Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-05-2024 19:38

General

  • Target

    2372a95d3d6d087102411165a027aafbe7994d73774f96c89394a8c6050009f0.exe

  • Size

    6.7MB

  • MD5

    a88ec3f748e3ee980f673640600b9e3e

  • SHA1

    620b4a092b42303da603cd5e5ad7b4b168fac3e1

  • SHA256

    2372a95d3d6d087102411165a027aafbe7994d73774f96c89394a8c6050009f0

  • SHA512

    1ebd5eff754589b7f867fde35dd5bd89c7173c2d24052c9e69941617bbbbc9b860c12ebe970e28ca9ce6df0f617657f7e6094ef2f56d9ec19bf4f6063d38f444

  • SSDEEP

    196608:JZpI4RiEGMFwaD/s/exVctPfPmonwOvRE/LHE1DmJi10vg6DQKnwbHG:Jc4RirOwaDE/gVuPfPhwOvR8LHomg0vB

Malware Config

Signatures

  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 10 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2372a95d3d6d087102411165a027aafbe7994d73774f96c89394a8c6050009f0.exe
    "C:\Users\Admin\AppData\Local\Temp\2372a95d3d6d087102411165a027aafbe7994d73774f96c89394a8c6050009f0.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Users\Admin\AppData\Local\Temp\3582-490\2372a95d3d6d087102411165a027aafbe7994d73774f96c89394a8c6050009f0.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\2372a95d3d6d087102411165a027aafbe7994d73774f96c89394a8c6050009f0.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Users\Admin\AppData\Local\Temp\TeamViewer\Version8\TeamViewer_.exe
        "C:\Users\Admin\AppData\Local\Temp\TeamViewer\Version8\TeamViewer_.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:4316

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe
    Filesize

    2.4MB

    MD5

    d9e8a1fa55faebd36ed2342fedefbedd

    SHA1

    c25cc7f0035488de9c5df0121a09b5100e1c28e9

    SHA256

    bd7696911d75a9a35dfd125b24cb95003f1e9598592df47fa23a2568986a4a9a

    SHA512

    134644c68bd04536e9ea0a5da6e334d36b1ce8012a061fa6dabd31f85c16a1ac9eee8c40fee3d55f25c4d4edf0672de8ce204e344c800361cbcff092c09d7a33

  • C:\Users\Admin\AppData\Local\Temp\3582-490\2372a95d3d6d087102411165a027aafbe7994d73774f96c89394a8c6050009f0.exe
    Filesize

    6.7MB

    MD5

    36237f67229d22e30adb39ef6d31d123

    SHA1

    7f46b4633a8e2c345816b1793fe02eaa695a91cb

    SHA256

    f832d64b97f085f3acc071f4f035472bc65c0e9f91e6a9c5413943da80f6fdcf

    SHA512

    01437e820d4054082f3d7829bafff904f736890c8cb40ab8e9e81c987ca7ee5808da725ee85aca9a18028042a46dcba0a055fd50a32ccff2036a87780c1f8c90

  • C:\Users\Admin\AppData\Local\Temp\TeamViewer\Version8\TeamViewer_.exe
    Filesize

    6.5MB

    MD5

    88b755bdd635d5d10f49823a3e9fe775

    SHA1

    568e684b1a3eee0b8511523e8658916e646f214f

    SHA256

    372400dfe62c18b70e408723319856a853bf5694ec864e6ab8bf1d5b8fb4f88a

    SHA512

    bee2498686011c37f29c63edccd4a31489c92039298a676e18a085cbc08f3b09383c35d28619bdd8cda705e6549c5585304558d834fc6c29003dfdb925fe73ea

  • C:\Users\Admin\AppData\Local\Temp\nsa2ED1.tmp\TvGetVersion.dll
    Filesize

    152KB

    MD5

    63a1e68cac00ced9a223a63dfef18fb2

    SHA1

    ed06a5a6feec468ad1860f3b43fbfbbe90ec9eea

    SHA256

    aad1cf72dca9ba974257991d9299be7bbf3e02c26b23fc72a9710cde34e441c2

    SHA512

    48bfabe6c54e7a5590814bfa8db48c519b85d5565c4d5b344aa5357e14dc2a69e23d158b76e6eb2c9f44c4c811590c118d092864dc18b02f592d76c73601e67b

  • C:\Users\Admin\AppData\Local\Temp\nss3376.tmp\InstallOptions.dll
    Filesize

    15KB

    MD5

    89351a0a6a89519c86c5531e20dab9ea

    SHA1

    9e801aaaae9e70d8f7fc52f6f12cedc55e4c8a00

    SHA256

    f530069ef87a1c163c4fd63a3d5b053420ce3d7a98739c70211b4a99f90d6277

    SHA512

    13168fa828b581383e5f64d3b54be357e98d2eb9362b45685e7426ffc2f0696ab432cc8a3f374ce8abd03c096f1662d954877afa886fc4aa74709e6044b75c08

  • C:\Users\Admin\AppData\Local\Temp\nss3376.tmp\System.dll
    Filesize

    11KB

    MD5

    bf712f32249029466fa86756f5546950

    SHA1

    75ac4dc4808ac148ddd78f6b89a51afbd4091c2e

    SHA256

    7851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af

    SHA512

    13f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4

  • C:\Users\Admin\AppData\Local\Temp\nss3376.tmp\UserInfo.dll
    Filesize

    4KB

    MD5

    c7ce0e47c83525983fd2c4c9566b4aad

    SHA1

    38b7ad7bb32ffae35540fce373b8a671878dc54e

    SHA256

    6293408a5fa6d0f55f0a4d01528eb5b807ee9447a75a28b5986267475ebcd3ae

    SHA512

    ee9f23ea5210f418d4c559628bbfb3a0f892440bcd5dc4c1901cb8e510078e4481ea8353b262795076a19055e70b88e08fee5fb7e8f35a6f49022096408df20e

  • C:\Users\Admin\AppData\Local\Temp\nss3376.tmp\advanced_unicode.ini
    Filesize

    1KB

    MD5

    8b3e104f11c5d046bd93df4e9fb40f4e

    SHA1

    0362bb65744a07563dc05cd612dd54a865233d79

    SHA256

    cc18c611578d796a879cac46746406dbaa96eddd544d7a12d4fa56856cb2cbc1

    SHA512

    edc08be542234c3ed6a94c46c610eb5398782c580859eda11f35df6112b3dfee10cf4be068c7a87f39a339f10a9176350cae9f657857375d641a35d5d151ced8

  • C:\Users\Admin\AppData\Local\Temp\nss3376.tmp\linker.dll
    Filesize

    45KB

    MD5

    4ac3f0ab2e423515ed9c575333342054

    SHA1

    a3e4f2b2135157f964d471564044b023a64f2532

    SHA256

    f223d6c72f86544b358a6301daf60ccdd86198f32e3447a1860acf3f59f2dae9

    SHA512

    8fbd5b4989be51c27fa15af155d2921bea9aa5d0557a22d4224256e678dfe7dcaa5f80917a748c31dc9c9a91573e4618e2497ccfd47eefd7a0fa08c12366a1e5

  • C:\Users\Admin\AppData\Local\Temp\nss3376.tmp\start_unicode.ini
    Filesize

    2KB

    MD5

    0b8115fe3dd07cc17ee81936af806223

    SHA1

    f6a2c779ad42985abe5acbec980c84ea55b1845e

    SHA256

    3aff09587d5207c4c3d63b63accee78d5debe47e5ba9c71810508d6c38910b88

    SHA512

    02a74e8c3520fc77be407585aa900e10f7a9e00b53b9b700dc6916e1c12791e4fa15cb9c1eb88e48de2f742b9f00c106c3418aaac911ba25223487909ffc5427

  • C:\Users\Admin\AppData\Local\Temp\nss3376.tmp\start_unicode.ini
    Filesize

    2KB

    MD5

    1509714929f3c77b929fda542207d98c

    SHA1

    b955f918b1f0a1669017af939070789fa325f2bc

    SHA256

    b76e27078dd3b56b8270d45d2747bfe1406ce18e52d22dea154d306dafad2312

    SHA512

    cb683846fbb35d69d57f636bf5e10db4150393cbea831101ee25107be65d95de29bf550d13d8a0567b96a93c6a80d10f5f821b888aa5227b995a9bddd3916b7a

  • memory/2352-372-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/2352-373-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/2352-375-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB