General
-
Target
c7bf35ae066d80a2f2a0381f30fd1f426514ee403e4f41810b317f4fd8ad5a44
-
Size
96KB
-
Sample
230118-gmgy8aah37
-
MD5
f45a2a3e4a24c3ea9fb86ba430cd0afe
-
SHA1
7909730d282bafeecaaf61beabfa0d40c29fd986
-
SHA256
c7bf35ae066d80a2f2a0381f30fd1f426514ee403e4f41810b317f4fd8ad5a44
-
SHA512
0f6c46cd6da0655113c3971d66467f96a9c41ac0e51ed3342e07c04b60b0ac0b2f3e759f60b19c457599a9a7419a2498534ac980417e40c5aaf2639b1907c4bc
-
SSDEEP
1536:JxqjQ+P04wsmJCWQ5/s/JCnpNeRBl5PT/rx1mzwRMSTdLpJZM:sr85CFGYpQRrmzwR5Ju
Behavioral task
behavioral1
Sample
c7bf35ae066d80a2f2a0381f30fd1f426514ee403e4f41810b317f4fd8ad5a44.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c7bf35ae066d80a2f2a0381f30fd1f426514ee403e4f41810b317f4fd8ad5a44.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
c7bf35ae066d80a2f2a0381f30fd1f426514ee403e4f41810b317f4fd8ad5a44
-
Size
96KB
-
MD5
f45a2a3e4a24c3ea9fb86ba430cd0afe
-
SHA1
7909730d282bafeecaaf61beabfa0d40c29fd986
-
SHA256
c7bf35ae066d80a2f2a0381f30fd1f426514ee403e4f41810b317f4fd8ad5a44
-
SHA512
0f6c46cd6da0655113c3971d66467f96a9c41ac0e51ed3342e07c04b60b0ac0b2f3e759f60b19c457599a9a7419a2498534ac980417e40c5aaf2639b1907c4bc
-
SSDEEP
1536:JxqjQ+P04wsmJCWQ5/s/JCnpNeRBl5PT/rx1mzwRMSTdLpJZM:sr85CFGYpQRrmzwR5Ju
-
Detect Neshta payload
-
Modifies system executable filetype association
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-