Analysis

  • max time kernel
    94s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 23:36

General

  • Target

    372d74c6f7c97faaaebc8c0a8b6c660e8031e49ed907231d5f7d391a1368cab9.exe

  • Size

    436KB

  • MD5

    3c852b8092fdca8d914d441cbf41cbdf

  • SHA1

    3ff858c3769f46968f30bbedf651ab971874d2bb

  • SHA256

    372d74c6f7c97faaaebc8c0a8b6c660e8031e49ed907231d5f7d391a1368cab9

  • SHA512

    a0269158cfc8449158b72d7b9c81d3714fc938492865fc116d2dbeffac270708ba328bf45971952c3a9a5f116fd545fcf913c90affc9f844ffa3101a39e48d79

  • SSDEEP

    6144:k9scpQvYJvKPSwv2nPEuJ1fHbIop44Sm5FpxyN90vE6:YpQQJvKPSwvY1fHTHy90V

Malware Config

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\372d74c6f7c97faaaebc8c0a8b6c660e8031e49ed907231d5f7d391a1368cab9.exe
    "C:\Users\Admin\AppData\Local\Temp\372d74c6f7c97faaaebc8c0a8b6c660e8031e49ed907231d5f7d391a1368cab9.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    PID:1888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Users\Admin\AppData\Local\Temp\3582-490\372d74c6f7c97faaaebc8c0a8b6c660e8031e49ed907231d5f7d391a1368cab9.exe

    Filesize

    396KB

    MD5

    c746dad14c3ec4b97361be8120f507c0

    SHA1

    26c68c0af608d8674d79a824ec6a5694be357e91

    SHA256

    06f31747caf8836fbad624c3f08ef7e59223364a5832d7b5996889f5c5045e30

    SHA512

    aa2b7a2dfd961c57f32b3783b2b9095bfc6f2f0cf0b1b0de3ccaedef64faefec55510dab5abe95305cb273399b72287f672b222ff19faf986d6ee65f903d5fcf

  • memory/1888-93-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1888-94-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1888-96-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB