Analysis
-
max time kernel
148s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 09:37
Static task
static1
Behavioral task
behavioral1
Sample
7c129a88eedda52269a853453588215d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c129a88eedda52269a853453588215d.exe
Resource
win10v2004-20231222-en
General
-
Target
7c129a88eedda52269a853453588215d.exe
-
Size
341KB
-
MD5
7c129a88eedda52269a853453588215d
-
SHA1
a95bd348f383d31281484636786b54371f622fcb
-
SHA256
9671c9b1ab6c6fe9c1f327f3bdca7e41fcf1de877b075dce1750f92f259e8052
-
SHA512
5299aa4d7d1f085193b7ddcd6a1485897b7bd3cb4493cbb8ff5353d4d7803356b611daa573d6b518f1b3358ebc670316bae31344a1db5641594e6dfef3e12a1a
-
SSDEEP
6144:PuTTchG7dYVY88Stf6DOmbtmtdpXWZV1RPfmK5:QdYNff6Kmpmtdc1RPf7
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 1 IoCs
pid Process 2588 7c129a88eedda52269a853453588215d.exe -
Loads dropped DLL 2 IoCs
pid Process 2936 7c129a88eedda52269a853453588215d.exe 2936 7c129a88eedda52269a853453588215d.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 7c129a88eedda52269a853453588215d.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE 7c129a88eedda52269a853453588215d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 7c129a88eedda52269a853453588215d.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 7c129a88eedda52269a853453588215d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 7c129a88eedda52269a853453588215d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2588 7c129a88eedda52269a853453588215d.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2588 2936 7c129a88eedda52269a853453588215d.exe 29 PID 2936 wrote to memory of 2588 2936 7c129a88eedda52269a853453588215d.exe 29 PID 2936 wrote to memory of 2588 2936 7c129a88eedda52269a853453588215d.exe 29 PID 2936 wrote to memory of 2588 2936 7c129a88eedda52269a853453588215d.exe 29 PID 2936 wrote to memory of 2588 2936 7c129a88eedda52269a853453588215d.exe 29 PID 2936 wrote to memory of 2588 2936 7c129a88eedda52269a853453588215d.exe 29 PID 2936 wrote to memory of 2588 2936 7c129a88eedda52269a853453588215d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c129a88eedda52269a853453588215d.exe"C:\Users\Admin\AppData\Local\Temp\7c129a88eedda52269a853453588215d.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7c129a88eedda52269a853453588215d.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\7c129a88eedda52269a853453588215d.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
859KB
MD5754309b7b83050a50768236ee966224f
SHA110ed7efc2e594417ddeb00a42deb8fd9f804ed53
SHA256acd32dd903e5464b0ecd153fb3f71da520d2e59a63d4c355d9c1874c919d04e6
SHA512e5aaddf62c08c8fcc1ae3f29df220c5c730a2efa96dd18685ee19f5a9d66c4735bb4416c4828033661990604669ed345415ef2dc096ec75e1ab378dd804b1614
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
301KB
MD5ddaa49896b115fc3ec9af8b1b66bc52a
SHA159dba16622ffd284fd0580e2846861c4a1ba5655
SHA256960db28ede923d104ca0c82bddbb20990bcca24a37734ebaa5a8ab50f2a1ce3c
SHA5124ff55824799bcb36a33ece775b0977e36daa22c409014be4694beb4d0848e8395821ee60964066640ae8384d7657e8b13b9843efc06fe5944b2fc8fc2ec71dca