Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/06/2024, 21:56

General

  • Target

    3d56cec2321d9bd8a8642e5bccd89fab95a62612d61fd4cfd05aae4a8cec9eda.exe

  • Size

    1.3MB

  • MD5

    2347cd5b2ffddb26693717d42022f2d7

  • SHA1

    7cdc22523e655b65d21d2a39d1a1c77eab9d6f0f

  • SHA256

    3d56cec2321d9bd8a8642e5bccd89fab95a62612d61fd4cfd05aae4a8cec9eda

  • SHA512

    ce6f1ea3b5c3dd92436a5c9489cd000609a57c019d912d299656a9b42ab4f832e267b65f1d5a7c3753a966d7cb4575291d01d0f2d517085281ec2ce0e41eac98

  • SSDEEP

    12288:/VYvke3M71F8cMKHXXAcs6FAAUeatG25WTsJQTbrMeHblRSmOeo1QEm+S9:tCp3MhFF/QMAAVa75XmTb4eRqeOQEK

Malware Config

Signatures

  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d56cec2321d9bd8a8642e5bccd89fab95a62612d61fd4cfd05aae4a8cec9eda.exe
    "C:\Users\Admin\AppData\Local\Temp\3d56cec2321d9bd8a8642e5bccd89fab95a62612d61fd4cfd05aae4a8cec9eda.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3304
    • C:\Users\Admin\AppData\Local\Temp\3582-490\3d56cec2321d9bd8a8642e5bccd89fab95a62612d61fd4cfd05aae4a8cec9eda.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\3d56cec2321d9bd8a8642e5bccd89fab95a62612d61fd4cfd05aae4a8cec9eda.exe"
      2⤵
      • Executes dropped EXE
      PID:3436
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3692 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1828

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe

      Filesize

      9.4MB

      MD5

      124147ede15f97b47224628152110ce2

      SHA1

      4530fee9b1199777693073414b82420a7c88a042

      SHA256

      3e815d583236b9cecd912fcc949a301d1e51b609cbb53a2285d08feea305edcd

      SHA512

      f4c2825380d1bb9ca889d5c5684f13aa0cacb0d6511f6409ca0972a7191195a0175e00c995407848bf09ea03cff05c7395952bf2ffd2af2015b8939f75a8e627

    • C:\Users\Admin\AppData\Local\Temp\3582-490\3d56cec2321d9bd8a8642e5bccd89fab95a62612d61fd4cfd05aae4a8cec9eda.exe

      Filesize

      1.2MB

      MD5

      30728da291c1ea94a500333ba3e15538

      SHA1

      7497e3ac07699d3f2f87188b533a11a0895fc7b3

      SHA256

      e2a04f9b3d3edac99ddc07cfedcc860edcfc05bddf8f15392fdc82fc17285b58

      SHA512

      35c28895213abf56aa71a5133358b766bfa023d01e48b2772de2bf113835b5deecd6abec037587465469c3418c8d84bdde5879ed3efa1ae4ad5b746bc734a93e

    • memory/3304-123-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3304-96-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3304-121-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3304-122-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3304-13-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3304-124-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3304-125-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3304-126-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3304-127-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3304-128-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3304-129-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3304-130-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3304-132-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB