Analysis

  • max time kernel
    125s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 07:05

General

  • Target

    e00dd7eb22f4c0edd534efd84e64dd0129826b4175697e925ebb551b5a33421f.exe

  • Size

    148KB

  • MD5

    afb27825d8a45bea2992eca0e060a968

  • SHA1

    4ba416298adc14aae5b27dcbf29d12b4fdc4fbb8

  • SHA256

    e00dd7eb22f4c0edd534efd84e64dd0129826b4175697e925ebb551b5a33421f

  • SHA512

    75070ba706ca43404d54e75a58b36e4178892822d6aea2bec5304931c57b5fad0b4d52750da5ed3bde1fb0f86d5481bc8106b23be497a5593627ecaecf12de43

  • SSDEEP

    3072:wr85Cl7A5G390uDmJTQSaMm5/6lWOax9ggPppjdz7eqQfZ86:w9ZqWlQWx3PppjdPsZ86

Malware Config

Signatures

  • Detect Neshta payload 5 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e00dd7eb22f4c0edd534efd84e64dd0129826b4175697e925ebb551b5a33421f.exe
    "C:\Users\Admin\AppData\Local\Temp\e00dd7eb22f4c0edd534efd84e64dd0129826b4175697e925ebb551b5a33421f.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Users\Admin\AppData\Local\Temp\3582-490\e00dd7eb22f4c0edd534efd84e64dd0129826b4175697e925ebb551b5a33421f.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\e00dd7eb22f4c0edd534efd84e64dd0129826b4175697e925ebb551b5a33421f.exe"
      2⤵
      • Executes dropped EXE
      PID:624
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3772,i,11746347647270949551,7786733067759450703,262144 --variations-seed-version --mojo-platform-channel-handle=1288 /prefetch:8
    1⤵
      PID:1680

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

            Filesize

            86KB

            MD5

            a40427e3788637e741fb69ea8d76cd52

            SHA1

            f8c8c7ec493e32a7573d90ce400fccd79fc98f31

            SHA256

            18dcc8fae245869d02b7db0edbe22ec57a30bdd51a64090452118a79ba194052

            SHA512

            e6b688d4ad0506c74db323b50a2588472f45e66da2a3456450aea96d93882b13662f8b3bbed7773180f5bec851a31d2e45262ecb9283b425c60c8caa06d56ca2

          • C:\Users\Admin\AppData\Local\Temp\3582-490\e00dd7eb22f4c0edd534efd84e64dd0129826b4175697e925ebb551b5a33421f.exe

            Filesize

            107KB

            MD5

            d63c0a558ae60ae055d8f2aae1d0a494

            SHA1

            51ed78431c44402abcea6913ecf845e1662777ba

            SHA256

            779411d073c1aaefc7df224c9e972fd3ea848944b7fa92412c5cd71da512a729

            SHA512

            c2f421be696ac398d158a9da6fe6586b7bd1f528bc94f7b295d65f12d515584c4d78cb901ae667c925f60182e62815fe8c64b95c6806f95cd2facfd4db52f55b

          • memory/2836-0-0x0000000000400000-0x000000000042B000-memory.dmp

            Filesize

            172KB

          • memory/2836-107-0x0000000000400000-0x000000000042B000-memory.dmp

            Filesize

            172KB

          • memory/2836-108-0x0000000000400000-0x000000000042B000-memory.dmp

            Filesize

            172KB

          • memory/2836-110-0x0000000000400000-0x000000000042B000-memory.dmp

            Filesize

            172KB