Analysis

  • max time kernel
    49s
  • max time network
    57s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2024, 04:32

General

  • Target

    c4ee733ac90ec7d722e7129ca0a01d9c1e2cbe55acba8eb307135f43b6ee54bc.exe

  • Size

    353KB

  • MD5

    6a4044fe64cd5192415bbb369807ab62

  • SHA1

    134b2c940584d621c8bf89c1f992d0fccd099d05

  • SHA256

    c4ee733ac90ec7d722e7129ca0a01d9c1e2cbe55acba8eb307135f43b6ee54bc

  • SHA512

    7ccb3a1fe55b5a06446788050f945d2ed444dfb047160d91442388e21b6826077289cc99fcc799c0498cf55269ff85687ac0334aaae60d01aac1bdc26e84bd9f

  • SSDEEP

    6144:k9/A7XMEF2w8DMdzYMQNjEHXux0yKuhXSUfdNDfGVKeVd5lJXR+TdqST6R:2A71FT8DgYTjay/tSUfmpNXRAkOs

Malware Config

Signatures

  • Detect Neshta payload 23 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4ee733ac90ec7d722e7129ca0a01d9c1e2cbe55acba8eb307135f43b6ee54bc.exe
    "C:\Users\Admin\AppData\Local\Temp\c4ee733ac90ec7d722e7129ca0a01d9c1e2cbe55acba8eb307135f43b6ee54bc.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Users\Admin\AppData\Local\Temp\3582-490\c4ee733ac90ec7d722e7129ca0a01d9c1e2cbe55acba8eb307135f43b6ee54bc.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\c4ee733ac90ec7d722e7129ca0a01d9c1e2cbe55acba8eb307135f43b6ee54bc.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2512
      • C:\Windows\svchost.com
        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\202308~1.EXE"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2860
        • C:\Users\Admin\AppData\Local\Temp\202308~1.EXE
          C:\Users\Admin\AppData\Local\Temp\202308~1.EXE
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE

    Filesize

    859KB

    MD5

    02ee6a3424782531461fb2f10713d3c1

    SHA1

    b581a2c365d93ebb629e8363fd9f69afc673123f

    SHA256

    ead58c483cb20bcd57464f8a4929079539d634f469b213054bf737d227c026dc

    SHA512

    6c9272cb1b6bde3ee887e1463ab30ea76568cb1a285d11393337b78c4ad1c3b7e6ce47646a92ab6d70bff4b02ab9d699b84af9437b720e52dcd35579fe2693ec

  • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe

    Filesize

    547KB

    MD5

    cf6c595d3e5e9667667af096762fd9c4

    SHA1

    9bb44da8d7f6457099cb56e4f7d1026963dce7ce

    SHA256

    593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d

    SHA512

    ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80

  • C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe

    Filesize

    186KB

    MD5

    58b58875a50a0d8b5e7be7d6ac685164

    SHA1

    1e0b89c1b2585c76e758e9141b846ed4477b0662

    SHA256

    2a0aa0763fdef9c38c5dd4d50703f0c7e27f4903c139804ec75e55f8388139ae

    SHA512

    d67214077162a105d01b11a8e207fab08b45b08fbfba0615a2ea146e1dd99eea35e4f02958a1754d3192292c00caf777f186f0a362e4b8b0da51fabbdb76375b

  • C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe

    Filesize

    1.1MB

    MD5

    566ed4f62fdc96f175afedd811fa0370

    SHA1

    d4b47adc40e0d5a9391d3f6f2942d1889dd2a451

    SHA256

    e17cd94c08fc0e001a49f43a0801cea4625fb9aee211b6dfebebec446c21f460

    SHA512

    cdf8f508d396a1a0d2e0fc25f2ae46398b25039a0dafa0919737cc44e3e926ebae4c3aa26f1a3441511430f1a36241f8e61c515a5d9bd98ad4740d4d0f7b8db7

  • C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE

    Filesize

    248KB

    MD5

    863087d206bd42785c4d49facc32da19

    SHA1

    d9546a1ebbb0a8359d75ce930c03086c7d5823f4

    SHA256

    cce0b71faa0b880f11bddf648d6025d5816c7078006fa8c1e663ab957af20ea4

    SHA512

    8f696f910e451ddff26f1e083fe8a889694305ea3cc226bdbb1c64cd0b6ee8b15b382a0eee77be159f347f1bbe55d12e8a0e2d63777ab62a74e17c15968465af

  • C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE

    Filesize

    1.5MB

    MD5

    361e4d0109807311ec8d055a2752da45

    SHA1

    d5d9a8e4d0dd912e391c304766b49ef7ff839acb

    SHA256

    f393234dadf9221f87711c11f39323b0db4c6ba4311ce9008e5251f8c55eb746

    SHA512

    2ba3a7f12620a381a311efd69f2fbeb625e3483d4b9efaae7098269e13ddfed1d1a254356cd385d76b5032f52587e3a2b81cf4a4b9857a9478dced566e539e99

  • C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE

    Filesize

    715KB

    MD5

    f34835c1f458f93cd9041bfa7d01ee7d

    SHA1

    283ac4059492a22e10f7fcef219e52e0400a8926

    SHA256

    afc5cc567db1a3318c89dd0efad2ca60a353290bc25d98bbbba8e6f1492e23b1

    SHA512

    d5cc2244f1b6492dd9e66c6e917c2dfaa11376d4a8d1dea2c241cd35ce947ad919e47d1a78dea0c1f6cd6fa1e74426f806ddcf9ed3e8f25a9ae7c370b09e6857

  • C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE

    Filesize

    495KB

    MD5

    07e194ce831b1846111eb6c8b176c86e

    SHA1

    b9c83ec3b0949cb661878fb1a8b43a073e15baf1

    SHA256

    d882f673ddf40a7ea6d89ce25e4ee55d94a5ef0b5403aa8d86656fd960d0e4ac

    SHA512

    55f9b6d3199aa60d836b6792ae55731236fb2a99c79ce8522e07e579c64eabb88fa413c02632deb87a361dd8490361aa1424beed2e01ba28be220f8c676a1bb5

  • C:\Users\ALLUSE~1\PACKAG~1\{33D1F~1\VCREDI~1.EXE

    Filesize

    526KB

    MD5

    cc5020b193486a88f373bedca78e24c8

    SHA1

    61744a1675ce10ddd196129b49331d517d7da884

    SHA256

    e87936bb1f0794b7622f8ce5b88e4b57b2358c4e0d0fd87c5cd9fa03b8429e2a

    SHA512

    bc2c77a25ad9f25ac19d8216dafc5417513cb57b9984237a5589a0bb684fdac4540695fcfb0df150556823b191014c96b002e4234a779bd064d36166afeb09d2

  • C:\Users\ALLUSE~1\PACKAG~1\{4D8DC~1\VC_RED~1.EXE

    Filesize

    674KB

    MD5

    97510a7d9bf0811a6ea89fad85a9f3f3

    SHA1

    2ac0c49b66a92789be65580a38ae9798237711db

    SHA256

    c48abbc29405559e68cc9f8fc6d218aa317a9d0023839c7846ca509c1f563fea

    SHA512

    2a93e2a3bd187fdde160f87ef777ccd1d1c398d547b7c869e6b64469b9418ad04d887cdfe94af7407476377bf2d009f576de3935c025b7aefbab26fbcd8f90fb

  • C:\Users\ALLUSE~1\PACKAG~1\{61087~1\VCREDI~1.EXE

    Filesize

    495KB

    MD5

    9597098cfbc45fae685d9480d135ed13

    SHA1

    84401f03a7942a7e4fcd26e4414b227edd9b0f09

    SHA256

    45966655baaed42df92cd6d8094b4172c0e7a0320528b59cf63fca7c25d66e9c

    SHA512

    16afbdffe4b4b2e54b4cc96fe74e49ca367dea50752321ddf334756519812ba8ce147ef5459e421dc42e103bc3456aab1d185588cc86b35fa2315ac86b2a0164

  • C:\Users\ALLUSE~1\PACKAG~1\{CA675~1\VCREDI~1.EXE

    Filesize

    485KB

    MD5

    87f15006aea3b4433e226882a56f188d

    SHA1

    e3ad6beb8229af62b0824151dbf546c0506d4f65

    SHA256

    8d0045c74270281c705009d49441167c8a51ac70b720f84ff941b39fad220919

    SHA512

    b01a8af6dc836044d2adc6828654fa7a187c3f7ffe2a4db4c73021be6d121f9c1c47b1643513c3f25c0e1b5123b8ce2dc78b2ca8ce638a09c2171f158762c7c1

  • C:\Users\Admin\AppData\Local\Temp\202308~1.EXE

    Filesize

    152KB

    MD5

    78c475f8db54ff078b0405a46b15807f

    SHA1

    536186d70f8dbfc41ad7b8c4ed5be3aa8929a860

    SHA256

    f4bbec8df76ba539d8b6d79a47019f7a888fab6b46cf36f7eafb6a40027bfda2

    SHA512

    b5d4a4418419617c18856cc0c20556c9958502f6b32bf08904f5312dfa81bbdc9ac103f7f0d305542b225d1eeb592653748311afe286a20dc7389cff572bb800

  • C:\Windows\svchost.com

    Filesize

    40KB

    MD5

    c60f7dc9cfa93a020403a15f9d2a7c0d

    SHA1

    0567ed288997a26f758ca3667b24cb5a94d33007

    SHA256

    6462b84286ee55edebb1752f648b0b8213ad29875f9e7d44e8b00a9aad1f8221

    SHA512

    6668f6e2845c37fc60c79ba303fe540b713be26ecc3a9674a3f42192415b2a1c82d77cfa447bfee83298a0728327caa6435a610e9f61cc50b4b0380515d93bb6

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\c4ee733ac90ec7d722e7129ca0a01d9c1e2cbe55acba8eb307135f43b6ee54bc.exe

    Filesize

    312KB

    MD5

    d68a9ca83cdac8db221b89ec90d8ba54

    SHA1

    3e720c79148aefb17c81ed3ce9ec0506de7d9a06

    SHA256

    72cb126109421e009d819957ca17e8494138ba257778a153f530456a533bed17

    SHA512

    595abf4a1e03d2a749d4160b2d69b19d0f8e6e885e680bfb089c3927dfe77be0838f5bc619ae64baa3eaa9df47221015b7325bda2a7e78336933af3cb0df1b43

  • memory/2512-167-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2512-182-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2512-10-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2860-174-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2860-179-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2860-168-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2860-177-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2860-171-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3004-165-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3004-172-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3004-175-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3004-169-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3004-4-0x00000000024C0000-0x0000000002556000-memory.dmp

    Filesize

    600KB

  • memory/3004-180-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3004-164-0x00000000024C0000-0x0000000002556000-memory.dmp

    Filesize

    600KB