Analysis

  • max time kernel
    95s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 02:29

General

  • Target

    b100bf975efbb7fece7c9970c44cd1bd3707eda78f34de114198a4524f84ac7a.exe

  • Size

    8.8MB

  • MD5

    1478950da74dbb0ee28cb2ea02c849bf

  • SHA1

    9d7e3f7794f65ae05bef48e614e42de9e200f2d8

  • SHA256

    b100bf975efbb7fece7c9970c44cd1bd3707eda78f34de114198a4524f84ac7a

  • SHA512

    97f056b2f81e664b61035f2f51dee892264cdb3e7623e2a375ef8cb4a8ef18dc3f191d3bc22ddfc3204589abe6b4d7d95a8feae993324a39b3f79095ed5f8ac3

  • SSDEEP

    196608:9whtquphsJkphIsD7YekrpPPj9JEP7j24ntQCz1m0t:9whtvpskphIsD7Ye4pnjnETPSCpm+

Malware Config

Signatures

  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b100bf975efbb7fece7c9970c44cd1bd3707eda78f34de114198a4524f84ac7a.exe
    "C:\Users\Admin\AppData\Local\Temp\b100bf975efbb7fece7c9970c44cd1bd3707eda78f34de114198a4524f84ac7a.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4552
    • C:\Users\Admin\AppData\Local\Temp\3582-490\b100bf975efbb7fece7c9970c44cd1bd3707eda78f34de114198a4524f84ac7a.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\b100bf975efbb7fece7c9970c44cd1bd3707eda78f34de114198a4524f84ac7a.exe"
      2⤵
      • Executes dropped EXE
      PID:3252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    c324431305861add7ddf9186a9221bd9

    SHA1

    61855e1f81606f3cb336f842a1cdd697c7a40912

    SHA256

    f331213f5bcfed2a6dba0dc0c97b5b309c00b013dc47bdb4726d51cf2c274570

    SHA512

    4b532b2bf6eaf3f618bb08b0a6f7af88ce23d76df146b2d007d5a8224ea0463525a86aacc996468cd3a513404aa66cbc516ed27aa9bd142e46492b160d411dc8

  • C:\Users\Admin\AppData\Local\Temp\3582-490\b100bf975efbb7fece7c9970c44cd1bd3707eda78f34de114198a4524f84ac7a.exe

    Filesize

    8.7MB

    MD5

    cdcf4d6af94f807c26b0f3de4ddeeee3

    SHA1

    7f2953db327eb5004eb2a98dddf6748978867eab

    SHA256

    b08332d53d66e8ea0789dc1cb3165c3fdd84bbf4169049163f32137221e78d57

    SHA512

    464514e6acff56c8a193b6635c5559a861e73e1680923fd6de12cbcffbe1d118d9e715db350edbe992f1a4bc899359f4b4f7a7ee729f7ddf535439b3d8e87fc5

  • memory/4552-94-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4552-95-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4552-97-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB