Analysis

  • max time kernel
    102s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 18:12

General

  • Target

    Ocean-fX8Z9F6N8.exe

  • Size

    2.4MB

  • MD5

    cf01fd4322bcfd83364fffd15ef29a75

  • SHA1

    b1445db2e6545de3f94aa1f914a6697a0e027579

  • SHA256

    8ad433b21b524ef400200f478cf1f280a77d810ed7d51c47422f3d7c33eaf3cb

  • SHA512

    9cf8cba5f2f29745ab115c9f7ebb23c04686c5dff284e4f6762dc7a79a50c3a3340fb94496865213141e6c59c354134503f65f5eff263a9ad651eaa42277a28e

  • SSDEEP

    24576:dLphtLzNPZlVOEvD9SYtSBzh0DkkaE64RyKMZyCV1E5/VGJnFLOrt1:BtL99OEUtWDkG6MptMnct1

Malware Config

Signatures

  • Detect Neshta payload 7 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ocean-fX8Z9F6N8.exe
    "C:\Users\Admin\AppData\Local\Temp\Ocean-fX8Z9F6N8.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Users\Admin\AppData\Local\Temp\3582-490\Ocean-fX8Z9F6N8.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\Ocean-fX8Z9F6N8.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Users\Admin\AppData\Local\Temp\mpr6ev73aloEAR\0ZhZs.exe
        C:\Users\Admin\AppData\Local\Temp\mpr6ev73aloEAR\0ZhZs.exe X8Z9F6N8
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe

    Filesize

    547KB

    MD5

    cf6c595d3e5e9667667af096762fd9c4

    SHA1

    9bb44da8d7f6457099cb56e4f7d1026963dce7ce

    SHA256

    593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d

    SHA512

    ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80

  • C:\Users\Admin\AppData\Local\Temp\3582-490\Ocean-fX8Z9F6N8.exe

    Filesize

    2.3MB

    MD5

    46888c7235910a21a39b13caa72e6113

    SHA1

    73f89ce12e2db6655b08efe4f233a8a05aa94fd7

    SHA256

    ef732471300f0a0d6e0e17f48c20b6e28ae9f5e8fc73b02c1cc3668859b1aed4

    SHA512

    92513026de2ff0cd9eafaaa9d74ae2e8e15f1aa682d1ab5e6d05a357f6b4debb0f146c2f67284ae5eda99ae8ffc6ce99996d944ed155fe4694d6d7d9b4aeaa2a

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\mpr6ev73aloEAR\0ZhZs.exe

    Filesize

    8.9MB

    MD5

    b237284e07e8c85ff0d57bfbe46bf145

    SHA1

    fc6a88353a9e8bf8098866c6636fa59fdc38596a

    SHA256

    efb6089d9cd5145ce86e9bfa663704f42049598a2cf1795b146cbdc9437c53a8

    SHA512

    34e4cbfff1fa2435bb763852d7e3ff7ce4edcf4df625a39659a62576da4e1bfad3d83d7976aaf1cbb6fbc4ce77b639d9c6752294c45e367577725fc2e7be784d

  • memory/2212-111-0x0000000140000000-0x0000000141B36000-memory.dmp

    Filesize

    27.2MB

  • memory/2212-105-0x0000000076F10000-0x0000000076F12000-memory.dmp

    Filesize

    8KB

  • memory/2212-103-0x0000000076F10000-0x0000000076F12000-memory.dmp

    Filesize

    8KB

  • memory/2212-101-0x0000000076F10000-0x0000000076F12000-memory.dmp

    Filesize

    8KB

  • memory/2212-108-0x0000000076F20000-0x0000000076F22000-memory.dmp

    Filesize

    8KB

  • memory/2212-106-0x0000000076F20000-0x0000000076F22000-memory.dmp

    Filesize

    8KB

  • memory/2212-110-0x0000000076F20000-0x0000000076F22000-memory.dmp

    Filesize

    8KB

  • memory/2476-100-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2476-116-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2476-117-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2476-118-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2476-119-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2476-121-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB