Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/02/2024, 04:35

General

  • Target

    8e39ddc4dcea638cc3ce10c7c9e4666b.exe

  • Size

    227KB

  • MD5

    8e39ddc4dcea638cc3ce10c7c9e4666b

  • SHA1

    06a532c9059b15466e0e0de7a2f78a101d3bee00

  • SHA256

    8fdbf538b7650efb41fb65269578af86c679cc0577399057f7385931c77075fb

  • SHA512

    dcac3b07b076cccf3a3b998376038683d64939116e3d99539a8a6870a235cd40d8e0a611febac82481975cd7f599827fbe3476c2ce94db867c13a241927b91eb

  • SSDEEP

    3072:Rr8WDrC8PkADIRnrxSuyJ1gjuYUEHjE2YKHMq8gus0ccntpQQDO+41YmbQy4tpQ2:tuDcIRouWgi0LDZoQ1VY7y+Q1VY7yw

Malware Config

Signatures

  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e39ddc4dcea638cc3ce10c7c9e4666b.exe
    "C:\Users\Admin\AppData\Local\Temp\8e39ddc4dcea638cc3ce10c7c9e4666b.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3348
    • C:\Users\Admin\AppData\Local\Temp\3582-490\8e39ddc4dcea638cc3ce10c7c9e4666b.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\8e39ddc4dcea638cc3ce10c7c9e4666b.exe"
      2⤵
      • Executes dropped EXE
      PID:1624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe

    Filesize

    2.4MB

    MD5

    dfd01e298b2f6aee74d571c8247e8856

    SHA1

    ad136e9f09e915ebd37e1a82b621fbe492a122ef

    SHA256

    5eb2105996e0f529c5f931a805d47a4f8d612746ac1778240a17193c44eb4e1f

    SHA512

    d01854e1f07c4974d08f488497ba1f0c816d2d645cdc6f79d6f5a6f46994d92b13e7f46fee506314831d96ad926a9f8b5009acbf772181105ac68f3f4fbb638c

  • C:\Users\Admin\AppData\Local\Temp\3582-490\8e39ddc4dcea638cc3ce10c7c9e4666b.exe

    Filesize

    187KB

    MD5

    4bb925a6cb23abe798c26d97df059912

    SHA1

    cab0aef795bb41eab5f7efdc7a02ec76582ddb0b

    SHA256

    1fb3441c3f3d7cdd590687b1545fc0582e143d357e8cfa10f269fa223554a93f

    SHA512

    0a306752a33c52272ed5de94ec2c272989c1633c5886862bdb6605a47ed09ef2c3ba17c7da6ecd6dbf0c46f0af33cc3b334e4b0dbba1b1ed4c329ab6269247a9

  • memory/3348-99-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3348-100-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3348-101-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3348-102-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3348-103-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3348-105-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB