Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-11-2024 13:45

General

  • Target

    dd8e7f680116afcccaa00c8cc896f7c88a0868f243cb336d867629ae2efc4b95N.exe

  • Size

    8.0MB

  • MD5

    522c36c342a2ead024c63b2ad4af7750

  • SHA1

    9b41ce535eb7efb20a808e017b0f82d223656e51

  • SHA256

    dd8e7f680116afcccaa00c8cc896f7c88a0868f243cb336d867629ae2efc4b95

  • SHA512

    b67a86340fa3d74fa616e0f563b7bc500a6fcaa9cbc443bddebc1332355f0b9d2de771a9a46388a7472f3a1cd190307305745d15323a8fbdff9ad316ac3fef00

  • SSDEEP

    196608:XbEGIvoTLRugGP9N2WDxovI1QBujVv13n:gGT9O9NL2giBujR1X

Malware Config

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unexpected DNS network traffic destination 2 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies registry class 8 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 14 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd8e7f680116afcccaa00c8cc896f7c88a0868f243cb336d867629ae2efc4b95N.exe
    "C:\Users\Admin\AppData\Local\Temp\dd8e7f680116afcccaa00c8cc896f7c88a0868f243cb336d867629ae2efc4b95N.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Users\Admin\AppData\Local\Temp\3582-490\dd8e7f680116afcccaa00c8cc896f7c88a0868f243cb336d867629ae2efc4b95N.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\dd8e7f680116afcccaa00c8cc896f7c88a0868f243cb336d867629ae2efc4b95N.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Users\Admin\AppData\Local\Temp\psiphon-tunnel-core.exe
        C:\Users\Admin\AppData\Local\Temp\psiphon-tunnel-core.exe --config "C:\Users\Admin\AppData\Local\Psiphon3\psiphon.config" --serverList "C:\Users\Admin\AppData\Local\Psiphon3\server_list.dat"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:264
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://ipfounder.net/?sponsor_id=1BC527D3D09985CF&sponsor=psiphon&client_region=GB&client_asn=174&client_platform=windows&secret=580EfjEI29xL3hoyU6dgP4vSEVxdcGI7JDFkxgjds7PHulSEF0wmORpvzbqxyTwYtpowsY4xMFnfWEnTghe6l8jiV9K5QSZoir2i6fDeKJD6EhL6DkoYTEMu2EE9YJvy3LdCUZ7ncdVC6ipgWx06wznvDLbY1ajfcfRGCpfsQJei2q6tb0GSFh1QK3x3qXKwyjmNPc5J&psireason=connect&psicash=eyJtZXRhZGF0YSI6eyJjbGllbnRfcmVnaW9uIjoiR0IiLCJjbGllbnRfdmVyc2lvbiI6IjE4MyIsInByb3BhZ2F0aW9uX2NoYW5uZWxfaWQiOiI5MkFBQ0M1QkFCRTA5NDRDIiwic3BvbnNvcl9pZCI6IjFCQzUyN0QzRDA5OTg1Q0YiLCJ1c2VyX2FnZW50IjoiUHNpcGhvbi1Qc2lDYXNoLVdpbmRvd3MiLCJ2IjoxfSwidGltZXN0YW1wIjoiMjAyNC0xMS0xOFQxMzo0NTozNi4xNzZaIiwidG9rZW5zIjpudWxsLCJ2IjoxfQ
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1248
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1248 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe

    Filesize

    547KB

    MD5

    cf6c595d3e5e9667667af096762fd9c4

    SHA1

    9bb44da8d7f6457099cb56e4f7d1026963dce7ce

    SHA256

    593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d

    SHA512

    ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    f2ccf37c8a3d8e334c9413429e2bfe3f

    SHA1

    94c814215e11b1625073136420f6827a94279b43

    SHA256

    38956aacdcc101d9cd24674cdeb7064a6f3cc0b8e1311de08a124ce8a4436873

    SHA512

    a284a69bdb6d6d92a3c0227cf282b03ef5abeaa4dbca5cdb4e9fed20f3f1f35e3a4235a57da2994e4918b57e334465ebccb2161b3b75c468114d7586dcbc63b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    b8a33bf638fe8565e1f4e4c07824e792

    SHA1

    5608e061d0f9106f00207e9732b8cd71d9c8b003

    SHA256

    309ae91e157273199be9406218f7aa2c4812a0ef8540fe73ed7065df0492085b

    SHA512

    0ac3121bf158371f1f9595e28f39f782e6a2e681546052b605454110117943e7a4038496c255c13207b386e189806485880ccee9b50bdb530ac04a9acaddbb31

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\anyweax\imagestore.dat

    Filesize

    15KB

    MD5

    ace3b6e59d09fe6f450aea40be691d31

    SHA1

    9b87e85d1651fc5601280a6c9c8ffc953d63da67

    SHA256

    31113f0fb6d402a077c785387f0b969f9334f36501703bc7906213b763bdde74

    SHA512

    a3a25a96744c42cf09991f08b7f6d9037134c50db70e20a4dd40e40a840bdc2bd0cda1cef60a733154b28762f3c623fcdc38da882a4577323565ef7f68804264

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8UFEBH5\favicon[1].ico

    Filesize

    14KB

    MD5

    f210fc0564ae5a5a2985b2848e75cba2

    SHA1

    29bf0540e4c291cc6c6d071ac8125cc65314fbe9

    SHA256

    d453748d5f8e5bb6c62791b97c733dba1d7dc3340bde957470285b2a7185b7ec

    SHA512

    46fac4e98cc34105d74a8a159c70d48191612f88e5ab1a7ee7276e7b2c95407d71d307509ef8b9f0aed28465688839f49b2a55da4b03f7d01b3f03c908067e8c

  • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod

    Filesize

    4B

    MD5

    5ad5cc4d26869082efd29c436b57384a

    SHA1

    693dad7d164d27329c43b1c1bff4b271013514f5

    SHA256

    c5c24f7ca1c946fa4dfd44407409c8e11ec6e41f0e1c7c45bf8381b42afb31f1

    SHA512

    36efc511a98e53031d52dacdd40292a46fe5eab0194a0e9512f778f88b84fac5aac1eebb6e281c44e40ef2ddc3cdea41df7f5a50e4024cd86c087ed909fe8629

  • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.commit

    Filesize

    115B

    MD5

    62a248db4ef6e7ea55e71745c999102c

    SHA1

    e4f70e8e30d887ffeb4ebea7f9d0aeef49c87e38

    SHA256

    04504f7d96c94bcb3caadd0cd5c33745eb72e08daaa4c0a0bfd10ce908a0d58f

    SHA512

    eb0d3f69def6d68670131f27900152b74e7922ba3278767e9da29d58c819a648e6f914decbac92634166559b318699fab12eda510b665ee13dc70d8b41be5265

  • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.commit

    Filesize

    252B

    MD5

    98e3e194b6064e3d535d492cf22491c8

    SHA1

    33195833b1bb6c0c62828ddd825e17408b8e2727

    SHA256

    b2379377c761bc2ca59f344872751bdb8e9a148c45f56826d394a9314f425907

    SHA512

    dcb0866540c6f02df57cbb8875d0d80294364f4d1f13b7538641c8cc6c21d54f66d7372e2413c3ee997d553b8a5a7657438990c3f9e5e19910c38af545b8d1bd

  • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.commit

    Filesize

    291B

    MD5

    f7189e5484e23dc8764973c46ee8725e

    SHA1

    bcf58f26a8ce05ad6875209543f4822d83803620

    SHA256

    4a198d5059b7e1f7fc306ff30b0a31e86bd4e2e1f2b85ab6b9a9cde9511e99c0

    SHA512

    fb93364a3a49c6df0fb9f7b2dd2a83c3cc46268fc003e241a19b76dca695fdd32db3f38e2da4a66fe77ae368d25c443b6ce7dd9e96d6f472caeea2172a59c736

  • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.commit

    Filesize

    276B

    MD5

    2233f4cde4cdd2c403b2fa073d9d1df0

    SHA1

    ba3dd7fc9c9383f46cf201446c694b58d1d28c4f

    SHA256

    80ff717ffedb7084d84b94ecc89092b3648fb8e5a6304ef5fcd01ca517b6e954

    SHA512

    8f57fb83fc0c372045a449a46dc45ce6095929404b528e71ac4c9acd3adcabde96b6c44e24b3d023507e4da22bfdc123f1fbe328d017dc84628b337320160b0d

  • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.commit

    Filesize

    593B

    MD5

    61b00cb4cb65ad9d4111d5de7461792d

    SHA1

    3c27bbae5ed1ed177b33f68f5670d94e80d6bbdc

    SHA256

    adcb818ee026381ccf854eb5a0a39fe6d3376b2699240beab4dadaea4f6ac833

    SHA512

    6cc15e8ac60c22026358b95e923310bd4b8aa9d9a57dcf8dc4f2b61f77596aed6199985105667bfbe79e017791425995c7d22bea4892408d711e0175cdaf85f1

  • C:\Users\Admin\AppData\Local\Psiphon3\psiphon.config

    Filesize

    17KB

    MD5

    626c259d4f21c12c4efafb0aef47b7d6

    SHA1

    332f52b7fff95b209dfee8d7279adbfeadc8b85c

    SHA256

    9aaf5435e81f5e9f9878064733e57e3beeeb32b5d8caaa4b0afabfe3c8cdd2ec

    SHA512

    f9c14d50c3c6b6032149f764fc38021abee1d010b061dea494939d3f1c7844911b2b817d845f1e0a57846e016dd748bd2feb293a2caaf4d969b5666df564368e

  • C:\Users\Admin\AppData\Local\Psiphon3\server_list.dat

    Filesize

    320KB

    MD5

    d629c4e4395d500e89c53eb9a7c4a26b

    SHA1

    056dbb9bd2a90aaff70ebb08556f16f0b144a7be

    SHA256

    af02a6ddc9c38bb071ed1d678b5a671776b9b3bd39d0d26a4c5b54d0f294a804

    SHA512

    be6180b193b4728ba3600d0bead6469008f5c89a11b48c8509a84a2513879450ae4d48b2ad7f166cdd4761f1e4be231258444d9cbe8e8b18276198e59b529db5

  • C:\Users\Admin\AppData\Local\Temp\Cab15F2.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar16DF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\dd8e7f680116afcccaa00c8cc896f7c88a0868f243cb336d867629ae2efc4b95N.exe

    Filesize

    7.9MB

    MD5

    211017096c92e42d8dc2d0a6ddcac477

    SHA1

    474fbd4c2e2e7315edf92dd67634d53c193ba6d2

    SHA256

    9c289b55f00ea5fe9e5b356410dc2f2cca9cbb0a5e5c4ddc1a979deb817c9e3d

    SHA512

    61ad5af2a851f48de57630d689b851527421807a28130d3087a616558792e730aeec03a1c77a87988e7ac8c6a7036ab4a5e79a44cd76a559c6e4eba3060eb9aa

  • \Users\Admin\AppData\Local\Temp\psiphon-tunnel-core.exe

    Filesize

    17.8MB

    MD5

    960c1f54186fbb7f07d38c9865d5a2c4

    SHA1

    9d2b5eb822f625845b097bd92b3714bdbb3d832a

    SHA256

    040e4abc1988b331fea0ea208df38032d065ac65177209c5ad19b5bf082c62fa

    SHA512

    e0ab2243b2d7753439e50561b685f7de84d651623598cf28f160a5b37d63b1664594ad84e48db54f15395bf26c2684eeffa055381312aa469330df5397ab49a1

  • memory/1972-201-0x00000000009E0000-0x0000000002186000-memory.dmp

    Filesize

    23.6MB

  • memory/1972-547-0x00000000009E0000-0x0000000002186000-memory.dmp

    Filesize

    23.6MB

  • memory/1972-16-0x00000000009E0000-0x0000000002186000-memory.dmp

    Filesize

    23.6MB

  • memory/2308-277-0x0000000002EE0000-0x0000000004686000-memory.dmp

    Filesize

    23.6MB

  • memory/2308-200-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2308-546-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2308-549-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2308-217-0x0000000002EE0000-0x0000000004686000-memory.dmp

    Filesize

    23.6MB

  • memory/2308-17-0x0000000002EE0000-0x0000000004686000-memory.dmp

    Filesize

    23.6MB

  • memory/2308-14-0x0000000002EE0000-0x0000000004686000-memory.dmp

    Filesize

    23.6MB