Analysis

  • max time kernel
    151s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 06:49

General

  • Target

    79779d87ab379fe9fc17301bf45bbe33f4e0ada37c27a282eaedaeb5a51fe931.exe

  • Size

    926KB

  • MD5

    38d6e45e43fa6f61f12d1db0b2d1a378

  • SHA1

    2bb1f48280c673b548b2d809d9fe20efcd2fb3d9

  • SHA256

    79779d87ab379fe9fc17301bf45bbe33f4e0ada37c27a282eaedaeb5a51fe931

  • SHA512

    3c5766f6f56a59bfca78052e424a94cfa1747250e18a106153ceb38dde24aa9ff722b47d3ded6f3fa5d0258b34bbdaa8be6bdb0d1446398772abbecaaaccb112

  • SSDEEP

    24576:8R5AiTAi7ZvdGRdYCqLwpi8yqEsxqrIZlm6twk:unr2/8WindcJtwk

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 17 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79779d87ab379fe9fc17301bf45bbe33f4e0ada37c27a282eaedaeb5a51fe931.exe
    "C:\Users\Admin\AppData\Local\Temp\79779d87ab379fe9fc17301bf45bbe33f4e0ada37c27a282eaedaeb5a51fe931.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Users\Admin\AppData\Local\Temp\3582-490\79779d87ab379fe9fc17301bf45bbe33f4e0ada37c27a282eaedaeb5a51fe931.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\79779d87ab379fe9fc17301bf45bbe33f4e0ada37c27a282eaedaeb5a51fe931.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe advpack.dll,LaunchINFSection campaign.inf,DefaultInstall
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        PID:1804
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\msninst.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\msninst.exe /Action:Wait
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1764

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\79779d87ab379fe9fc17301bf45bbe33f4e0ada37c27a282eaedaeb5a51fe931.exe
    Filesize

    886KB

    MD5

    6fc26a5b807d80b3d0db86c1898cba0f

    SHA1

    9316c61d4c933518f804aec4205e611dada8a312

    SHA256

    1148f412ac382b931acc577b675a3347a3da76dd68acc44ad8b68deaa554753a

    SHA512

    8c2787b23e31912953987cb483c59bd7921d1a8d8fd7aacb795bbb8749b6b17b3407d526882e2da5ad76123802b620036d49abfb1b284d08f0e17044f4343eda

  • C:\Users\Admin\AppData\Local\Temp\3582-490\79779d87ab379fe9fc17301bf45bbe33f4e0ada37c27a282eaedaeb5a51fe931.exe
    Filesize

    886KB

    MD5

    6fc26a5b807d80b3d0db86c1898cba0f

    SHA1

    9316c61d4c933518f804aec4205e611dada8a312

    SHA256

    1148f412ac382b931acc577b675a3347a3da76dd68acc44ad8b68deaa554753a

    SHA512

    8c2787b23e31912953987cb483c59bd7921d1a8d8fd7aacb795bbb8749b6b17b3407d526882e2da5ad76123802b620036d49abfb1b284d08f0e17044f4343eda

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\advpack.dll
    Filesize

    91KB

    MD5

    e091933b24a41a32025fe3ea5d8f8114

    SHA1

    3ed3b7f6d7264d15e87c0fac0f3cd4feb2b5d78a

    SHA256

    7b4f2eb2fa166fda1c95fea981aff8c285b9da9e02667c66b52da59d7cc484ce

    SHA512

    4b886ad051b0a8aec54dc82360675e71309915333307c4800ba77a691981b57e73c267b8c38a0a7b63f5aa3c68f9f0e5b4bb417033d7e237674cb70d5963da9e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\campaign.inf
    Filesize

    1KB

    MD5

    97a55e446b14e55f0dcd861ad479fa7b

    SHA1

    85af4c3194579d6bd5e817721531422cc2f60da0

    SHA256

    ae24c6545733edc12f0b70f5a7973f6f49c1527b5234c7017ae0f7c372c8e9ab

    SHA512

    c2fea2de161bf4074571df6aae4ff1f3ec5c35420330749a5d09206c4acd076ce96a94b8c3d65d1f36f785a0f031f02b41d76cb04decf0619cfbdc01b9afbbd1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\msninst.exe
    Filesize

    129KB

    MD5

    ae03dcd8a46f65e1d0a74c2f7c5ef368

    SHA1

    5917fe6ede72da0ea6388176106f501547b50247

    SHA256

    b9a67951ae1a45d9524c79f06ac0e32d32cd4766c3a4be6849bfb02f9d28dde0

    SHA512

    3ff47906b367659fed0af9f6e1205ba96da064ac1b097a953f440c1083242a63747a427036676677f3301e830ee3a1c1a7500bfe8ec1cb60ab340fe7d9c89ae5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\msninst.exe
    Filesize

    129KB

    MD5

    ae03dcd8a46f65e1d0a74c2f7c5ef368

    SHA1

    5917fe6ede72da0ea6388176106f501547b50247

    SHA256

    b9a67951ae1a45d9524c79f06ac0e32d32cd4766c3a4be6849bfb02f9d28dde0

    SHA512

    3ff47906b367659fed0af9f6e1205ba96da064ac1b097a953f440c1083242a63747a427036676677f3301e830ee3a1c1a7500bfe8ec1cb60ab340fe7d9c89ae5

  • \Archivos de programa\MSN\MsnInstaller\msninst.dll
    Filesize

    244KB

    MD5

    8d26ec464de935561c221407c40cd4ac

    SHA1

    d7a729baa54a2aa8de08e0fe478c5c07cc490e55

    SHA256

    30714be137b7b648b0c3aa2a7410467289b53a8e2601f8c208a3613e1d31d0f0

    SHA512

    7d92bf3527c896b48f1e14e318fe086276cbd271b1d212965c87a75ad4ad4560c9e48d58f5138599695489bd3d759c577bedd4e9d7413522c7a16219dfb21de2

  • \Archivos de programa\MSN\MsnInstaller\msninst.exe
    Filesize

    129KB

    MD5

    ae03dcd8a46f65e1d0a74c2f7c5ef368

    SHA1

    5917fe6ede72da0ea6388176106f501547b50247

    SHA256

    b9a67951ae1a45d9524c79f06ac0e32d32cd4766c3a4be6849bfb02f9d28dde0

    SHA512

    3ff47906b367659fed0af9f6e1205ba96da064ac1b097a953f440c1083242a63747a427036676677f3301e830ee3a1c1a7500bfe8ec1cb60ab340fe7d9c89ae5

  • \Archivos de programa\MSN\MsnInstaller\msnsign.dll
    Filesize

    746KB

    MD5

    ffb0a9a7208b773c1fd469bec18a9185

    SHA1

    26a15559f6139eab67b76446f36d2ebdb87e569c

    SHA256

    ccec6240c7a188e55156476d1bfcd06722c36bd7555f28845d747493529093d5

    SHA512

    9a019efb4d62f24ef979102e889c7aed6f49d213dbc362990ea2af8ec5957687e887883c234ee1026ebd20b4095209dfffa62da5f998d8ba0d29e75ed0a77bad

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\79779d87ab379fe9fc17301bf45bbe33f4e0ada37c27a282eaedaeb5a51fe931.exe
    Filesize

    886KB

    MD5

    6fc26a5b807d80b3d0db86c1898cba0f

    SHA1

    9316c61d4c933518f804aec4205e611dada8a312

    SHA256

    1148f412ac382b931acc577b675a3347a3da76dd68acc44ad8b68deaa554753a

    SHA512

    8c2787b23e31912953987cb483c59bd7921d1a8d8fd7aacb795bbb8749b6b17b3407d526882e2da5ad76123802b620036d49abfb1b284d08f0e17044f4343eda

  • \Users\Admin\AppData\Local\Temp\3582-490\79779d87ab379fe9fc17301bf45bbe33f4e0ada37c27a282eaedaeb5a51fe931.exe
    Filesize

    886KB

    MD5

    6fc26a5b807d80b3d0db86c1898cba0f

    SHA1

    9316c61d4c933518f804aec4205e611dada8a312

    SHA256

    1148f412ac382b931acc577b675a3347a3da76dd68acc44ad8b68deaa554753a

    SHA512

    8c2787b23e31912953987cb483c59bd7921d1a8d8fd7aacb795bbb8749b6b17b3407d526882e2da5ad76123802b620036d49abfb1b284d08f0e17044f4343eda

  • \Users\Admin\AppData\Local\Temp\3582-490\79779d87ab379fe9fc17301bf45bbe33f4e0ada37c27a282eaedaeb5a51fe931.exe
    Filesize

    886KB

    MD5

    6fc26a5b807d80b3d0db86c1898cba0f

    SHA1

    9316c61d4c933518f804aec4205e611dada8a312

    SHA256

    1148f412ac382b931acc577b675a3347a3da76dd68acc44ad8b68deaa554753a

    SHA512

    8c2787b23e31912953987cb483c59bd7921d1a8d8fd7aacb795bbb8749b6b17b3407d526882e2da5ad76123802b620036d49abfb1b284d08f0e17044f4343eda

  • \Users\Admin\AppData\Local\Temp\3582-490\79779d87ab379fe9fc17301bf45bbe33f4e0ada37c27a282eaedaeb5a51fe931.exe
    Filesize

    886KB

    MD5

    6fc26a5b807d80b3d0db86c1898cba0f

    SHA1

    9316c61d4c933518f804aec4205e611dada8a312

    SHA256

    1148f412ac382b931acc577b675a3347a3da76dd68acc44ad8b68deaa554753a

    SHA512

    8c2787b23e31912953987cb483c59bd7921d1a8d8fd7aacb795bbb8749b6b17b3407d526882e2da5ad76123802b620036d49abfb1b284d08f0e17044f4343eda

  • \Users\Admin\AppData\Local\Temp\3582-490\79779d87ab379fe9fc17301bf45bbe33f4e0ada37c27a282eaedaeb5a51fe931.exe
    Filesize

    886KB

    MD5

    6fc26a5b807d80b3d0db86c1898cba0f

    SHA1

    9316c61d4c933518f804aec4205e611dada8a312

    SHA256

    1148f412ac382b931acc577b675a3347a3da76dd68acc44ad8b68deaa554753a

    SHA512

    8c2787b23e31912953987cb483c59bd7921d1a8d8fd7aacb795bbb8749b6b17b3407d526882e2da5ad76123802b620036d49abfb1b284d08f0e17044f4343eda

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ADVPACK.DLL
    Filesize

    91KB

    MD5

    e091933b24a41a32025fe3ea5d8f8114

    SHA1

    3ed3b7f6d7264d15e87c0fac0f3cd4feb2b5d78a

    SHA256

    7b4f2eb2fa166fda1c95fea981aff8c285b9da9e02667c66b52da59d7cc484ce

    SHA512

    4b886ad051b0a8aec54dc82360675e71309915333307c4800ba77a691981b57e73c267b8c38a0a7b63f5aa3c68f9f0e5b4bb417033d7e237674cb70d5963da9e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ADVPACK.DLL
    Filesize

    91KB

    MD5

    e091933b24a41a32025fe3ea5d8f8114

    SHA1

    3ed3b7f6d7264d15e87c0fac0f3cd4feb2b5d78a

    SHA256

    7b4f2eb2fa166fda1c95fea981aff8c285b9da9e02667c66b52da59d7cc484ce

    SHA512

    4b886ad051b0a8aec54dc82360675e71309915333307c4800ba77a691981b57e73c267b8c38a0a7b63f5aa3c68f9f0e5b4bb417033d7e237674cb70d5963da9e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ADVPACK.DLL
    Filesize

    91KB

    MD5

    e091933b24a41a32025fe3ea5d8f8114

    SHA1

    3ed3b7f6d7264d15e87c0fac0f3cd4feb2b5d78a

    SHA256

    7b4f2eb2fa166fda1c95fea981aff8c285b9da9e02667c66b52da59d7cc484ce

    SHA512

    4b886ad051b0a8aec54dc82360675e71309915333307c4800ba77a691981b57e73c267b8c38a0a7b63f5aa3c68f9f0e5b4bb417033d7e237674cb70d5963da9e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ADVPACK.DLL
    Filesize

    91KB

    MD5

    e091933b24a41a32025fe3ea5d8f8114

    SHA1

    3ed3b7f6d7264d15e87c0fac0f3cd4feb2b5d78a

    SHA256

    7b4f2eb2fa166fda1c95fea981aff8c285b9da9e02667c66b52da59d7cc484ce

    SHA512

    4b886ad051b0a8aec54dc82360675e71309915333307c4800ba77a691981b57e73c267b8c38a0a7b63f5aa3c68f9f0e5b4bb417033d7e237674cb70d5963da9e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\msninst.exe
    Filesize

    129KB

    MD5

    ae03dcd8a46f65e1d0a74c2f7c5ef368

    SHA1

    5917fe6ede72da0ea6388176106f501547b50247

    SHA256

    b9a67951ae1a45d9524c79f06ac0e32d32cd4766c3a4be6849bfb02f9d28dde0

    SHA512

    3ff47906b367659fed0af9f6e1205ba96da064ac1b097a953f440c1083242a63747a427036676677f3301e830ee3a1c1a7500bfe8ec1cb60ab340fe7d9c89ae5

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\msninst.exe
    Filesize

    129KB

    MD5

    ae03dcd8a46f65e1d0a74c2f7c5ef368

    SHA1

    5917fe6ede72da0ea6388176106f501547b50247

    SHA256

    b9a67951ae1a45d9524c79f06ac0e32d32cd4766c3a4be6849bfb02f9d28dde0

    SHA512

    3ff47906b367659fed0af9f6e1205ba96da064ac1b097a953f440c1083242a63747a427036676677f3301e830ee3a1c1a7500bfe8ec1cb60ab340fe7d9c89ae5

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\msninst.exe
    Filesize

    129KB

    MD5

    ae03dcd8a46f65e1d0a74c2f7c5ef368

    SHA1

    5917fe6ede72da0ea6388176106f501547b50247

    SHA256

    b9a67951ae1a45d9524c79f06ac0e32d32cd4766c3a4be6849bfb02f9d28dde0

    SHA512

    3ff47906b367659fed0af9f6e1205ba96da064ac1b097a953f440c1083242a63747a427036676677f3301e830ee3a1c1a7500bfe8ec1cb60ab340fe7d9c89ae5

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\msninst.exe
    Filesize

    129KB

    MD5

    ae03dcd8a46f65e1d0a74c2f7c5ef368

    SHA1

    5917fe6ede72da0ea6388176106f501547b50247

    SHA256

    b9a67951ae1a45d9524c79f06ac0e32d32cd4766c3a4be6849bfb02f9d28dde0

    SHA512

    3ff47906b367659fed0af9f6e1205ba96da064ac1b097a953f440c1083242a63747a427036676677f3301e830ee3a1c1a7500bfe8ec1cb60ab340fe7d9c89ae5

  • memory/1472-57-0x0000000000000000-mapping.dmp
  • memory/1504-54-0x00000000768A1000-0x00000000768A3000-memory.dmp
    Filesize

    8KB

  • memory/1764-73-0x0000000000000000-mapping.dmp
  • memory/1804-65-0x0000000000000000-mapping.dmp