Analysis

  • max time kernel
    131s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-05-2024 19:28

General

  • Target

    1fea382a93766b6fbdfc53ba398b0de60264a3b752b35bd682ffaf3db0654501.exe

  • Size

    280KB

  • MD5

    369a9ff3917fc02674679ea721201156

  • SHA1

    58be57857fa33aa1bfa9d2b080c438ea67615484

  • SHA256

    1fea382a93766b6fbdfc53ba398b0de60264a3b752b35bd682ffaf3db0654501

  • SHA512

    421fba3af112fa6c11b219ba68b48e46edd77d23a17c2f4a83fc4031558162d0edae261c53afd971a5385ddc5b09a9f742dbeeeddfa3f2cbd7335c2025dc7d6c

  • SSDEEP

    6144:k95IJZiCgq1gQb4KgLqMIuLRTK83KrAqGYoKbfO8otJ:bZiCgSgQb4KgLqMIuLRTwrAq1oKzO8o/

Malware Config

Signatures

  • Detect Neshta payload 5 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1fea382a93766b6fbdfc53ba398b0de60264a3b752b35bd682ffaf3db0654501.exe
    "C:\Users\Admin\AppData\Local\Temp\1fea382a93766b6fbdfc53ba398b0de60264a3b752b35bd682ffaf3db0654501.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3844
    • C:\Users\Admin\AppData\Local\Temp\3582-490\1fea382a93766b6fbdfc53ba398b0de60264a3b752b35bd682ffaf3db0654501.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\1fea382a93766b6fbdfc53ba398b0de60264a3b752b35bd682ffaf3db0654501.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1516

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE
    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Users\Admin\AppData\Local\Temp\3582-490\1fea382a93766b6fbdfc53ba398b0de60264a3b752b35bd682ffaf3db0654501.exe
    Filesize

    240KB

    MD5

    b89051e8cf348e69c0943b540af3b99c

    SHA1

    50200e338cb5df75077c6144884bf0ff6bf7cc7a

    SHA256

    2e0a0e7e5d510f4274cd22ca2ed10f4bcca932a8cb2a756a47c13fb36a5fb58d

    SHA512

    ab1e75c6ccf80fdd29bb35ec802032a46cf642e444ba392a2224cc025d05d78148f60bf81d4405b25301ce86b83e03d9249378864afa575fa6a61f05dea21408

  • C:\Users\Admin\AppData\Local\Temp\Solara\SolaraBETA3.1\Monaco\fileaccess\node_modules\get-intrinsic\.nycrc
    Filesize

    139B

    MD5

    d0104f79f0b4f03bbcd3b287fa04cf8c

    SHA1

    54f9d7adf8943cb07f821435bb269eb4ba40ccc2

    SHA256

    997785c50b0773e5e18bf15550fbf57823c634fefe623cd37b3c83696402ad0a

    SHA512

    daf9b5445cfc02397f398adfa0258f2489b70699dfec6ca7e5b85afe5671fdcabe59edee332f718f5e5778feb1e301778dffe93bb28c1c0914f669659bad39c6

  • C:\Users\Admin\AppData\Local\Temp\Solara\SolaraBETA3.1\Monaco\fileaccess\node_modules\has-proto\.eslintrc
    Filesize

    43B

    MD5

    c28b0fe9be6e306cc2ad30fe00e3db10

    SHA1

    af79c81bd61c9a937fca18425dd84cdf8317c8b9

    SHA256

    0694050195fc694c5846b0a2a66b437ac775da988f0a779c55fb892597f7f641

    SHA512

    e3eca17804522ffa4f41e836e76e397a310a20e8261a38115b67e8b644444153039d04198fb470f45be2997d2c7a72b15bd4771a02c741b3cbc072ea6ef432e9

  • C:\Users\Admin\AppData\Local\Temp\Solara\SolaraBETA3.1\Monaco\fileaccess\node_modules\hasown\.nycrc
    Filesize

    216B

    MD5

    c2ab942102236f987048d0d84d73d960

    SHA1

    95462172699187ac02eaec6074024b26e6d71cff

    SHA256

    948366fea3b423a46366326d0bb2e54b08abd1cf0b243678ba6625740c40da5a

    SHA512

    e36b20c16ceeb090750f3865efc8d7fd983ae4e8b41c30cc3865d2fd4925bf5902627e1f1ed46c0ff2453f076ef9de34be899ef57754b29cd158440071318479

  • C:\Users\Admin\AppData\Local\Temp\Solara\SolaraBETA3.1\Monaco\fileaccess\node_modules\vary\LICENSE
    Filesize

    1KB

    MD5

    13babc4f212ce635d68da544339c962b

    SHA1

    4881ad2ec8eb2470a7049421047c6d076f48f1de

    SHA256

    bd47ce7b88c7759630d1e2b9fcfa170a0f1fde522be09e13fb1581a79d090400

    SHA512

    40e30174433408e0e2ed46d24373b12def47f545d9183b7bce28d4ddd8c8bb528075c7f20e118f37661db9f1bba358999d81a14425eb3e0a4a20865dfcb53182

  • memory/1516-105-0x0000000006CA0000-0x0000000006CB2000-memory.dmp
    Filesize

    72KB

  • memory/1516-104-0x0000000006B70000-0x0000000006B7A000-memory.dmp
    Filesize

    40KB

  • memory/1516-12-0x0000000073BEE000-0x0000000073BEF000-memory.dmp
    Filesize

    4KB

  • memory/1516-14-0x0000000073BE0000-0x0000000074390000-memory.dmp
    Filesize

    7.7MB

  • memory/1516-13-0x0000000000D80000-0x0000000000DC2000-memory.dmp
    Filesize

    264KB

  • memory/1516-1919-0x0000000073BEE000-0x0000000073BEF000-memory.dmp
    Filesize

    4KB

  • memory/1516-1920-0x0000000073BE0000-0x0000000074390000-memory.dmp
    Filesize

    7.7MB

  • memory/3844-102-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/3844-1918-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/3844-1921-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/3844-1923-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB