Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-11-2024 02:06

General

  • Target

    52f475f9d6998834ee0507e7c516cee45c4ce104677ba355424a5915d8c70279N.exe

  • Size

    8.6MB

  • MD5

    537a5ee6992de7bd4d8bc790ca801500

  • SHA1

    5c08d7a497e577e7efbdd544dca659133c1133c0

  • SHA256

    52f475f9d6998834ee0507e7c516cee45c4ce104677ba355424a5915d8c70279

  • SHA512

    1be92602e792a6866ddd23a91d8aca8123036e8190ac36ff7bb45c2400727b0a15b6dfff9c7062f5fbef7c4dda3b741408af1431ff581bc43daa994b023e71c0

  • SSDEEP

    196608:oZo4Rf5LqFE9tdALZ8i06SCaEHztf3d0K1o:kRRxLZ0pSCNHhvPo

Malware Config

Signatures

  • Detect Neshta payload 5 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 17 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52f475f9d6998834ee0507e7c516cee45c4ce104677ba355424a5915d8c70279N.exe
    "C:\Users\Admin\AppData\Local\Temp\52f475f9d6998834ee0507e7c516cee45c4ce104677ba355424a5915d8c70279N.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3496
    • C:\Users\Admin\AppData\Local\Temp\3582-490\52f475f9d6998834ee0507e7c516cee45c4ce104677ba355424a5915d8c70279N.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\52f475f9d6998834ee0507e7c516cee45c4ce104677ba355424a5915d8c70279N.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4780
      • C:\Users\Admin\AppData\Local\Temp\onefile_4780_133758507724022112\zone.exe
        "C:\Users\Admin\AppData\Local\Temp\3582-490\52f475f9d6998834ee0507e7c516cee45c4ce104677ba355424a5915d8c70279N.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1468
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "ver"
          4⤵
            PID:4744
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c title By x-jocker
            4⤵
              PID:4912
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c cls
              4⤵
                PID:1448
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c color a
                4⤵
                  PID:2108

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

            Filesize

            86KB

            MD5

            3b73078a714bf61d1c19ebc3afc0e454

            SHA1

            9abeabd74613a2f533e2244c9ee6f967188e4e7e

            SHA256

            ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

            SHA512

            75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

          • C:\Users\Admin\AppData\Local\Temp\3582-490\52f475f9d6998834ee0507e7c516cee45c4ce104677ba355424a5915d8c70279N.exe

            Filesize

            8.6MB

            MD5

            ef69998541d48a1a17e13eacd0157a9e

            SHA1

            aab57582609efbc7d5d5e2f2fe1883499a904d99

            SHA256

            e097f5f51b30e8d644f84af80b2236a2a94141b81fdd6c6b0c2e4d26d682e120

            SHA512

            eba6547dca86ddfd2182970c22a4148c02a35784552a3c7e6ece43182b90ce854ce6a28e5d3c6698fdb50b9896dfe064066fface090175fc3d38dc960b39e97a

          • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_queue.pyd

            Filesize

            30KB

            MD5

            60dec90862b996e56aedafb2774c3475

            SHA1

            ce6ff24b2cc03aff2e825e1cf953cba10c139c9d

            SHA256

            9568ef8bae36edae7347b6573407c312ce3b19bbd899713551a1819d6632da46

            SHA512

            c4b2066975f5d204a7659a2c7c6bc6dfc9a2fc83d7614dbbc0396f3dcc8b142df9a803f001768bfd44ca6bfa61622836b20a9d68871954009435449ae6d76720

          • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_socket.pyd

            Filesize

            77KB

            MD5

            c389430e19f1cd4c2e7b8538e8c52459

            SHA1

            546ed5a85ad80a7b7db99f80c7080dc972e4f2a2

            SHA256

            a14efa68d8f7ec018fb867a6ba6c6c290a803b4001fd8c45db7bda66fb700067

            SHA512

            5bef6c90c65bf1d4be0ce0d0cb3f38fe288f5716c93e444cf12f89f066791850d8316d414f1d795ff148c9e841cda90ef9c35ceb4a499563f28d068a6b427671

          • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_ssl.pyd

            Filesize

            156KB

            MD5

            7c7223f28c0c27c85a979ad222d19288

            SHA1

            4185e671b1dc56b22134c97cd8a4a67747887b87

            SHA256

            4ec47beadc4fd0d38fa39092244c108674012874f3190ee0e484aa988b94f986

            SHA512

            f3e813b954357f1bc323d897edf308a99ed30ff451053b312f81b6baae188cda58d144072627398a19d8d12fe659e4f40636dbbdf22a45770c3ca71746ec2df0

          • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\certifi\cacert.pem

            Filesize

            285KB

            MD5

            d3e74c9d33719c8ab162baa4ae743b27

            SHA1

            ee32f2ccd4bc56ca68441a02bf33e32dc6205c2b

            SHA256

            7a347ca8fef6e29f82b6e4785355a6635c17fa755e0940f65f15aa8fc7bd7f92

            SHA512

            e0fb35d6901a6debbf48a0655e2aa1040700eb5166e732ae2617e89ef5e6869e8ddd5c7875fa83f31d447d4abc3db14bffd29600c9af725d9b03f03363469b4c

          • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\unicodedata.pyd

            Filesize

            1.1MB

            MD5

            d4964a28a22078c30064c65e968f9e1f

            SHA1

            b9b95975bea97a55c888da66148d54bdb38b609b

            SHA256

            b204718d21952369726472ca12712047839119ccf87e16979af595c0a57b6703

            SHA512

            bfe200b255ae1ddba53d98d54479e7e1d0932fb27bbfdcb4170d3d4cbbbfc297e3b5fd273b830399b795feb64cd0d9c48d0e1e0eaf72d0e0992261864e2d7296

          • C:\Users\Admin\AppData\Local\Temp\onefile_4780_133758507724022112\VCRUNTIME140.dll

            Filesize

            95KB

            MD5

            f34eb034aa4a9735218686590cba2e8b

            SHA1

            2bc20acdcb201676b77a66fa7ec6b53fa2644713

            SHA256

            9d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1

            SHA512

            d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af

          • C:\Users\Admin\AppData\Local\Temp\onefile_4780_133758507724022112\_bz2.pyd

            Filesize

            81KB

            MD5

            56203038756826a0a683d5750ee04093

            SHA1

            93d5a07f49bdcc7eb8fba458b2428fe4afcc20d2

            SHA256

            31c2f21adf27ca77fa746c0fda9c7d7734587ab123b95f2310725aaf4bf4ff3c

            SHA512

            3da5ae98511300694c9e91617c152805761d3de567981b5ab3ef7cd3dbba3521aae0d49b1eb42123d241b5ed13e8637d5c5bc1b44b9eaa754657f30662159f3a

          • C:\Users\Admin\AppData\Local\Temp\onefile_4780_133758507724022112\_ctypes.pyd

            Filesize

            120KB

            MD5

            462fd515ca586048459b9d90a660cb93

            SHA1

            06089f5d5e2a6411a0d7b106d24d5203eb70ec60

            SHA256

            bf017767ac650420487ca3225b3077445d24260bf1a33e75f7361b0c6d3e96b4

            SHA512

            67851bdbf9ba007012b89c89b86fd430fce24790466fefbb54431a7c200884fc9eb2f90c36d57acd300018f607630248f1a3addc2aa5f212458eb7a5c27054b3

          • C:\Users\Admin\AppData\Local\Temp\onefile_4780_133758507724022112\_hashlib.pyd

            Filesize

            63KB

            MD5

            7a74284813386818ada7bf55c8d8acf9

            SHA1

            380c4184eec7ca266e4c2b96bb92a504dfd8fe5f

            SHA256

            21a1819013de423bb3b9b682d0b3506c6ef57ee88c61edf4ba12d8d5f589c9c2

            SHA512

            f8bc4ac57ada754006bbbb0bfa1ccb6c659f9c4d3270970e26219005e872b60afb9242457d8eb3eae0ce1f608f730da3bf16715f04b47bea4c95519dd9994a46

          • C:\Users\Admin\AppData\Local\Temp\onefile_4780_133758507724022112\_lzma.pyd

            Filesize

            154KB

            MD5

            14ea9d8ba0c2379fb1a9f6f3e9bbd63b

            SHA1

            f7d4e7b86acaf796679d173e18f758c1e338de82

            SHA256

            c414a5a418c41a7a8316687047ed816cad576741bd09a268928e381a03e1eb39

            SHA512

            64a52fe41007a1cac4afedf2961727b823d7f1c4399d3465d22377b5a4a5935cee2598447aeff62f99c4e98bb3657cfae25b5c27de32107a3a829df5a25ba1ce

          • C:\Users\Admin\AppData\Local\Temp\onefile_4780_133758507724022112\charset_normalizer\md.pyd

            Filesize

            10KB

            MD5

            f33ca57d413e6b5313272fa54dbc8baa

            SHA1

            4e0cabe7d38fe8d649a0a497ed18d4d1ca5f4c44

            SHA256

            9b3d70922dcfaeb02812afa9030a40433b9d2b58bcf088781f9ab68a74d20664

            SHA512

            f17c06f4202b6edbb66660d68ff938d4f75b411f9fab48636c3575e42abaab6464d66cb57bce7f84e8e2b5755b6ef757a820a50c13dd5f85faa63cd553d3ff32

