Analysis

  • max time kernel
    111s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/10/2024, 11:21

General

  • Target

    beb27eccbd6e9b8db6533b6ba944a137e5cde74880d90b34e932552c45cb224eN.exe

  • Size

    1.2MB

  • MD5

    b2f55eca44253a76de0172fd3e4f6cb0

  • SHA1

    40a31939bd75bbe7064d04e77a62aae082f881cc

  • SHA256

    beb27eccbd6e9b8db6533b6ba944a137e5cde74880d90b34e932552c45cb224e

  • SHA512

    fbcdefbe4f2c1a75814e1d06e6afb09488bb1467765122379df5ca053ec3e0f6e44023931547faaa2927a458dffdc2ab06f1c04e5375ad65b24e6508c3ef34d2

  • SSDEEP

    24576:ioe9YJLnbCQM0rbOwG8ihLXciDZZls8H9xCcjUtFTgbP+9:x3b5FrbOTLXci9Zj9fUtFTD

Malware Config

Signatures

  • Detect Neshta payload 5 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\beb27eccbd6e9b8db6533b6ba944a137e5cde74880d90b34e932552c45cb224eN.exe
    "C:\Users\Admin\AppData\Local\Temp\beb27eccbd6e9b8db6533b6ba944a137e5cde74880d90b34e932552c45cb224eN.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Users\Admin\AppData\Local\Temp\3582-490\beb27eccbd6e9b8db6533b6ba944a137e5cde74880d90b34e932552c45cb224eN.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\beb27eccbd6e9b8db6533b6ba944a137e5cde74880d90b34e932552c45cb224eN.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4256
      • C:\Users\Admin\AppData\Local\Temp\d66548b6-286a-4591-9d9d-6655bf9539b3\SupportAssistInstaller.exe
        "C:\Users\Admin\AppData\Local\Temp\d66548b6-286a-4591-9d9d-6655bf9539b3\SupportAssistInstaller.exe" "esupport"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:4680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Users\Admin\AppData\Local\Temp\3582-490\beb27eccbd6e9b8db6533b6ba944a137e5cde74880d90b34e932552c45cb224eN.exe

    Filesize

    1.2MB

    MD5

    84b087e870e3d3c6a2527df7cb09e17c

    SHA1

    cd960da3740cda1799cb072e1b90079415e46799

    SHA256

    acde4f1c50f0ff2d01c333dda68d894cc95d3e7526633b0f49456f587d0b1d17

    SHA512

    45bb754b4c788b7590c1e9086f0bc7adedb33f5daf411a88830f34688d47c28459ea174e81b8564016333aaff8214a90af6d5506896638a021031d9491e0e446

  • C:\Users\Admin\AppData\Local\Temp\d66548b6-286a-4591-9d9d-6655bf9539b3\Dell.SupportAssist.Client.FrameworkLogger.dll

    Filesize

    18KB

    MD5

    8fb21349b0fb5e5d7de8b921e25e10d0

    SHA1

    bee87220da3d9513de14e7d303120ccc09de8505

    SHA256

    b9fe3a919470f29464d4537e8a569bc9561b956a7b82976b23ffb9b4e22db13a

    SHA512

    58a1728350c10ea68d9849a2746ee6c2ec2e9beb959f090aa1ff222a24cb8c5cb7d1ad80aaede11b695c7fd866606e83d3fe2dfa50a13b06f5c05384f80a941b

  • C:\Users\Admin\AppData\Local\Temp\d66548b6-286a-4591-9d9d-6655bf9539b3\Microsoft.Practices.Unity.dll

    Filesize

    143KB

    MD5

    27f24aed31d72c0a3214e54e4137fcf6

    SHA1

    93dab8c3392ab7eeb0062fc4224d57dde75b6794

    SHA256

    8355fd8ff475f1d032bc6667f185e25377e35644b5ffd2fe12c8e83705a03957

    SHA512

    16215965e7b317de67beae9c94a7187ff32b47e7a7ff1e38c2947769d53961defc9f8741d7e7e37ce74264c60e5c35df71065e36069776ffb3c71d3a064786c6

  • C:\Users\Admin\AppData\Local\Temp\d66548b6-286a-4591-9d9d-6655bf9539b3\Newtonsoft.Json.dll

    Filesize

    688KB

    MD5

    0428dddbd43486d805f6f72d6539dafb

    SHA1

    43502e57b6c1542d452562a013a4a0952937e1ad

    SHA256

    ef80e07b7819d8a82bbb8efc4109618b51c7df5e3463cf04e3b332cfc3c01efc

    SHA512

    9b67272ae8739b25f0ec5d0572a834c5edab7a9ecc27b47de9a5998849a8c4712c61a841ec94e49dfe4cf98f73690ea6e9020e1c247af105d746c9147f79f879

  • C:\Users\Admin\AppData\Local\Temp\d66548b6-286a-4591-9d9d-6655bf9539b3\Resource\SA4_Installer_BG_900x600.jpg

    Filesize

    113KB

    MD5

    305fd53cde696bc7603f21955dbe75f4

    SHA1

    f1400ac28e32270e4d981e4c4cf37ec47506f6b3

    SHA256

    8bd98eaa8f939d1c8e69d219982573bf8fdb9c62c25c71b7cf385ff41fc5b276

    SHA512

    b0032a438d29153e7e5f95409c0df36dd9a884961e7b41de42303ee5f577d009129f03dfc2bd1debf5ceffd7eb2499c45381faabc1109fbc442001cd8a1d0d50

  • C:\Users\Admin\AppData\Local\Temp\d66548b6-286a-4591-9d9d-6655bf9539b3\Resource\en-US\Installer.json

    Filesize

    6KB

    MD5

    607d5d437d88863e793eb4f659a37981

    SHA1

    c7b2f6ab7c52a2c0e4a8c776f27af21e8a4f539a

    SHA256

    3d509e191b06487e56638d1dfc4ea5f540a833c695219ccd241e70fa0751baee

    SHA512

    d18c5f4934d9fc07f646ea25f02019224c600b63ea5170d234fd78a9e8805e37ba82a543111a3fa7d6c266c6669063620af93437757040a02cbf42f71ad87647

  • C:\Users\Admin\AppData\Local\Temp\d66548b6-286a-4591-9d9d-6655bf9539b3\Resource\roboto-light.ttf

    Filesize

    123KB

    MD5

    46e48ce0628835f68a7369d0254e4283

    SHA1

    e321c183e2b75ee19813892b7bac8d7c411cb88a

    SHA256

    ee4352049603e5960550f55444ad720d8d4ce322c0dcba1afc77de78c430d0d5

    SHA512

    8ad21d9c1c0496de9d47a5f353e437de399e24e9f780ec9beef1963cb9ca4c657748eee2493d91d57f1be1393411303db7f21e4543696c9843ff0e570d2882d2

  • C:\Users\Admin\AppData\Local\Temp\d66548b6-286a-4591-9d9d-6655bf9539b3\Resource\roboto-medium.ttf

    Filesize

    124KB

    MD5

    894a2ede85a483bf9bedefd4db45cdb9

    SHA1

    6060ca726b9760b76f7c347dce9d2fa1fe42ec92

    SHA256

    6e2ec5c5f89e4ce302bb93b46cb7cc336236501de17348e284878914c5e0e723

    SHA512

    cecce690b1066f3424ba3684cd4f7993746551d3642fda4f044090fe285ec2a73bfecde27f0df79824b99c42aa6b033a890b5174215748716d8ac4741a5d6a72

  • C:\Users\Admin\AppData\Local\Temp\d66548b6-286a-4591-9d9d-6655bf9539b3\Resource\roboto-regular.ttf

    Filesize

    123KB

    MD5

    df7b648ce5356ea1ebce435b3459fd60

    SHA1

    824b5480c977a8166e177e5357d13164ccc45f47

    SHA256

    bde8a188e37aa936b167aecc5e5a3da40262f6e51fd54c584f2cf2b6b99d96ca

    SHA512

    d78cb378c0b5939fcba01c272616010e28c7878ef63944fc9bf48f2f0abec6f9c72c4f56ed9785194626fa6979ae3f4d7b43e924ef84686e6ff2b8058e5580a2

  • C:\Users\Admin\AppData\Local\Temp\d66548b6-286a-4591-9d9d-6655bf9539b3\Resource\roboto-thin.ttf

    Filesize

    124KB

    MD5

    94998475f6aea65f558494802416c1cf

    SHA1

    173ed64528b4d010a76d8d38deb1d7e7eed58eda

    SHA256

    db1d464343bf795307bc90da83d65b93c841fb20f38662f92f1e5e2c5a1d2ec5

    SHA512

    51cba34e46887078ee3101bfe6f652451d67a73c2a6c0b05bf353e1cc358b36ba99f09a0ffdbb59bea491590e935ba2b0a65798e9b67e6a3a3b8491bc0463ffa

  • C:\Users\Admin\AppData\Local\Temp\d66548b6-286a-4591-9d9d-6655bf9539b3\Resource\spinner_blue.png

    Filesize

    1KB

    MD5

    0d264f346bcc8a340a413d5234285786

    SHA1

    95b8c10c89e07b0a41e189f9016b48dd60fd6f17

    SHA256

    41d3b9695455de5c7e58894ae854ce34e72b1d808a3c02ebb2fefe97e9533281

    SHA512

    16770c22b8205c00e75a4bd284580389d9cfb7486669a68e7a76c5eef3413b00d66685104113aac9e960c83db44d57f43bc292f141a22d9d6528acdf53e1ada8

  • C:\Users\Admin\AppData\Local\Temp\d66548b6-286a-4591-9d9d-6655bf9539b3\Styles\DellStyles.xaml

    Filesize

    2KB

    MD5

    e0e508eaa2aff8fc6790d34a404c58bd

    SHA1

    e21ffc5aafd34f51cb7e6328a8eb7591f381a968

    SHA256

    9f96fb69b50c735eb4d1c0dff55a804f69ea7212ba9dc0332ac10c42a0b7b2db

    SHA512

    ab9e91f6aef37e0f84e31d095d607d5bac18109fae8807966a7be9834c00de44e5896d47ae6cb687a4fa616160a2da7af386b492d5aa9bf60a61e64c5677168b

  • C:\Users\Admin\AppData\Local\Temp\d66548b6-286a-4591-9d9d-6655bf9539b3\SupportAssistInstaller.exe

    Filesize

    943KB

    MD5

    797402be3e790bb35dea470ef063b66f

    SHA1

    676e9b40372de05b176e6306e5929218ad6800bf

    SHA256

    68b204dde251c0331a1f1554d9e7b9c50390deeb0afd0ae37ec23e8cd658a2d3

    SHA512

    cd51f5150a40c8ba61d52f932591a80f897fdb30bc504c25517139055949b71a2ea1b26bdb95a6dc37914490b38c1459c61a1999fc6198db69fe2368a22c7209

  • C:\Users\Admin\AppData\Local\Temp\d66548b6-286a-4591-9d9d-6655bf9539b3\SupportAssistInstaller.exe.config

    Filesize

    538B

    MD5

    e97ac84664026547fb344425a89c0edd

    SHA1

    6fd4dc83604a75e8c8057fb3008d044da91e16e1

    SHA256

    e93f8fbaece629c2d4621e7ca82ec57d1f05a746a06f45f8b41a43413885e518

    SHA512

    465a0ff55c6911cd6dcd1fc20b9d80ae45213994ddcc61b5dfbf0f84ec1994b87618d430952b41e7a242af44682cb38fb490d9a3a4f5fa23f4725e0daf410038

  • C:\Users\Admin\AppData\Local\Temp\d66548b6-286a-4591-9d9d-6655bf9539b3\log4net.config

    Filesize

    813B

    MD5

    f6f8cd68eabfb8b7131d0d4de878272f

    SHA1

    ddc0655264cfee990bcd96b834bcf6b0e76de7f9

    SHA256

    087197e3b5820d8b79cad05db5331ecc114e701f273571e2b833e01472897ea5

    SHA512

    617b6227542b25e0c53cf36897018e524895676d07ddbf95550c18091aaa1af23aedf2fb969b2c752364867d03252c624a537ffa23523e5bd10850e81b426e85

  • C:\Users\Admin\AppData\Local\Temp\d66548b6-286a-4591-9d9d-6655bf9539b3\log4net.dll

    Filesize

    274KB

    MD5

    8cc649cf5d9c869294f03297a131ed86

    SHA1

    5f1891ea1dea67e854991c6ab0a720b158ec42df

    SHA256

    8e5122fc22ad819e37591d2302ffc1d840483ad9a2bf9e342301f75c3baab2c7

    SHA512

    d39aa488f7560385e5617ff9c4ea1693c5672e4b6d82371051a2f3eb289287be29d34a3d2e1ea3362961f3d675082596a77405685e0eae3b746fcee58e884dc6

  • memory/216-272-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/216-265-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/216-270-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/216-274-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4256-263-0x000000007392E000-0x000000007392F000-memory.dmp

    Filesize

    4KB

  • memory/4256-264-0x0000000073920000-0x00000000740D0000-memory.dmp

    Filesize

    7.7MB

  • memory/4256-118-0x0000000073920000-0x00000000740D0000-memory.dmp

    Filesize

    7.7MB

  • memory/4256-17-0x0000000004C90000-0x0000000004CA2000-memory.dmp

    Filesize

    72KB

  • memory/4256-14-0x0000000004C60000-0x0000000004C6A000-memory.dmp

    Filesize

    40KB

  • memory/4256-13-0x0000000000240000-0x0000000000370000-memory.dmp

    Filesize

    1.2MB

  • memory/4256-12-0x000000007392E000-0x000000007392F000-memory.dmp

    Filesize

    4KB

  • memory/4680-193-0x0000021EF8B30000-0x0000021EF8B38000-memory.dmp

    Filesize

    32KB

  • memory/4680-257-0x0000021EFB8D0000-0x0000021EFB908000-memory.dmp

    Filesize

    224KB

  • memory/4680-183-0x0000021EF8B00000-0x0000021EF8B08000-memory.dmp

    Filesize

    32KB

  • memory/4680-216-0x0000021EF8B70000-0x0000021EF8B78000-memory.dmp

    Filesize

    32KB

  • memory/4680-184-0x0000021EF8B10000-0x0000021EF8B18000-memory.dmp

    Filesize

    32KB

  • memory/4680-188-0x0000021EF8930000-0x0000021EF8938000-memory.dmp

    Filesize

    32KB

  • memory/4680-219-0x0000021EF8E40000-0x0000021EF8EF0000-memory.dmp

    Filesize

    704KB

  • memory/4680-226-0x0000021EF8DE0000-0x0000021EF8E02000-memory.dmp

    Filesize

    136KB

  • memory/4680-249-0x0000021EF90B0000-0x0000021EF916A000-memory.dmp

    Filesize

    744KB

  • memory/4680-180-0x0000021EF8910000-0x0000021EF8918000-memory.dmp

    Filesize

    32KB

  • memory/4680-182-0x0000021EF8950000-0x0000021EF8958000-memory.dmp

    Filesize

    32KB

  • memory/4680-181-0x0000021EF8940000-0x0000021EF8948000-memory.dmp

    Filesize

    32KB

  • memory/4680-179-0x0000021EF8920000-0x0000021EF8928000-memory.dmp

    Filesize

    32KB

  • memory/4680-134-0x00007FFC5A0F0000-0x00007FFC5ABB1000-memory.dmp

    Filesize

    10.8MB

  • memory/4680-256-0x0000021EF9040000-0x0000021EF9048000-memory.dmp

    Filesize

    32KB

  • memory/4680-195-0x0000021EF8B20000-0x0000021EF8B28000-memory.dmp

    Filesize

    32KB

  • memory/4680-131-0x00007FFC5A0F0000-0x00007FFC5ABB1000-memory.dmp

    Filesize

    10.8MB

  • memory/4680-258-0x0000021EF9090000-0x0000021EF909E000-memory.dmp

    Filesize

    56KB

  • memory/4680-261-0x0000021EFD0C0000-0x0000021EFD282000-memory.dmp

    Filesize

    1.8MB

  • memory/4680-127-0x0000021EF65D0000-0x0000021EF65DA000-memory.dmp

    Filesize

    40KB

  • memory/4680-129-0x0000021EF65E0000-0x0000021EF65E8000-memory.dmp

    Filesize

    32KB

  • memory/4680-132-0x0000021EF6680000-0x0000021EF66C6000-memory.dmp

    Filesize

    280KB

  • memory/4680-266-0x00007FFC5A0F3000-0x00007FFC5A0F5000-memory.dmp

    Filesize

    8KB

  • memory/4680-267-0x00007FFC5A0F0000-0x00007FFC5ABB1000-memory.dmp

    Filesize

    10.8MB

  • memory/4680-268-0x0000021EF8650000-0x0000021EF879E000-memory.dmp

    Filesize

    1.3MB

  • memory/4680-269-0x00007FFC5A0F0000-0x00007FFC5ABB1000-memory.dmp

    Filesize

    10.8MB

  • memory/4680-126-0x0000021EF6600000-0x0000021EF6628000-memory.dmp

    Filesize

    160KB

  • memory/4680-124-0x0000021EF6030000-0x0000021EF6120000-memory.dmp

    Filesize

    960KB

  • memory/4680-123-0x00007FFC5A0F3000-0x00007FFC5A0F5000-memory.dmp

    Filesize

    8KB