General
-
Target
Steam.sfx.exe
-
Size
1.5MB
-
Sample
240716-jf93jathqb
-
MD5
12eb750a2a4ff29b596d97592b219757
-
SHA1
40aedee5578686295805f9f23363551b8da73ba2
-
SHA256
ce62a35f91e421ff693bde07a223cd079359f1e7f2d942aca0884dda287d3bf3
-
SHA512
fdc38207c2715d6a7ce817a0d1929b6f2432a79fb739b16968372fe679c7a4b95fafcfbf6341b1bd0fdfec3256b582ba889c9ffd37d425872005e242766df7ae
-
SSDEEP
24576:KEeqQq3KZUyJ183CcshguRr5BnzgGa22P+jasRZDQt:KEuq6/1gshguRr5x9jlRZDQt
Behavioral task
behavioral1
Sample
Steam.sfx.exe
Resource
win10-20240404-en
Malware Config
Extracted
xworm
127.0.0.1:14365
21.ip.gl.ply.gg:14365
-
Install_directory
%Userprofile%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7361674811:AAFROegouCfkAWXkfmawgLBPRXpvTed2cWQ/sendMessage?chat_id=2091751136
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Targets
-
-
Target
Steam.sfx.exe
-
Size
1.5MB
-
MD5
12eb750a2a4ff29b596d97592b219757
-
SHA1
40aedee5578686295805f9f23363551b8da73ba2
-
SHA256
ce62a35f91e421ff693bde07a223cd079359f1e7f2d942aca0884dda287d3bf3
-
SHA512
fdc38207c2715d6a7ce817a0d1929b6f2432a79fb739b16968372fe679c7a4b95fafcfbf6341b1bd0fdfec3256b582ba889c9ffd37d425872005e242766df7ae
-
SSDEEP
24576:KEeqQq3KZUyJ183CcshguRr5BnzgGa22P+jasRZDQt:KEuq6/1gshguRr5x9jlRZDQt
-
Detect Neshta payload
-
Detect Xworm Payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Modifies system executable filetype association
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1