          • C:\Users\Admin\AppData\Local\Temp\onefile_4780_133758507724022112\charset_normalizer\md__mypyc.pyd

            Filesize

            117KB

            MD5

            494f5b9adc1cfb7fdb919c9b1af346e1

            SHA1

            4a5fddd47812d19948585390f76d5435c4220e6b

            SHA256

            ad9bcc0de6815516dfde91bb2e477f8fb5f099d7f5511d0f54b50fa77b721051

            SHA512

            2c0d68da196075ea30d97b5fd853c673e28949df2b6bf005ae72fd8b60a0c036f18103c5de662cac63baaef740b65b4ed2394fcd2e6da4dfcfbeef5b64dab794

          • C:\Users\Admin\AppData\Local\Temp\onefile_4780_133758507724022112\libcrypto-1_1.dll

            Filesize

            3.3MB

            MD5

            80b72c24c74d59ae32ba2b0ea5e7dad2

            SHA1

            75f892e361619e51578b312605201571bfb67ff8

            SHA256

            eb975c94e5f4292edd9a8207e356fe4ea0c66e802c1e9305323d37185f85ad6d

            SHA512

            08014ee480b5646362c433b82393160edf9602e4654e12cd9b6d3c24e98c56b46add9bf447c2301a2b2e782f49c444cb8e37ee544f38330c944c87397bdd152a

          • C:\Users\Admin\AppData\Local\Temp\onefile_4780_133758507724022112\libffi-7.dll

            Filesize

            32KB

            MD5

            eef7981412be8ea459064d3090f4b3aa

            SHA1

            c60da4830ce27afc234b3c3014c583f7f0a5a925

            SHA256

            f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

            SHA512

            dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

          • C:\Users\Admin\AppData\Local\Temp\onefile_4780_133758507724022112\libssl-1_1.dll

            Filesize

            686KB

            MD5

            86f2d9cc8cc54bbb005b15cabf715e5d

            SHA1

            396833cba6802cb83367f6313c6e3c67521c51ad

            SHA256

            d98dd943517963fd0e790fde00965822aa4e4a48e8a479afad74abf14a300771

            SHA512

            0013d487173b42e669a13752dc8a85b838c93524f976864d16ec0d9d7070d981d129577eda497d4fcf66fc6087366bd320cff92ead92ab79cfcaa946489ac6cb

          • C:\Users\Admin\AppData\Local\Temp\onefile_4780_133758507724022112\python310.dll

            Filesize

            4.3MB

            MD5

            e4533934b37e688106beac6c5919281e

            SHA1

            ada39f10ef0bbdcf05822f4260e43d53367b0017

            SHA256

            2bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5

            SHA512

            fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9

          • C:\Users\Admin\AppData\Local\Temp\onefile_4780_133758507724022112\select.pyd

            Filesize

            29KB

            MD5

            c6ef07e75eae2c147042d142e23d2173

            SHA1

            6ef3e912db5faf5a6b4225dbb6e34337a2271a60

            SHA256

            43ee736c8a93e28b1407bf5e057a7449f16ee665a6e51a0f1bc416e13cee7e78

            SHA512

            30e915566e7b934bdd49e708151c98f732ff338d7bc3a46797de9cca308621791276ea03372c5e2834b6b55e66e05d58cf1bb4cb9ff31fb0a1c1aca0fcdc0d45

          • C:\Users\Admin\AppData\Local\Temp\onefile_4780_133758507724022112\zone.exe

            Filesize

            9.8MB

            MD5

            b5636a14c8f3b1a67f63b4848932b072

            SHA1

            901d4b4e064722755a020c4d52e56cf7ac822c0f

            SHA256

            128e8923ec2ff324e4dcb9fccada0173fc3e28fef9fa7fb8dec47c0d2ca9ad19

            SHA512

            9eceaf262e79427e5c4d680834e82d59c1d6eb98a222fc4c140aa97b2b6cce88280cd7f5486d6a579b93d71ff260cd81f02e925bbdef029b28948a320a483e2e

          • memory/3496-150-0x0000000000400000-0x000000000041B000-memory.dmp

            Filesize

            108KB

          • memory/3496-151-0x0000000000400000-0x000000000041B000-memory.dmp

            Filesize

            108KB

          • memory/3496-152-0x0000000000400000-0x000000000041B000-memory.dmp

            Filesize

            108KB

          • memory/3496-154-0x0000000000400000-0x000000000041B000-memory.dmp

            Filesize

            108KB