Analysis

  • max time kernel
    164s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2024 20:02

General

  • Target

    cca3a842ace17da425030764ad6ee1e3.exe

  • Size

    4.4MB

  • MD5

    cca3a842ace17da425030764ad6ee1e3

  • SHA1

    a7af93570adcc057e44db5a64eab235f022e5a2d

  • SHA256

    496c44eaf6f2df9a54fded426dc674f2f93ee4603f514900eeb06a169dce3751

  • SHA512

    11fc4fe33523bb5040f218e07f92f74b3bf077acd1743699aef05e1341c82960017c2092e9b56ab2679fc46b735525f563458d5644ffed040b1d6b982db9d129

  • SSDEEP

    49152:Fa35tY5FhBfpjB6SkKeW/nrN9itixC5QV9h1y6+jF2/Tsq7r/I8wKeKmCwjE34dJ:FtfTwoS5GwK8QQI05wb7KNL

Malware Config

Signatures

  • Detect Neshta payload 6 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cca3a842ace17da425030764ad6ee1e3.exe
    "C:\Users\Admin\AppData\Local\Temp\cca3a842ace17da425030764ad6ee1e3.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:116
    • C:\Users\Admin\AppData\Local\Temp\3582-490\cca3a842ace17da425030764ad6ee1e3.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\cca3a842ace17da425030764ad6ee1e3.exe"
      2⤵
      • Executes dropped EXE
      PID:3964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\cca3a842ace17da425030764ad6ee1e3.exe

    Filesize

    4.3MB

    MD5

    9f2d86da7d58a70b0003307d9cfc2438

    SHA1

    bd69ad6ea837e309232d7c4fd0e87e22c3266ac5

    SHA256

    7052619814a614a1b157c5c94a92dbec22b425a0977ac8b21958b8db81e2dd65

    SHA512

    ce345ff77d8043f416a04b782be8e7b0d5fdea933f3ac79abb88648a9fca23d7a69f537a825d0b636ba64f80afe70f758114ddbf412bd9398800ba4b6e359a99

  • memory/116-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/116-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/116-18-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/116-19-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/116-20-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/116-21-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB