Analysis

  • max time kernel
    104s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2024 23:48

General

  • Target

    2f934aa92b78e87c70f9c0c0c620ceae733939154a9c2954a57afd44d8d813c4N.exe

  • Size

    427KB

  • MD5

    221a51d7bcce3bca4cf40af432147500

  • SHA1

    db19ab53983ccbca05b9488d897b23f45eb0371b

  • SHA256

    2f934aa92b78e87c70f9c0c0c620ceae733939154a9c2954a57afd44d8d813c4

  • SHA512

    a9a4e1da9fbb4d7a12f993c6fb5b3907df585539ba6547997961b2ae5374752b8e213df0e8d253e22cef7b39389abfe1eb30d3469f1d6a31582536f0099dd5fa

  • SSDEEP

    3072:sr85Cq+1BlB+/AXCpSnymOksQEpm0/A+0hS7Qv4DhP/+1BlBYmTOh4eqbeNMS+1X:k9rc/IQay1D7/An07Qv49ojeqbeNaD

Malware Config

Signatures

  • Detect Neshta payload 6 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f934aa92b78e87c70f9c0c0c620ceae733939154a9c2954a57afd44d8d813c4N.exe
    "C:\Users\Admin\AppData\Local\Temp\2f934aa92b78e87c70f9c0c0c620ceae733939154a9c2954a57afd44d8d813c4N.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3868
    • C:\Users\Admin\AppData\Local\Temp\3582-490\2f934aa92b78e87c70f9c0c0c620ceae733939154a9c2954a57afd44d8d813c4N.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\2f934aa92b78e87c70f9c0c0c620ceae733939154a9c2954a57afd44d8d813c4N.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Users\Admin\AppData\Local\Temp\3582-490\2f934aa92b78e87c70f9c0c0c620ceae733939154a9c2954a57afd44d8d813c4N.exe

    Filesize

    386KB

    MD5

    acaa58fd87bc4966f28981f28aaa4ec8

    SHA1

    7ffc613da0db0531e51a3a080bcbc95404627b75

    SHA256

    54809a270818ff9b653b5cef20693a5ed14e403b24d370f545dfca800fc34207

    SHA512

    c47212f3c9ae7904f7d6a03d9d3a154ca27c9acb47d2efef2f99b361473fa7eccfda886b2870bff7df4f2daf20bc629ba315d404f7d1675ef4175af3ccb193b2

  • memory/3752-19-0x0000000005950000-0x000000000595A000-memory.dmp

    Filesize

    40KB

  • memory/3752-20-0x0000000005940000-0x0000000005948000-memory.dmp

    Filesize

    32KB

  • memory/3752-15-0x00007FFE82690000-0x00007FFE82885000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-16-0x0000000003300000-0x000000000330C000-memory.dmp

    Filesize

    48KB

  • memory/3752-17-0x0000000005970000-0x0000000005A02000-memory.dmp

    Filesize

    584KB

  • memory/3752-18-0x00000000058A0000-0x00000000058B2000-memory.dmp

    Filesize

    72KB

  • memory/3752-13-0x0000000000E40000-0x0000000000EA6000-memory.dmp

    Filesize

    408KB

  • memory/3752-14-0x0000000005E80000-0x0000000006424000-memory.dmp

    Filesize

    5.6MB

  • memory/3752-12-0x00007FFE82690000-0x00007FFE82885000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-110-0x00007FFE82690000-0x00007FFE82885000-memory.dmp

    Filesize

    2.0MB

  • memory/3868-109-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3868-111-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3868-112-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3868-113-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3868-115-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB