Analysis

  • max time kernel
    93s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2024, 18:25

General

  • Target

    043482c55b036dae033f0647fe59ddb86602e9dcda29a43c9ab01855c63beee7.exe

  • Size

    434KB

  • MD5

    f99a3d80fd3b32a134d72717a654c778

  • SHA1

    693374af9eca85b60a7ff0a2dd13ed873c7760b8

  • SHA256

    043482c55b036dae033f0647fe59ddb86602e9dcda29a43c9ab01855c63beee7

  • SHA512

    3f770f58dc47fe8d574e1fce07df8724ff166b8d72198155fd4839816e1ff787367e19db7b94dc95bfed20c589d6f5608f74c5da6eb825cc6f94cd497d5ff864

  • SSDEEP

    6144:PuMLgRig56pUmEPczS5RyC8T4Aw0+wF/xKtZRHnH+4Oj3IJ429Wyf4rqrHB5d8:UigkpUmEBT8T4P0+w9xmggN8

Malware Config

Signatures

  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\043482c55b036dae033f0647fe59ddb86602e9dcda29a43c9ab01855c63beee7.exe
    "C:\Users\Admin\AppData\Local\Temp\043482c55b036dae033f0647fe59ddb86602e9dcda29a43c9ab01855c63beee7.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4856
    • C:\Users\Admin\AppData\Local\Temp\3582-490\043482c55b036dae033f0647fe59ddb86602e9dcda29a43c9ab01855c63beee7.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\043482c55b036dae033f0647fe59ddb86602e9dcda29a43c9ab01855c63beee7.exe"
      2⤵
      • Executes dropped EXE
      PID:4412

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe

          Filesize

          2.4MB

          MD5

          d9e8a1fa55faebd36ed2342fedefbedd

          SHA1

          c25cc7f0035488de9c5df0121a09b5100e1c28e9

          SHA256

          bd7696911d75a9a35dfd125b24cb95003f1e9598592df47fa23a2568986a4a9a

          SHA512

          134644c68bd04536e9ea0a5da6e334d36b1ce8012a061fa6dabd31f85c16a1ac9eee8c40fee3d55f25c4d4edf0672de8ce204e344c800361cbcff092c09d7a33

        • C:\Users\Admin\AppData\Local\Temp\3582-490\043482c55b036dae033f0647fe59ddb86602e9dcda29a43c9ab01855c63beee7.exe

          Filesize

          394KB

          MD5

          369e356561a1f09116289c016ec0d7c3

          SHA1

          1b1670776f50b9f8bc5afb920b969eda0e9cbcf7

          SHA256

          61699859559572474751f99226b2a7f62dc70ebe8c686fc130978445db586d8d

          SHA512

          7dfac8be40714f3f69bb71e9c0da9307eb55eabb49b215936d1737bbdb62db3b09935fb49fe286791724f97e0027b47845e23d30a59df0aed4d92c6cc13d2252

        • memory/4856-94-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/4856-95-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/4856-97-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB