Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/04/2024, 13:36

General

  • Target

    0de78bf97ff1864cbbf7c0f6c667911e03857364fe7bc05460c5d23f37f8e6db.exe

  • Size

    2.1MB

  • MD5

    89562223ad08c64afab5ac2e7d2f5c01

  • SHA1

    f26d3f226ea390a9dddddc499af92027d4c430d7

  • SHA256

    0de78bf97ff1864cbbf7c0f6c667911e03857364fe7bc05460c5d23f37f8e6db

  • SHA512

    58cabe950a6787d555bdcde59e83707538778e3287f8e27c71552b8dcf9c58d3c3c29534e108030d96e24f76e823cc9dd563b560a3880cc008e80327b209ae7e

  • SSDEEP

    49152:YbdYAm4zKbdYAm4zVbdYAm4zFbdYAm4zu3AmQEQkXp6fNAKNhRS51qzms2PHM:SdrAdrldr1drcAnEQKQNH4nqzKPs

Malware Config

Signatures

  • Detect Neshta payload 5 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0de78bf97ff1864cbbf7c0f6c667911e03857364fe7bc05460c5d23f37f8e6db.exe
    "C:\Users\Admin\AppData\Local\Temp\0de78bf97ff1864cbbf7c0f6c667911e03857364fe7bc05460c5d23f37f8e6db.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Users\Admin\AppData\Local\Temp\0de78bf97ff1864cbbf7c0f6c667911e03857364fe7bc05460c5d23f37f8e6db.exe
      "C:\Users\Admin\AppData\Local\Temp\0de78bf97ff1864cbbf7c0f6c667911e03857364fe7bc05460c5d23f37f8e6db.exe"
      2⤵
      • Modifies system executable filetype association
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies registry class
      PID:2468

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe

          Filesize

          547KB

          MD5

          99961ffb1f8755d99f024c82214c63e6

          SHA1

          2004cbe9a25ab3bdd87c85594abff18a92e13c3f

          SHA256

          50c5fb71a9f6cb9e1c91ba7eee66409fd3c43bca1bc37659abdb78d494ea2ecd

          SHA512

          f03fb7b1d84886a24a8b149238edc0c4e5729dc0b7212fb15650a81c89ed58c55f62502a6c90cb680cb31ce18026bb259189446b74f1975f462d46c89019bc0a

        • memory/1284-44-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-41-0x000000000C150000-0x000000000C363000-memory.dmp

          Filesize

          2.1MB

        • memory/1284-9-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-10-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-11-0x000000000C150000-0x000000000C363000-memory.dmp

          Filesize

          2.1MB

        • memory/1284-16-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-18-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-20-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-22-0x000000000C150000-0x000000000C363000-memory.dmp

          Filesize

          2.1MB

        • memory/1284-24-0x000000000C150000-0x000000000C363000-memory.dmp

          Filesize

          2.1MB

        • memory/1284-30-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-28-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-26-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-35-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-33-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-40-0x000000000C150000-0x000000000C363000-memory.dmp

          Filesize

          2.1MB

        • memory/1284-3-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/1284-42-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-5-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-43-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-47-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-46-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-48-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-45-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-53-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-57-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-55-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-4-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/1284-62-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/1284-58-0x000000000C150000-0x000000000C363000-memory.dmp

          Filesize

          2.1MB

        • memory/1284-63-0x0000000000380000-0x0000000000388000-memory.dmp

          Filesize

          32KB

        • memory/1284-65-0x00000000005F0000-0x00000000006F0000-memory.dmp

          Filesize

          1024KB

        • memory/1284-61-0x000000000C150000-0x000000000C363000-memory.dmp

          Filesize

          2.1MB

        • memory/2468-67-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB

        • memory/2468-60-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2468-64-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2468-59-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2468-140-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2468-142-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB