Analysis

  • max time kernel
    150s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 05:06

General

  • Target

    fc976739158069732ea62a01e04b4a651f95a2805287501fdc54e5dab290f5b8.exe

  • Size

    3.0MB

  • MD5

    6d418f9bb6e0da291228fa29ad199eef

  • SHA1

    2f941d68cd99574ed913b202edb064b4db29cc80

  • SHA256

    fc976739158069732ea62a01e04b4a651f95a2805287501fdc54e5dab290f5b8

  • SHA512

    5cdc8682c9c545f96b8356e72ccd50d9282be4fa4048f297ccdde94c96af86af897e84ddda8ea7be1906e4dd6be7425ce72d6078229fe8d67a9cd128c8c08f7c

  • SSDEEP

    98304:uncpXfAyL32dMh1y5LjkCNjBkN8KA7YvLld99R8:85ftNjPKA+lz8

Malware Config

Signatures

  • Detect Neshta payload 5 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 6 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc976739158069732ea62a01e04b4a651f95a2805287501fdc54e5dab290f5b8.exe
    "C:\Users\Admin\AppData\Local\Temp\fc976739158069732ea62a01e04b4a651f95a2805287501fdc54e5dab290f5b8.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2560
    • \??\c:\users\admin\appdata\local\temp\fc976739158069732ea62a01e04b4a651f95a2805287501fdc54e5dab290f5b8.exe 
      c:\users\admin\appdata\local\temp\fc976739158069732ea62a01e04b4a651f95a2805287501fdc54e5dab290f5b8.exe 
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:1204
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3992
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4848
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4804
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2816
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:3904
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe

    Filesize

    9.4MB

    MD5

    322302633e36360a24252f6291cdfc91

    SHA1

    238ed62353776c646957efefc0174c545c2afa3d

    SHA256

    31da9632f5d25806b77b617d48da52a14afc574bbe1653120f97705284ea566c

    SHA512

    5a1f7c44ce7f5036bffc18ebac39e2bf70e6f35fa252617d665b26448f4c4473adfa115467b7e2d9b7068823e448f74410cdcdfef1ac1c09021e051921787373

  • C:\Users\Admin\AppData\Local\Temp\fc976739158069732ea62a01e04b4a651f95a2805287501fdc54e5dab290f5b8.exe 

    Filesize

    2.9MB

    MD5

    8dd8fc301995cb20e40c509965270d8a

    SHA1

    a27321158d7ac99a50ed6f9fb2697f0f92512f6f

    SHA256

    2f106cf736d68484e0de7f6dfc187a6077c65142443d0f76356c62f113715cb0

    SHA512

    4ce8c811a1f002a2f6b8b30eb2de65930d56cb9abab42eb89938bd836e7a598020fb66a49f08d8f7dc549725e12ff3f3b8dd81220e9ea1624a2ce6a4124a6cd8

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    6245debdbf7af9d776aa72fdcaeaf219

    SHA1

    ee529e6201481b66e97b9c9d6b96b8e9f4580b62

    SHA256

    61d6d144905f1bd04ef2f94b7e063289d1a50cbe15db3d47681d2e6fad364b8e

    SHA512

    e037152dc6dd97e4f02e0c6e26119bc439cc36b51b1db6caa63a81df868c51e4a15d8a614a18d4fc2d93ea401d829650f03d44d50ef2e2925b7c95edd2755986

  • C:\Windows\Resources\Themes\icsys.icn.exe

    Filesize

    135KB

    MD5

    28e5a597cf4579fe283e8c4ebfddaf17

    SHA1

    820cbb4e9c9a940d0002a6d6d1955a50d11f2770

    SHA256

    270a5880459803cc4f302a47e6513acc3bd225e7f06201454772a037c4ececaa

    SHA512

    bb8216c2b8d5b8e038eb4a80d7a5e05203d6e7b7b8fa0d499b765de4f4c7e289988f432f912890c6b02c4779e786c27cbef290655c14f43dfa13933ebd0fd7a4

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    cfcb67ff451acec6af144c07f63c0031

    SHA1

    c501f19f67bfa68528cbb3cabb6f1557b4060b2d

    SHA256

    528015061ebcb6fec2f138e6a5ac9760c8df2e0506b97a92610dbc4fb1329c09

    SHA512

    8ae3673a19fc5bc28e863e59229e21eb8faf88dfca82b0e5db4c646eea61cdb8ed097910170a3e82522be5cbfc092c04a012a2077d9388cfb784d7e15061565b

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    aaf72342a3bf447f83611af499731bc6

    SHA1

    6212a89e7d52d462465361782ed670178ca78fd9

    SHA256

    468583a2b580fc6a42ed112a0db535b402c4ec07db06a1c523dd9612c7a31309

    SHA512

    8daf0479ceee1a2d1a529249a54532c316fd846d76ec455aef4a2c045f4ff91df5f9afa4c2f824522ce78b80a2265334f32b7585843c6daad8b1d7ee36164404

  • memory/1204-135-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1204-134-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1204-137-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2560-49-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2560-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2816-139-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3904-46-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3992-48-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4804-47-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4848-138-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB