Analysis

  • max time kernel
    91s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2024 22:39

General

  • Target

    4740dd4bf9540384d6c683ad082ab8eed9bf94846e57135bb7261c23c0e3c9ebN.exe

  • Size

    2.9MB

  • MD5

    5bf6ef6ef0aacf53e2fd7d1e4ba4b800

  • SHA1

    265706fad722d650ad668753bfbb28fc66201266

  • SHA256

    4740dd4bf9540384d6c683ad082ab8eed9bf94846e57135bb7261c23c0e3c9eb

  • SHA512

    86b03c2eca50ad035fe5f4d26881faaac28bb1b96f104ca91fd429390d7c016b6561a6bbafb37514abbc2e33f64bb00f4959b45be102b10bf3f0e7c34c83f218

  • SSDEEP

    49152:F/Qdykp2boz074d6DAuPBN8+9oDF3fP+UHHgDwxy4Ifz101mH:9webOuAkBN8+CF3fP+sADw84yzH

Malware Config

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4740dd4bf9540384d6c683ad082ab8eed9bf94846e57135bb7261c23c0e3c9ebN.exe
    "C:\Users\Admin\AppData\Local\Temp\4740dd4bf9540384d6c683ad082ab8eed9bf94846e57135bb7261c23c0e3c9ebN.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3656
    • C:\Users\Admin\AppData\Local\Temp\3582-490\4740dd4bf9540384d6c683ad082ab8eed9bf94846e57135bb7261c23c0e3c9ebN.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\4740dd4bf9540384d6c683ad082ab8eed9bf94846e57135bb7261c23c0e3c9ebN.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\Users\Admin\AppData\Local\Temp\irsetup.exe
        C:\Users\Admin\AppData\Local\Temp\irsetup.dat
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\DRBIT50\NPKIShare\DBTuning.vshost.exe

    Filesize

    11KB

    MD5

    bad0cce707e631722671eb8fd9376e7d

    SHA1

    265082cc473b84f666b8a9a9b1f747f68cb6a1d4

    SHA256

    a36878ce723af818246c98ad08e38b83686c7e9267f244d47073ae98fbc57276

    SHA512

    84a284e51d60384122a5860a07c166e1dbbd3df5539e7939f02ba15bd048c5a53681470843a7c5fe12b4a9c0d73279b2a1ce8e1be0a62f34334fc3401d468a26

  • C:\DRBIT50\NPKIShare\DBTuning.vshost.exe.manifest

    Filesize

    490B

    MD5

    a19a2658ba69030c6ac9d11fd7d7e3c1

    SHA1

    879dcf690e5bf1941b27cf13c8bcf72f8356c650

    SHA256

    c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f

    SHA512

    fa583ba012a80d44e599285eb6a013baf41ffbe72ee8561fc89af0ec5543003ba4165bfe7b1ba79252a1b3b6e5626bf52dc712eacd107c0b093a5a2757284d73

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Program Files (x86)\ÀÎÁõ¼­ º¹»ç\irunin.ini

    Filesize

    2KB

    MD5

    bc3c91b68736488b73be34471fe0c269

    SHA1

    927586efa0c0128893b168347d6122eaf228d4b1

    SHA256

    ec9a282eba7029943427ace4480090d5d57b6f5b10c51c79c445630bf5aef957

    SHA512

    a081235ba675e51a4034a7c446819349e84af76c37bac99b64d7d00a9f326edb9ef9fd7e1dab175169f30dd24446600a63398307f5ff68b62b75029787bbcb92

  • C:\Users\Admin\AppData\Local\Temp\3582-490\4740dd4bf9540384d6c683ad082ab8eed9bf94846e57135bb7261c23c0e3c9ebN.exe

    Filesize

    2.9MB

    MD5

    a9addc318f993e6caa58ed2fb75c0781

    SHA1

    1a4772168b943fa7581024287cc8e5f827a0b5fb

    SHA256

    4b8b6bff91d2d2808a3658d2a5af568186705c6b6d46140812e1540c236226b6

    SHA512

    261c8f0dac5551c78eac7a4331cfa67e6aa527fe4fa26926bfe9446d48b0fb8234ff3b850c018cc6962861d9948600a31aa20e946856025dfbbb1999c82ec27f

  • C:\Users\Admin\AppData\Local\Temp\irsetup.dat

    Filesize

    8KB

    MD5

    4f8c559df29ff69b17fb1045975640e2

    SHA1

    b9d56635f7e17a334862b31d75adbd717c55a9b7

    SHA256

    39c0b94210b9fc873cc464dcc6742928b2e86a9a35cb7f1c26806250f26e5b1c

    SHA512

    1bbfea35b2f92b237b55cbdba2c4e4cd4774f5747ab3f07f68543ae1f877eb967c1c03ac648c96dcfa9bb2c7a3cb7490977246b5d340e5522ab4329058f35004

  • C:\Users\Admin\AppData\Local\Temp\irsetup.exe

    Filesize

    380KB

    MD5

    6ed2665cc67db8f54aef0e885baf5cb7

    SHA1

    47d60c9aeb2f0d2dc25b17ed97b5e33c3e1d9f86

    SHA256

    d838ea3895116563b069d7c23b2168d6ee73f1e947418ff8c835d3f69ba2273c

    SHA512

    802db841c0f37cccedf62e4380f10cd77e1b8279f8c5436c1d3352f77c878267c0901a0b313ab7ecbe85ab09e216f98ca4bf67fba40e1144b19c8c75a4454cce

  • C:\Users\Admin\AppData\Local\Temp\irsetup.ini

    Filesize

    147B

    MD5

    9f5b0cdbaf47cc4aa293d21f2aab862c

    SHA1

    aaf923714d8878d390dd453b54132290869cfa3c

    SHA256

    c9ed72d95f70083544d9314b855f98546ec91dd35fe2124c7ce092c14a53c5dd

    SHA512

    ca34df46839bcc33f2a612b5701782fb51503b9abbfbc86f0c79889eb1bd85bb433ab6116147f9f4809c79bdaae1caf33153870de7ff08058c3b7a032894ff8e

  • C:\Users\Admin\AppData\Local\Temp\irsetup.uni

    Filesize

    280KB

    MD5

    28942baedcc3d3cc4f1beb7ec7d34c2b

    SHA1

    5d5d478bee6754e90aab57df98323eea1a2691ce

    SHA256

    34c7002e6dc8ecabb5aa37dd6baae7cd58efdb7ecd442266cceb5249e8c8de90

    SHA512

    5754dba5ac7eff59622efffee9799faf078504d8258fd2e6f12b295c715eb0e4a8d77981c958dd6453a26a1968ec9c2ac2496eeee369991a022f7dd8b446a454

  • C:\Users\Admin\AppData\Local\Temp\suf5lng.0

    Filesize

    8KB

    MD5

    f3fa2d7e4c362a2a17fa0a27bb6e38e0

    SHA1

    62b4632747a2258950acdfff0b94418568744852

    SHA256

    b6f5d2fe874153e7699e01dde9e097cc8e71da0fef400be256ba8569e36af75d

    SHA512

    fdfa7b5156ee962e7815e5489ab16dea1485978e287aa52ca82b1c96310cc4ea65903ac296922b0bbcabdbe927bea0c0a89f82576f614eaca3a5fd05aa8e76c0

  • memory/3656-284-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3656-285-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3656-287-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB