Malware Analysis Report

2024-09-11 03:08

Sample ID 240522-ck2hmagh97
Target 7cfb72fe8399b90bf0480b1ac8865b008e3b96358b8d674565336743689598ad
SHA256 7cfb72fe8399b90bf0480b1ac8865b008e3b96358b8d674565336743689598ad
Tags
neshta persistence spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7cfb72fe8399b90bf0480b1ac8865b008e3b96358b8d674565336743689598ad

Threat Level: Known bad

The file 7cfb72fe8399b90bf0480b1ac8865b008e3b96358b8d674565336743689598ad was found to be: Known bad.

Malicious Activity Summary

neshta persistence spyware stealer

Neshta

Detect Neshta payload

Reads user/profile data of web browsers

Loads dropped DLL

Checks computer location settings

Modifies system executable filetype association

Suspicious use of SetThreadContext

Drops file in Windows directory

Drops file in Program Files directory

Unsigned PE

Enumerates physical storage devices

Modifies registry class

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-22 02:08

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-22 02:08

Reported

2024-05-22 02:11

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe"

Signatures

Detect Neshta payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Neshta

persistence spyware neshta

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A

Modifies system executable filetype association

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A

Reads user/profile data of web browsers

spyware stealer

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 672 set thread context of 2372 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\cookie_exporter.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\msedgewebview2.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\BHO\ie_to_edge_stub.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~4.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MI9C33~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\elevation_service.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\identity_helper.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\notification_click_helper.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~3.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~2.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\msedge.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\msedge_proxy.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\msedge_pwa_launcher.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13187~1.37\MICROS~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 672 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 672 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 672 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 672 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 672 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 672 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 672 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 672 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 672 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 672 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 672 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe

Processes

C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe

"C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3980,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=4176 /prefetch:8

C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe

"C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 91.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 94.65.42.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp

Files

memory/672-0-0x000000007507E000-0x000000007507F000-memory.dmp

memory/672-1-0x0000000000410000-0x00000000004C4000-memory.dmp

memory/672-2-0x0000000005350000-0x00000000058F4000-memory.dmp

memory/672-3-0x0000000004EA0000-0x0000000004F32000-memory.dmp

memory/672-4-0x0000000005060000-0x000000000506A000-memory.dmp

memory/672-5-0x0000000005160000-0x00000000051FC000-memory.dmp

memory/672-6-0x0000000075070000-0x0000000075820000-memory.dmp

memory/672-7-0x0000000005310000-0x000000000532A000-memory.dmp

memory/672-8-0x0000000005150000-0x0000000005160000-memory.dmp

memory/672-9-0x0000000006600000-0x000000000668C000-memory.dmp

memory/2372-10-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2372-11-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2372-13-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2372-15-0x0000000000400000-0x000000000041B000-memory.dmp

memory/672-16-0x0000000075070000-0x0000000075820000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\3582-490\shipping docs IG190507601.exe

MD5 f420a233d9ff3db7b888fbdc1eb3d4fc
SHA1 80e2e9691dcb79e88a55d8ab87d4dad44f3b4aa7
SHA256 d75dc506ab34babb7fcd7f6e58ddbc3eda84042020d60d35ec016a9928469e60
SHA512 24f764feb656677c3cae88c147e2186660db2a89c338f02871cd3d25cec425e674fdb3745bf41f1a6dd75135bd8224a6390a48c956cf163706ec68dc070d3c90

C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

MD5 274c12b975b00d0bb69ca0910f7997b7
SHA1 007055bd33d8677ff43a1b0433e80989c36861a6
SHA256 26daa461138f85168ee63365ec6034cfaa66733ba6deba2eb7c0deef8b1d8eac
SHA512 bd2bf8b5501b8f4ab86f52b19eadccd008ee3e27ed8df05fed4797d2d4df7cd258455ccfe30e656626b78d58280f1cd432f0e08ff9a5df0795333364e9cf6fc1

memory/2372-124-0x0000000000400000-0x000000000041B000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-22 02:08

Reported

2024-05-22 02:11

Platform

win7-20240221-en

Max time kernel

119s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe"

Signatures

Detect Neshta payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Neshta

persistence spyware neshta

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A

Modifies system executable filetype association

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A

Reads user/profile data of web browsers

spyware stealer

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1300 set thread context of 1608 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1300 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 1300 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 1300 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 1300 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 1300 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 1300 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 1300 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 1300 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 1300 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 1300 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 1300 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe
PID 1300 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe

Processes

C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe

"C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe"

C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe

"C:\Users\Admin\AppData\Local\Temp\shipping docs IG190507601.exe"

Network

N/A

Files

memory/1300-0-0x0000000073FFE000-0x0000000073FFF000-memory.dmp

memory/1300-1-0x00000000008C0000-0x0000000000974000-memory.dmp

memory/1300-2-0x0000000073FF0000-0x00000000746DE000-memory.dmp

memory/1300-3-0x0000000001EF0000-0x0000000001F0A000-memory.dmp

memory/1300-4-0x0000000001DA0000-0x0000000001DB0000-memory.dmp

memory/1300-5-0x0000000005220000-0x00000000052AC000-memory.dmp

memory/1608-7-0x0000000000400000-0x000000000041B000-memory.dmp

memory/1608-12-0x0000000000400000-0x000000000041B000-memory.dmp

memory/1608-17-0x0000000000400000-0x000000000041B000-memory.dmp

memory/1608-18-0x0000000000400000-0x000000000041B000-memory.dmp

memory/1608-16-0x0000000000400000-0x000000000041B000-memory.dmp

memory/1608-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/1608-13-0x0000000000400000-0x000000000041B000-memory.dmp

memory/1608-11-0x0000000000400000-0x000000000041B000-memory.dmp

memory/1608-10-0x0000000000400000-0x000000000041B000-memory.dmp

memory/1608-9-0x0000000000400000-0x000000000041B000-memory.dmp

memory/1608-8-0x0000000000400000-0x000000000041B000-memory.dmp

memory/1300-20-0x0000000073FF0000-0x00000000746DE000-memory.dmp

C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe

MD5 71b27cf369e8c438be7a794a7c94c774
SHA1 baa7f83af5f88406c2fadbf41887199a66c1b1a4
SHA256 3bd7681a453785df06c39a5426343f725a3d613d44c1978d667548cf9aefebd8
SHA512 2bd87b67482e5d65d6a67ac64f15833a2c5cc9bcc1b4b0e92b3009fdc986a45c4fce4e370dffdd89e28175609a9b9acdaf162c1b8a15190491fc594012c9e47f

\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

MD5 9e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1 ec66cda99f44b62470c6930e5afda061579cde35
SHA256 8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA512 2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156