Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2024 18:12

General

  • Target

    Ocean-fX8Z9F6N8.exe

  • Size

    2.4MB

  • MD5

    cf01fd4322bcfd83364fffd15ef29a75

  • SHA1

    b1445db2e6545de3f94aa1f914a6697a0e027579

  • SHA256

    8ad433b21b524ef400200f478cf1f280a77d810ed7d51c47422f3d7c33eaf3cb

  • SHA512

    9cf8cba5f2f29745ab115c9f7ebb23c04686c5dff284e4f6762dc7a79a50c3a3340fb94496865213141e6c59c354134503f65f5eff263a9ad651eaa42277a28e

  • SSDEEP

    24576:dLphtLzNPZlVOEvD9SYtSBzh0DkkaE64RyKMZyCV1E5/VGJnFLOrt1:BtL99OEUtWDkG6MptMnct1

Malware Config

Signatures

  • Detect Neshta payload 5 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ocean-fX8Z9F6N8.exe
    "C:\Users\Admin\AppData\Local\Temp\Ocean-fX8Z9F6N8.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Users\Admin\AppData\Local\Temp\3582-490\Ocean-fX8Z9F6N8.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\Ocean-fX8Z9F6N8.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2088
      • C:\Users\Admin\AppData\Local\Temp\nhdcK\NdK4y.exe
        C:\Users\Admin\AppData\Local\Temp\nhdcK\NdK4y.exe X8Z9F6N8
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Users\Admin\AppData\Local\Temp\3582-490\Ocean-fX8Z9F6N8.exe

    Filesize

    2.3MB

    MD5

    46888c7235910a21a39b13caa72e6113

    SHA1

    73f89ce12e2db6655b08efe4f233a8a05aa94fd7

    SHA256

    ef732471300f0a0d6e0e17f48c20b6e28ae9f5e8fc73b02c1cc3668859b1aed4

    SHA512

    92513026de2ff0cd9eafaaa9d74ae2e8e15f1aa682d1ab5e6d05a357f6b4debb0f146c2f67284ae5eda99ae8ffc6ce99996d944ed155fe4694d6d7d9b4aeaa2a

  • C:\Users\Admin\AppData\Local\Temp\nhdcK\NdK4y.exe

    Filesize

    8.9MB

    MD5

    b237284e07e8c85ff0d57bfbe46bf145

    SHA1

    fc6a88353a9e8bf8098866c6636fa59fdc38596a

    SHA256

    efb6089d9cd5145ce86e9bfa663704f42049598a2cf1795b146cbdc9437c53a8

    SHA512

    34e4cbfff1fa2435bb763852d7e3ff7ce4edcf4df625a39659a62576da4e1bfad3d83d7976aaf1cbb6fbc4ce77b639d9c6752294c45e367577725fc2e7be784d

  • memory/2472-106-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2472-112-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2472-110-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2472-109-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4948-96-0x0000000141026000-0x000000014124C000-memory.dmp

    Filesize

    2.1MB

  • memory/4948-105-0x0000000140000000-0x0000000141B36000-memory.dmp

    Filesize

    27.2MB

  • memory/4948-99-0x0000000140000000-0x0000000141B36000-memory.dmp

    Filesize

    27.2MB

  • memory/4948-107-0x0000000141026000-0x000000014124C000-memory.dmp

    Filesize

    2.1MB

  • memory/4948-108-0x0000000140000000-0x0000000141B36000-memory.dmp

    Filesize

    27.2MB

  • memory/4948-103-0x0000000140000000-0x0000000141B36000-memory.dmp

    Filesize

    27.2MB

  • memory/4948-98-0x00007FFE0D760000-0x00007FFE0D762000-memory.dmp

    Filesize

    8KB

  • memory/4948-97-0x00007FFE0D750000-0x00007FFE0D752000-memory.dmp

    Filesize

    8KB