Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-11-2024 23:49

General

  • Target

    1d54638b06eebb81519271ea5db4727ee958dbb1f3c409fd632a01eae3aaefceN.exe

  • Size

    2.3MB

  • MD5

    0c4ba9be77bbe429131a5d6a356e2750

  • SHA1

    153cd660880a3df02142ddfb5d7c5db88a8d76a3

  • SHA256

    1d54638b06eebb81519271ea5db4727ee958dbb1f3c409fd632a01eae3aaefce

  • SHA512

    e665794ce2cc57607223399f64cb9614036645dbd11a794727d54a634560d5d57b98dfb3a8b0e5f327be0d1095ad33422d7aaafed3232d5d737bbfed32c2d10b

  • SSDEEP

    49152:rGxXUiczpDXlotRxtbs4WRccam/tgD86aP/bemwqGTTxynLCgvhmw:AepDXYDcaa6K9lG4zvt

Malware Config

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d54638b06eebb81519271ea5db4727ee958dbb1f3c409fd632a01eae3aaefceN.exe
    "C:\Users\Admin\AppData\Local\Temp\1d54638b06eebb81519271ea5db4727ee958dbb1f3c409fd632a01eae3aaefceN.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Users\Admin\AppData\Local\Temp\3582-490\1d54638b06eebb81519271ea5db4727ee958dbb1f3c409fd632a01eae3aaefceN.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\1d54638b06eebb81519271ea5db4727ee958dbb1f3c409fd632a01eae3aaefceN.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Users\Admin\AppData\Local\Temp\is-UCKRJ.tmp\1d54638b06eebb81519271ea5db4727ee958dbb1f3c409fd632a01eae3aaefceN.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-UCKRJ.tmp\1d54638b06eebb81519271ea5db4727ee958dbb1f3c409fd632a01eae3aaefceN.tmp" /SL5="$110064,2102590,54272,C:\Users\Admin\AppData\Local\Temp\3582-490\1d54638b06eebb81519271ea5db4727ee958dbb1f3c409fd632a01eae3aaefceN.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2412
        • C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\WSHelper.exe
          "C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\WSHelper.exe" /regserver
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          PID:4840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\CBSCreateVC.dll

    Filesize

    134KB

    MD5

    30ebdc01d3ab9fb3772445cb4a9ebbba

    SHA1

    f0eee5c8a4f416673ee5a0698075c124aefc5d14

    SHA256

    0ea512eac7298ed72e8d47da4db8d73557599cd2411f69657cc374cd0704e8e8

    SHA512

    4be686006d169dcd1f18dd85b0cbf0c13e1e6cfe6ec60f9cea32ba1afae811c0dd232de2d569de164a7c5a1108960551b04c28600f8959a51fc0bded78ca3fa9

  • C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\CBSProducstInfo.dll

    Filesize

    691KB

    MD5

    077b7b7d93b66231bb197411da57f23b

    SHA1

    24a67aa115793644fcefab2e58afeb07d3899e75

    SHA256

    899d4f9a675d9b3f165b56ae46f3593224c17bfd5b0d739057db45a51d2c37b8

    SHA512

    25dfd43150b650498f4aa59623ef0820d6a8f31f94797eb52864d95c35758d1d1b5bdf73dc3c0f6046dc89ffb2376fb16604d908ea5d154449a420256209d91f

  • C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\DAQExp.dll

    Filesize

    1.4MB

    MD5

    ead517fe26df369aa13cf9aa620b935e

    SHA1

    0797d65e0e90f9f2c9e6ae4a673261389aa8b2e5

    SHA256

    e57e457c56447640011298bf85d589964eacdfe8125b36d6ad0f12d2ec053efd

    SHA512

    61f3cda3fc26da9b6a98c1912c3df9fce056a7cd553ca365f6992d8ee91c4be18dc50d84f2c42c498326b76f36eb7ac406d0e566b30ba1b4e3f14004e9373cbe

  • C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Languages\English.dat

    Filesize

    6KB

    MD5

    f49b3dc0407d545259d7518171970c52

    SHA1

    9246cda22f90d743128250ccbdbcf06929c55d4b

    SHA256

    516482b3719d639bde4e134b09e227b51610d307ea9b53c425d70bc705043934

    SHA512

    809867a7ce7d4c784de7f51f3cbd61fbd5ac724c0745a327d51887d5140f26de2815b04beea4a76ab73057752ee443b865bee0d594a81d3d8227285bf1d28c65

  • C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Skin\Default\Controls.xml

    Filesize

    19KB

    MD5

    866d49dff47c4e8515dc3a41fffe7193

    SHA1

    2a5addbe9f28240ef1f61e0456677ef7afd69200

    SHA256

    1eabf97b581fd4fbc9dd3b4c7083ed2402c658275f8b979955b68c60c1349915

    SHA512

    4a5c89d3ac35c2d8ec91ed1cce49da835d3237e867380e72d3a8c1e2d982e8ea74907ec39f52ce4612c622d5800483796fd4a1a5feaf5619a5aedf7f87fee647

  • C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\Skin\Default\TipFrm.xml

    Filesize

    2KB

    MD5

    83de817d78fc22e8b4a1101ebcd0e843

    SHA1

    b82430f42e88cc6667143bb4070460ab0ac33d12

    SHA256

    77559f48dcb675616b1db040c0b7849f6c7a793332c4d4052010f97c448fe150

    SHA512

    856e8d05f6962e5cfe2af94e46af3fbe2275092f9a23e83f348d4d6e8272732197b4eb670fbb36edbc28ac1324a98299b488184587afd3b8d41dc0be774694db

  • C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\WSHelper.exe

    Filesize

    2.0MB

    MD5

    fe84f125c65b81039acc9ea54b887ea8

    SHA1

    8d68d1fdd365f9fa40ef25d0ab1ead4361c7f9be

    SHA256

    546dbcc7a073099096a027efba2598b8242476a0ee20d7026ddee2251b0edf57

    SHA512

    188f81c6fe7d8839cf9b35e38512cec7ef63c1cf6a630ca5ed836023e2c1fc333a9f5dbd2446d9fa4d72f1044edbae981358062eec1951badf9626c8c7f518d8

  • C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\WSHelper.ini

    Filesize

    4KB

    MD5

    4dc3a90d50540a4e14be647a1ec47b39

    SHA1

    0656796fc081c3f9ac0bdb416a79d2770d728506

    SHA256

    7361abe78844978f70b46e6ace2138ded3c03805cc52469a4772f0d3f3bf20f6

    SHA512

    f4c007a689cc0fe3005e064ffe0412a99b4eb4d2e415f6c5f977c6f68fecd0b188ef89e04dd28d75dcbcde93e3b2414fdf1ad5884c07d18099ace968b45144ed

  • C:\Program Files (x86)\Common Files\Wondershare\Wondershare Helper Compact\WSHelper.ini

    Filesize

    4KB

    MD5

    abf080411fe1733854f62a62c4f78288

    SHA1

    6f1cfd590b9801787bc99083ac5d174c0b05be73

    SHA256

    d3b9dba7ef310fca7785c5d9dc341e9a4bd43daf739c67b6ef1f7c6a248f52ea

    SHA512

    bb5d240559d44b4d05669f16dafd2055589df7ebabf6424fbc61c88c811be2c7693dc62be4c1d910b2e7ae9b073cf088ccb28e05e92cbd3bd4e48f556ed89b9a

  • C:\Users\Admin\AppData\Local\Temp\3582-490\1d54638b06eebb81519271ea5db4727ee958dbb1f3c409fd632a01eae3aaefceN.exe

    Filesize

    2.3MB

    MD5

    88ad838f6e60572fd5a97178e8c2cf7f

    SHA1

    2e9c472ca2d618e1ec028100efb51225e1f81e0a

    SHA256

    79827a18a6a7902e8644f6d997ee38e8965a4c954ad03dc0cd25d0f3c7a4b2ff

    SHA512

    3d46862b798b357ec75a641c39d387af7f819c528d828eec791e108b2eb12b6e831d07d66ce9a16895392c0b4e8f6a24edfaa9d8dd842b95183fcc166961cb09

  • C:\Users\Admin\AppData\Local\Temp\is-NQDI1.tmp\KPByName.dll

    Filesize

    35KB

    MD5

    4ef13e267ebbf804dd4157b447aa7059

    SHA1

    b9507c5b02bbae456ae5de7132ebafd27206b944

    SHA256

    2476d897a6d20653578fcb98737c85ccd96a42e57f67843ffbc431c0d05909a7

    SHA512

    81df3f309b6a734fae2e824a4535d9a7251d94885593c7c37ee70853f7c721062023d0d22ba1c92845c6fd14356048478b83c132aa9cec9360690a65b74bf360

  • C:\Users\Admin\AppData\Local\Temp\is-NQDI1.tmp\TempkillProcess.dll

    Filesize

    48KB

    MD5

    2d8ef1f86c38696abef55d64942a2c4a

    SHA1

    f6710bdda76a1cdb2669f49796f6c3161a895973

    SHA256

    e6be04c390cee6b4955c8af0c78221fdea3907ca5d0fb5f4f256fe7b05e8a332

    SHA512

    f668c37d9f722ce8217b87fe6cf2183ecc16451a1402a9d8d143ceac914e7b0056cf8d6aca8f81889cb954c85f12af304efe6d5d9121d4287e47aec2b6732da7

  • C:\Users\Admin\AppData\Local\Temp\is-NQDI1.tmp\WSHelper.ini

    Filesize

    4KB

    MD5

    be3c845d1db01761664699f870e78315

    SHA1

    08ddbd37f2c1ccf4acdca6906d915a829fd2a8f8

    SHA256

    0c0fd5929f7d258aac1ae23adfd23a4f4d6f37468003ee794465132336d24b21

    SHA512

    eb824ff125d782096079e564349c331ba9a515f60fc29afcf588d0d26be12032ab554c22b3f270adc1d95872ca092269c7bfbab7fc39bb90dca6c98ca1b9a6f5

  • C:\Users\Admin\AppData\Local\Temp\is-UCKRJ.tmp\1d54638b06eebb81519271ea5db4727ee958dbb1f3c409fd632a01eae3aaefceN.tmp

    Filesize

    696KB

    MD5

    8aa8c628f7b7b7f3e96eff00557bd0bf

    SHA1

    9af9cf61707cbba7bf0d7cbed94e8db91aff8bd6

    SHA256

    14d4fa3ea6c3fbf6e9d284de717e73a1ebb5e77f3d5c8c98808e40ade359ea9d

    SHA512

    5e0a4765873684fce159af81310e37b6918c923ccede0c4de0bd1e2e221425109131830cff02e3f910f15b0401ee3b4ae68700b6d29a5e8466f6d4ee1dcd6eeb

  • memory/952-120-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/952-124-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/952-245-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2040-14-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/2040-121-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2040-12-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2040-243-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2412-29-0x0000000003A70000-0x0000000003A84000-memory.dmp

    Filesize

    80KB

  • memory/2412-22-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2412-123-0x0000000003A70000-0x0000000003A84000-memory.dmp

    Filesize

    80KB

  • memory/2412-122-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2412-242-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2412-134-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/4840-217-0x0000000000BE0000-0x0000000000C98000-memory.dmp

    Filesize

    736KB

  • memory/4840-225-0x0000000000BE0000-0x0000000000C98000-memory.dmp

    Filesize

    736KB

  • memory/4840-224-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB