Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-04-2024 02:39

General

  • Target

    c62ede7ccc80aa8f5d01a5ce8d3ab71978125219745a54611847cad8db62f11e.exe

  • Size

    5.1MB

  • MD5

    8138900f54fbd723a5e8bf8a7ccbcefa

  • SHA1

    8584a762a3c942e2acccf9629496844c5f9e915a

  • SHA256

    c62ede7ccc80aa8f5d01a5ce8d3ab71978125219745a54611847cad8db62f11e

  • SHA512

    7a105c1f9f1c9b5207c7b4a034afea28060ba6efc756648a727a0189f65ac33fa8de269c7419b6f57adbc08c7e78d60c16c507ae7f1a8076373dbec35ea741a3

  • SSDEEP

    49152:9yfF9pFEftw3vYMkqecOCiQhxOsEzijUeukxEqtH+Nn1YufNaUYl5beRfbtG6N+b:9u83M9F1OmhdSEeRfbtrPL78T

Malware Config

Signatures

  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c62ede7ccc80aa8f5d01a5ce8d3ab71978125219745a54611847cad8db62f11e.exe
    "C:\Users\Admin\AppData\Local\Temp\c62ede7ccc80aa8f5d01a5ce8d3ab71978125219745a54611847cad8db62f11e.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\3582-490\c62ede7ccc80aa8f5d01a5ce8d3ab71978125219745a54611847cad8db62f11e.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\c62ede7ccc80aa8f5d01a5ce8d3ab71978125219745a54611847cad8db62f11e.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:4936

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe
    Filesize

    2.4MB

    MD5

    d9e8a1fa55faebd36ed2342fedefbedd

    SHA1

    c25cc7f0035488de9c5df0121a09b5100e1c28e9

    SHA256

    bd7696911d75a9a35dfd125b24cb95003f1e9598592df47fa23a2568986a4a9a

    SHA512

    134644c68bd04536e9ea0a5da6e334d36b1ce8012a061fa6dabd31f85c16a1ac9eee8c40fee3d55f25c4d4edf0672de8ce204e344c800361cbcff092c09d7a33

  • C:\Users\Admin\AppData\Local\Temp\3582-490\c62ede7ccc80aa8f5d01a5ce8d3ab71978125219745a54611847cad8db62f11e.exe
    Filesize

    5.1MB

    MD5

    0c73778eb876529892d0daa4e249a683

    SHA1

    ada19fe0a5aeec43e1afc145def245bccb849638

    SHA256

    c4580334ca1eb51fc62a96aae3fc1576adcf0558dd3fbda96186d4230e2cb8e1

    SHA512

    3b402a6afc2eecc63b1e1e8c08346052c861dba656c0bcd694cf8f3bec297102fd01c4be887fe5e96a69644ca2674b21c257b679661110969d436cd010d66272

  • C:\Windows\INF\c_volume.PNF
    Filesize

    4KB

    MD5

    8b0c8f54383cef8ac91d3c21663b21fc

    SHA1

    0bc698df786a3396c58ecca34207a4c81985af10

    SHA256

    41cef722ddac2159237cc6c4adc318e75d5b1159373d616e9bdd35f807d2280e

    SHA512

    80a87ef617b5fb2e8ff1cc63b45d2f7f8a368da382bb9bf6d5863f83748f3ea1ade79c6ac7a0de8203d1d43eef01a603bfbc9d47a0d3b9fa56bd71b235c6c8b0

  • memory/3016-119-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/3016-121-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/3016-124-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/4936-120-0x0000000000400000-0x000000000094C000-memory.dmp
    Filesize

    5.3MB