Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    17-04-2024 12:50

General

  • Target

    d4ff62f78b546c2e181f819abc1f17736ba27c6630118f6d6f772b7d34d5334d.exe

  • Size

    804KB

  • MD5

    daf5ddf2a53dde0a2398973fc6ac93e0

  • SHA1

    a225fec587cb4763eba40943c88396a86e74c6c4

  • SHA256

    d4ff62f78b546c2e181f819abc1f17736ba27c6630118f6d6f772b7d34d5334d

  • SHA512

    19d4ed705cb2550c9a5bf6f8ca0c5800c166ee20a64a401eff46b284c39ed5a8b1ed6838513379c60eae18d53e0d7e4dc0f43857b815c9c138664f6dd5bf738c

  • SSDEEP

    12288:zENN+T5xYrllrU7QY6/5xYrllrU7QY6vaLo3K3ahaMcqDJXKuJUsENN+7:Z5xolYQY6/5xolYQY6UomahakN6uJUs

Malware Config

Signatures

  • Detect Neshta payload 2 IoCs
  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 15 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4ff62f78b546c2e181f819abc1f17736ba27c6630118f6d6f772b7d34d5334d.exe
    "C:\Users\Admin\AppData\Local\Temp\d4ff62f78b546c2e181f819abc1f17736ba27c6630118f6d6f772b7d34d5334d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2872
    • \??\c:\users\admin\appdata\local\temp\d4ff62f78b546c2e181f819abc1f17736ba27c6630118f6d6f772b7d34d5334d.exe 
      c:\users\admin\appdata\local\temp\d4ff62f78b546c2e181f819abc1f17736ba27c6630118f6d6f772b7d34d5334d.exe 
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies registry class
      PID:2588
    • C:\Users\Admin\AppData\Local\icsys.icn.exe
      C:\Users\Admin\AppData\Local\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2540
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visiblity of hidden/system files in Explorer
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2684
        • \??\c:\windows\system\spoolsv.exe
          c:\windows\system\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2324
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2428
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1944
            • C:\Windows\SysWOW64\at.exe
              at 12:52 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
                PID:2576
              • C:\Windows\SysWOW64\at.exe
                at 12:53 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                6⤵
                  PID:1188
                • C:\Windows\SysWOW64\at.exe
                  at 12:54 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                  6⤵
                    PID:1900

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Persistence

        Boot or Logon Autostart Execution

        3
        T1547

        Registry Run Keys / Startup Folder

        2
        T1547.001

        Winlogon Helper DLL

        1
        T1547.004

        Event Triggered Execution

        1
        T1546

        Change Default File Association

        1
        T1546.001

        Privilege Escalation

        Boot or Logon Autostart Execution

        3
        T1547

        Registry Run Keys / Startup Folder

        2
        T1547.001

        Winlogon Helper DLL

        1
        T1547.004

        Event Triggered Execution

        1
        T1546

        Change Default File Association

        1
        T1546.001

        Defense Evasion

        Modify Registry

        5
        T1112

        Hide Artifacts

        1
        T1564

        Hidden Files and Directories

        1
        T1564.001

        Credential Access

        Unsecured Credentials

        1
        T1552

        Credentials In Files

        1
        T1552.001

        Discovery

        System Information Discovery

        1
        T1082

        Collection

        Data from Local System

        1
        T1005

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\icsys.icn.exe
          Filesize

          206KB

          MD5

          f2872915e8e25fe162e1f2001411a6bd

          SHA1

          dfc8ee7d8ac71ffb9e50f497068b6cc5339ccd2a

          SHA256

          9de96fbf380d228bb3e02860aeab04ad62c78978deab132bcb834ef2f833bfb5

          SHA512

          ea5ba2550ea3cab404c7e2cd73c201f71703d34918e39468cefac41df496afa253e116c8ae44d463db8f3c13c44e5953158ed467ca654e990a877d0dc45aebb4

        • C:\Users\Admin\AppData\Roaming\mrsys.exe
          Filesize

          207KB

          MD5

          9cba4eb509b31ac86c81aa93d5ce8173

          SHA1

          ef9e0df306def1dd41a10f0037abd0c238faa250

          SHA256

          23ecde6debc3fecb8275a3e8b232f5c242d7332bc00b64ab5155f3cb90e15626

          SHA512

          dc28e89eabf4bc966e1f1451aa2c444b451b7ff9f295049ff26e14c99fc9e9ff5164d2a29e99e614fdc4a19fd470b03d51fde9279d573d2a7ae4b78587b2ecd7

        • C:\Windows\system\spoolsv.exe
          Filesize

          206KB

          MD5

          198c430dba40794b2af33c9fa2faca8e

          SHA1

          b7b8000f580564f9a579a938aaabe53c5e2118b1

          SHA256

          b505cf8e4cd9bcd4f1fe733e2dce0f1b4377d563d1ec8a51bd80657e8ea3b711

          SHA512

          936fa92afd547b9f4edd245a896bb4cffda4fb91aa3904d41a5d3e155126bbaa412638b4467b426d7a0d96abe71872d400f14b0ee4f546fd1ab23c5490a20946

        • C:\Windows\system\svchost.exe
          Filesize

          206KB

          MD5

          ded2dbe9e7aa8fcafecaec53b4f50815

          SHA1

          fc91dd8b8f8377aacdff5f365f3f5b7b31535a1e

          SHA256

          5d200477ca0d2b34a166da3dbc694434db7590bdabafcf6b49192de05e96c300

          SHA512

          ea0d3e3a4678309d10ca7e148c09d8803c1ad98cc7d6666a2d7f012c452205f2b53f34c3f58893b5963a3eeeaf4207d327930f2b759e6203b6fae69b36a4815b

        • \??\c:\users\admin\appdata\local\temp\d4ff62f78b546c2e181f819abc1f17736ba27c6630118f6d6f772b7d34d5334d.exe 
          Filesize

          598KB

          MD5

          e0d1b214c3901f72582de29380ad0f11

          SHA1

          8b3a505c4e6195fd2eb2522191a8ea8eee2a248c

          SHA256

          c7971981baf58b28fa5cfd06112caf63f63667eece0ac563e5082a6a28533c18

          SHA512

          0f340c05a8d68536113bedf586060cc5223b5bd3cfc88dc6942da150b88246e3bb656b145a9e64cf2520dd848428ca314f1d60f0914d58e026f1715a8f38371f

        • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
          Filesize

          252KB

          MD5

          9e2b9928c89a9d0da1d3e8f4bd96afa7

          SHA1

          ec66cda99f44b62470c6930e5afda061579cde35

          SHA256

          8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

          SHA512

          2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

        • \Windows\system\explorer.exe
          Filesize

          206KB

          MD5

          cbe70224477b3ccff130c9c6c5d2a851

          SHA1

          1cdcf42b2ee3b105eb4b8ff35ca6ad6e61d03bf9

          SHA256

          dffb2ea9e8dd1c3d9158ed82992eb9a65d1dc8c63b4bf5310de6748d601ac6e0

          SHA512

          43fa03f66c2e180b89cb79cb262ba92a7c298f07271ecd638b6178afe3380ae6f9d0d89b7e46e38ea4f99905722f0c961276469884bb8c88923284d4ccd7d3d3

        • memory/2588-153-0x0000000000400000-0x000000000041B000-memory.dmp
          Filesize

          108KB