Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    92s
  • max time network
    195s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    03/07/2024, 23:01

General

  • Target

    Dropped Malware/PO2024-0961.exe

  • Size

    1.2MB

  • MD5

    72f3a4a4cc00e2b6f64e0a204678de73

  • SHA1

    9abfc40bb6c14ab8414a2a5990b7efbb90073b22

  • SHA256

    c10e5f7f008da5ed2a5b08326d57e7d6b052644df78facc7bbdca7b0ed366254

  • SHA512

    a0d33db745e247c63c2315c55c004b5e25e86b45ad454adc2c4121dbac44dc3418cec4ebf790c039b71f00668881dd66b83a87448eab3b83e06ea7ffe8b4c111

  • SSDEEP

    24576:RAHnh+eWsN3skA4RV1Hom2KXMmHaehqzGtIK+5i5DrgNV7N5:oh+ZkldoPK8YaehFyx5IDrU

Malware Config

Signatures

  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dropped Malware\PO2024-0961.exe
    "C:\Users\Admin\AppData\Local\Temp\Dropped Malware\PO2024-0961.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Users\Admin\AppData\Local\directory\name.exe
      "C:\Users\Admin\AppData\Local\Temp\Dropped Malware\PO2024-0961.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4952
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\Dropped Malware\PO2024-0961.exe"
        3⤵
        • Modifies system executable filetype association
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        PID:3280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe

    Filesize

    2.4MB

    MD5

    068437f75db0bbe5b9bd904c235567cf

    SHA1

    737022c314ae03c6271b8016e6ae2a862f9889cb

    SHA256

    3aa1a61a302e515d539de99085f33bd2a6e0ad930cda32c9f7295d128e3ef188

    SHA512

    7e5849afc897f5c3af1aba02497f772194252271e4dc490b6ff4b1c22445c1de94384b75a58fb3696d67f1a1d34efdd5c5029818d12cfba20bc3193052cef433

  • C:\Users\Admin\AppData\Local\Temp\3582-490\svchost.exe

    Filesize

    40KB

    MD5

    c7f1504af8fd9f7a7f90b218b70a7414

    SHA1

    9035e529791803893e4ecc6bd793f10e68efda94

    SHA256

    e4fc1ec57bd47a3c0b2eccaecba1466a8db6aae44e4591e88a32ca490125a284

    SHA512

    f3683e388259f07c5d080c66d6999a633fcdfec6a47f88468c4db97245831c7efdcb8ffccf3ed2b7bb27b8e4553513224664164bc3c4fb2a7988a4e890cc113a

  • C:\Users\Admin\AppData\Local\Temp\aut516C.tmp

    Filesize

    305KB

    MD5

    8117b7a3352d58da49950a96ac91d2b1

    SHA1

    058564f4c2571c8fbbe871e139568639629ee879

    SHA256

    d11482830ab5b3f5a050ecd72d914c1f085cc05993025a6cbba1bfacc9155b8b

    SHA512

    a46ed5db3244c14d449be2a06a089f5632e2a0ec40785d2987878bb98deac5211de8af50ff05bc9f1cc7ad68d5471d7d34e758fd6f524b8807ca628db3cab2fb

  • C:\Users\Admin\AppData\Local\directory\name.exe

    Filesize

    1.2MB

    MD5

    72f3a4a4cc00e2b6f64e0a204678de73

    SHA1

    9abfc40bb6c14ab8414a2a5990b7efbb90073b22

    SHA256

    c10e5f7f008da5ed2a5b08326d57e7d6b052644df78facc7bbdca7b0ed366254

    SHA512

    a0d33db745e247c63c2315c55c004b5e25e86b45ad454adc2c4121dbac44dc3418cec4ebf790c039b71f00668881dd66b83a87448eab3b83e06ea7ffe8b4c111

  • memory/2064-12-0x0000000003BF0000-0x0000000003BF4000-memory.dmp

    Filesize

    16KB

  • memory/3280-36-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3280-34-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3280-33-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3280-32-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3280-156-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB