Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    31/10/2024, 04:16

General

  • Target

    cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe

  • Size

    928KB

  • MD5

    acd469e6645b7462b61ed435e9984a00

  • SHA1

    4b5a58734f229a432daa918709204f8c49722087

  • SHA256

    cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594b

  • SHA512

    28941bbcabc556d235185084e199408b7f38ba7dc2b568837177987f8af7229be7b10cbd4b4e8207e3851d42cbff089ae24761026d601dbbd2e0ef603cb51b72

  • SSDEEP

    12288:YpJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9M0G9fDUMS9:kJ39LyjbJkQFMhmC+6GD9Kgn9

Malware Config

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe
    "C:\Users\Admin\AppData\Local\Temp\cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Users\Admin\AppData\Local\Temp\3582-490\cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Users\Admin\AppData\Local\Temp\._cache_cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2480
      • C:\ProgramData\Synaptics\Synaptics.exe
        "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2852
        • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:2220
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe

    Filesize

    547KB

    MD5

    cf6c595d3e5e9667667af096762fd9c4

    SHA1

    9bb44da8d7f6457099cb56e4f7d1026963dce7ce

    SHA256

    593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d

    SHA512

    ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe

    Filesize

    285KB

    MD5

    831270ac3db358cdbef5535b0b3a44e6

    SHA1

    c0423685c09bbe465f6bb7f8672c936e768f05a3

    SHA256

    a8f78ac26c738b13564252f1048ca784bf152ef048b829d3d22650b7f62078f0

    SHA512

    f64a00977d4b6f8c43f53cee7bb450f3c8cbef08525975055fde5d8c515db32d2bfad92e99313b3a10a72a50dd09b4ffe28e9af4c148c6480622ba486776e450

  • C:\Users\Admin\AppData\Local\Temp\uvOQHiGA.xlsm

    Filesize

    23KB

    MD5

    5313e0f1992090e46da1c02c20391ec3

    SHA1

    48b2aeab65ecb9a5f4496cec542815587ad1e848

    SHA256

    7da144bc92fe6434d9aed4d66258249928ec3cf50c6b8f3ef39aa5f1d4d92230

    SHA512

    2cd35252bcdd32c8e8cd52eb8776ebe458c521e1544d367621331717750162171428658cf2efd702a055a173ff9a4963b91f96eb774315f993da9d255ab0cdc6

  • C:\Users\Admin\AppData\Local\Temp\uvOQHiGA.xlsm

    Filesize

    30KB

    MD5

    db3df0f959ebd486ac773254b14fca64

    SHA1

    1baad20850923b480c464922259c71e45bd809b8

    SHA256

    1a33009098c07da72d47541591a8e6206c13a883ced05f45b555cd6e364535fa

    SHA512

    3f554618c1fa21770bfdaf4a858fdf5c8af6535c44c0704f13783214c4ab08b1595bd20b9ea936f627e53fa9f682d0be8b20018effd2d6942717cffaf7709e15

  • C:\Users\Admin\AppData\Local\Temp\uvOQHiGA.xlsm

    Filesize

    29KB

    MD5

    c634d8126f180783c29dcf89168723e5

    SHA1

    f31dd78cfc20de2f7f5b205a62814610ef1e812b

    SHA256

    48d9db17e6e780939eb678668ed6e26b0cff1b855781ea895ac2aa9615594fff

    SHA512

    e85de70f89e23a5c533f731c1a4972b32859960c2b94d214c0ddca4ac4dcbab6990f983f7b9476fbe81d9560aa1f1012861ff77d802457eb1784e71bef213dea

  • C:\Users\Admin\AppData\Local\Temp\uvOQHiGA.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\uvOQHiGA.xlsm

    Filesize

    27KB

    MD5

    418a59fb18cce7974f12145800b2876e

    SHA1

    9663ca62c99b2fb9ce2a0f07230934ee729b42c2

    SHA256

    7fa39ad8339b4042d325201ceeb448beb7a7746b8cfc53bca7788255502bfd71

    SHA512

    de2ec953326af4cbfeb5c93c182acdffc603763a421b0f0a1ebb978ae8f5467c800e563e661ce20d890976ba4d9fc60e3cfde768a422f50a13724cfee03911b7

  • C:\Users\Admin\Downloads\~$RegisterLock.xlsx

    Filesize

    165B

    MD5

    ff09371174f7c701e75f357a187c06e8

    SHA1

    57f9a638fd652922d7eb23236c80055a91724503

    SHA256

    e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8

    SHA512

    e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\._cache_cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe

    Filesize

    134KB

    MD5

    e2f12b2ff3cc00b0556f5a18477edbf5

    SHA1

    fe634e8c1be775cf9fec247b13c0c757f6d15b7c

    SHA256

    bb3af210417a1ceeb0c405005be92194af7a53cdc08513f115a389235619c74f

    SHA512

    4ecb5387e3e08a9e95949df90e8a6a27201d85cd4c709fe66b47a404c10aa3d97a1e39b2a7b5a1e312518489653bcc6dd276b5042c0d22b701dfacf578254579

  • \Users\Admin\AppData\Local\Temp\3582-490\cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe

    Filesize

    887KB

    MD5

    62f6ce01a74335620bc34054f9846128

    SHA1

    73fe5a05740b2a62424027129a6d4418a3d711c2

    SHA256

    0c93152b210cf85f70b5138cfc03214c03fa8f474e447cc7f1e9a38a298736ce

    SHA512

    55b021a046cf3bb735c814c61528a22dfd72b01d87fa67c5fc280ba03f9bd245c39b3ccec446859b8253eeec09f2273f6e540cb97f26f907e0453d4266a20f47

  • memory/2052-41-0x0000000000400000-0x00000000004E4000-memory.dmp

    Filesize

    912KB

  • memory/2052-14-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2412-208-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2412-211-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2724-51-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2852-209-0x0000000000400000-0x00000000004E4000-memory.dmp

    Filesize

    912KB

  • memory/2852-212-0x0000000000400000-0x00000000004E4000-memory.dmp

    Filesize

    912KB

  • memory/2852-244-0x0000000000400000-0x00000000004E4000-memory.dmp

    Filesize

    912KB