80ae4\update\update.inf
    Filesize

    6KB

    MD5

    a1e961d84ffbb5a80503dccdbd64a5d1

    SHA1

    e55d291ca0f12967c3d8cc035a6c49b88bc89e98

    SHA256

    ad4332420a486a41e257eea63f6dff0b52ce593b103dad05bf6f16397fe2503d

    SHA512

    70409278e78c73ef442791e41f06e621710c51458a903de75f958f77f0283b065f24532b9bb4a1fb5270e7ac06e58093c1c517b25de4d176e060283ea1b3a99d

  • memory/2732-132-0x0000000000000000-mapping.dmp
  • memory/4832-135-0x0000000000000000-mapping.dmp