Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 22:57

General

  • Target

    58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe

  • Size

    197KB

  • MD5

    e905cee0e3d0062d54c79e5a6d273790

  • SHA1

    f3f503694471c653a7ef1509fa9dced980d6f7e3

  • SHA256

    58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd

  • SHA512

    1b370b50f41c79cb118e709d8280bd4a1fba99506ba66aa97fbfd26585d1b09f8ddfcda53a05f587fdeaf0d73f742ed287f882b6e0ce92cfddc68e4e82fcdd88

  • SSDEEP

    3072:zr8WDrCaxEufVU0TbTyDDalRC+utxSGKVqoCl/Ygi:PubufVUNDaatVKsLqL

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe
    "C:\Users\Admin\AppData\Local\Temp\58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\3582-490\58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3152
      • \??\c:\users\admin\appdata\local\temp\3582-490\58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 
        c:\users\admin\appdata\local\temp\3582-490\58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2720
      • C:\Windows\Resources\Themes\icsys.icn.exe
        C:\Windows\Resources\Themes\icsys.icn.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3748
        • \??\c:\windows\resources\themes\explorer.exe
          c:\windows\resources\themes\explorer.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3240
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2016
            • \??\c:\windows\resources\svchost.exe
              c:\windows\resources\svchost.exe
              6⤵
              • Modifies visiblity of hidden/system files in Explorer
              • Executes dropped EXE
              • Adds Run key to start application
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4600
              • \??\c:\windows\resources\spoolsv.exe
                c:\windows\resources\spoolsv.exe PR
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe

    Filesize

    2.4MB

    MD5

    d9e8a1fa55faebd36ed2342fedefbedd

    SHA1

    c25cc7f0035488de9c5df0121a09b5100e1c28e9

    SHA256

    bd7696911d75a9a35dfd125b24cb95003f1e9598592df47fa23a2568986a4a9a

    SHA512

    134644c68bd04536e9ea0a5da6e334d36b1ce8012a061fa6dabd31f85c16a1ac9eee8c40fee3d55f25c4d4edf0672de8ce204e344c800361cbcff092c09d7a33

  • C:\Users\Admin\AppData\Local\Temp\3582-490\58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe

    Filesize

    156KB

    MD5

    e9c9fd878f6e3b3f2a956e899df1beaa

    SHA1

    411ccaa277225690b152f7bc71469f31afb16070

    SHA256

    1f6c5e338a5ae2b84bb6d144d36e0c0448555cc8ef731b1edb0b4faea0c54480

    SHA512

    9e0eb72b3ceae422e3ea6557d2b98bf12f9ed81d2262c39bc254f377cef22f6972a1b0eea43d470657d6d773790fde722e0d4d882ece2b4ec837ded3c2c1f864

  • C:\Users\Admin\AppData\Local\Temp\3582-490\58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 

    Filesize

    21KB

    MD5

    d8c024f3381d37370b4f1aa27b5d05dc

    SHA1

    85c0e04905b969fdbd65f734452a946873727b69

    SHA256

    6fa3b17bebdb38a8526761eb788665cafec2501d793b87b87e9f7c96d583a6da

    SHA512

    1de235180924a6230ec1a49c646968d7540f13ca9525c52aeca8a2ce7cfd6b876514bf8ac55ecefea1ecdd236120cfd2ff4ef7f59e9b75e5758add401ed44281

  • C:\Windows\Resources\Themes\icsys.icn.exe

    Filesize

    135KB

    MD5

    d0be3c1709817758b35c1b4adfcf35e2

    SHA1

    c37634da51c6cba8adf25aaff44419df61e81014

    SHA256

    32fd12176f5e0a3e62967750df78f3353bff31231b63dadd17ff914aa6070de3

    SHA512

    147688ff497af6a4b474268d89015bf7fc5723b9841e9226eb2dc8739ce4f68a05dd745888fd61a62473c478dc0fee5967240b2c9b2bdd279c38db1db4c1eb34

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    4a89b22166fc3861c1300ec19b828b33

    SHA1

    a1cb43195174491de45f16a65656d17d72958321

    SHA256

    372ca7561545989e126dda3491bfde4c4de4975b5105fea118eac6ab1b77e3d8

    SHA512

    99884751a3c6bade71081ec0cd6f228c8df1474e58a2b72ed322f268fea6ef94a2795ac07e7ac38d293acb97e43dd4b56537a49c6334a4830d1a8080af99df01

  • \??\c:\windows\resources\svchost.exe

    Filesize

    135KB

    MD5

    44b24e3fefc438a4bc9564c45f785e01

    SHA1

    dddbcfd3cac92a26227faae60cf5f4dc9428e0be

    SHA256

    f8494169732105ad93d3022eb41bb3780697ae4a677eb54e740199458a6e1ab7

    SHA512

    4172a1398f956a859a2bb39c14e51e1f397ec0af2cf9f715a1b9d58c07786a7efabdaab59cc6d7d3daf88fbc2565599e69525ae72082c4e00d74a09b2271e464

  • \??\c:\windows\resources\themes\explorer.exe

    Filesize

    135KB

    MD5

    469a7ced6b13390bc8cbebecdac0221d

    SHA1

    774f7a9d341bfff1908bfaaa26ec951b22cd263a

    SHA256

    65f1014ec3d62dabfe98cca64961c7515439d53792ff531aa91edb18e6068811

    SHA512

    b836ef4ed1517ec142cdea9cd6d75fb9a36efe1c94fcb818db15b73c5075c0bfd24732ac09b798f5a0db4cf00a39dad7a3b5a4b488fee4a11727f0ccd10a6d9d

  • memory/2016-58-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3020-144-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3020-145-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3020-146-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3020-148-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3152-60-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3152-12-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3240-149-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3748-59-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4116-56-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4116-57-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4600-150-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB