Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    77s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2023, 20:37

General

  • Target

    0ca7dc0360f51d054c098945edb300a2d01d0548ca1d6b86b3953631989cc6a3.exe

  • Size

    347KB

  • MD5

    03cc929f5f0a59a3df844109e875b4ef

  • SHA1

    44a5533d95e64e8630987a2d88878a18f91c3cac

  • SHA256

    0ca7dc0360f51d054c098945edb300a2d01d0548ca1d6b86b3953631989cc6a3

  • SHA512

    f1fa80b29433817336d6b7189637e2e0039c7f8000c0248abe635be9816a7febe6a354fa48b5c976842aa889997a79a077ceaea24421b2b1de2f91b3a95e1c2c

  • SSDEEP

    6144:yYa6dY6Aa/wi/Xzhp0Ur/P5pd1Aw5X5GMKP0Z7r:yYzYuoUjl1AqGMV7r

Malware Config

Signatures

  • Detect Neshta payload 13 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 2 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ca7dc0360f51d054c098945edb300a2d01d0548ca1d6b86b3953631989cc6a3.exe
    "C:\Users\Admin\AppData\Local\Temp\0ca7dc0360f51d054c098945edb300a2d01d0548ca1d6b86b3953631989cc6a3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3232
    • C:\Users\Admin\AppData\Local\Temp\lgehuztzmc.exe
      "C:\Users\Admin\AppData\Local\Temp\lgehuztzmc.exe" C:\Users\Admin\AppData\Local\Temp\elgnifhc.r
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:3464
      • C:\Users\Admin\AppData\Local\Temp\lgehuztzmc.exe
        "C:\Users\Admin\AppData\Local\Temp\lgehuztzmc.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system executable filetype association
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        PID:4584

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE

    Filesize

    328KB

    MD5

    318895941a4451a3c5beac7f3d4b8d1b

    SHA1

    9012760a142d28a64ddf78c71dd0388075fbba88

    SHA256

    318bae912f1cab1fa3b6f3dbab2814ae2e16891e7fc5b09e150b0ab20b785a62

    SHA512

    76e96c9d22a8814101b6140bb4714a11cd59d59253c9cdb567e7263b96abc9f07165edbba91172e6282ac3e1c08c08dc4b8581b344eeb485e68e9962e9621658

  • C:\Users\Admin\AppData\Local\Temp\elgnifhc.r

    Filesize

    5KB

    MD5

    563fdf7994e86b7da751b185288a6a4f

    SHA1

    ff48d90122073a1f77db7e388e753a201f6d4e62

    SHA256

    5c030b7ba6c1fba3f51bd744b3b29db4453c7c336f848259647cfb3fd35d2207

    SHA512

    ef4e8a83312322746a02cf725fc32fabae3edda63c7ca92a4cbe4320d462c228bff8c2178a47a5e46c52161523aac3d23e3bf6b03a5f4d5739b36aaac8b7bb80

  • C:\Users\Admin\AppData\Local\Temp\lgehuztzmc.exe

    Filesize

    34KB

    MD5

    20742cabae8a6a4fed0126040a8f344f

    SHA1

    3a39a722d88c227f0149caa73654a76eaacf5a29

    SHA256

    587148b5a118b27e83b6a2d03431f59645e225706bb4178c5fd2a32dfb597167

    SHA512

    643d05804998b1cc965aadc02a12aef8c0984fdeb58044e43080182148a502ad5a1d24218812c1679dd4059802f283114e4c58514e108d0da102e23cd462768c

  • C:\Users\Admin\AppData\Local\Temp\lgehuztzmc.exe

    Filesize

    34KB

    MD5

    20742cabae8a6a4fed0126040a8f344f

    SHA1

    3a39a722d88c227f0149caa73654a76eaacf5a29

    SHA256

    587148b5a118b27e83b6a2d03431f59645e225706bb4178c5fd2a32dfb597167

    SHA512

    643d05804998b1cc965aadc02a12aef8c0984fdeb58044e43080182148a502ad5a1d24218812c1679dd4059802f283114e4c58514e108d0da102e23cd462768c

  • C:\Users\Admin\AppData\Local\Temp\lgehuztzmc.exe

    Filesize

    34KB

    MD5

    20742cabae8a6a4fed0126040a8f344f

    SHA1

    3a39a722d88c227f0149caa73654a76eaacf5a29

    SHA256

    587148b5a118b27e83b6a2d03431f59645e225706bb4178c5fd2a32dfb597167

    SHA512

    643d05804998b1cc965aadc02a12aef8c0984fdeb58044e43080182148a502ad5a1d24218812c1679dd4059802f283114e4c58514e108d0da102e23cd462768c

  • C:\Users\Admin\AppData\Local\Temp\qrktzj.e

    Filesize

    228KB

    MD5

    93accf920ba37a7fae83e379846f59a5

    SHA1

    29bda35707ad4dd2d549d221f64427c622b69ccb

    SHA256

    30d30fe5602dda24bc7afa849a9adaf716f349f957ca03f87da6926ba62699b2

    SHA512

    4784950a12c0bffccbfc32ae8595dca3eccf91da91f6999fed4b08fb8e8ad04f1ad27740ec9e9ac3fbe792b4bf87d81f1a318473f88008064a055ef726c57e71

  • memory/3464-140-0x0000000000480000-0x0000000000482000-memory.dmp

    Filesize

    8KB

  • memory/4584-142-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4584-144-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4584-149-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4584-145-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4584-225-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4584-226-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4584-227-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4584-228-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4584-229-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4584-230-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4584-231-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4584-232-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4584-234-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB