Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2024, 15:00 UTC

General

  • Target

    b36ee72fbe2f53748b79053cb050d9049d80468359fb14bf87c975b41946a5a4.exe

  • Size

    904KB

  • MD5

    9837c7f6aad4e89e4cda69686adb1fbd

  • SHA1

    ebc8f12b4621f05fc5a9ed5d4bbb1988651b2aa7

  • SHA256

    b36ee72fbe2f53748b79053cb050d9049d80468359fb14bf87c975b41946a5a4

  • SHA512

    ee9feafae7f83b72c1a125d1f8df3a9fbd6aa541a8cba73d7669e2e7b8d9055387a09775ccc545318921e6cdd739875dc253d298c2f2d37905bd2624c6655f05

  • SSDEEP

    12288:SN2M5DeK+U7X+nQOOOId4ZSuq777rg8MrEeWCt/II+jkrWW:42HJn6qE777rgltA3jkrWW

Malware Config

Signatures

  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b36ee72fbe2f53748b79053cb050d9049d80468359fb14bf87c975b41946a5a4.exe
    "C:\Users\Admin\AppData\Local\Temp\b36ee72fbe2f53748b79053cb050d9049d80468359fb14bf87c975b41946a5a4.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    PID:3548

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    133.211.185.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.211.185.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    71.209.201.84.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    71.209.201.84.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    133.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    200.163.202.172.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    200.163.202.172.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    18.31.95.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    18.31.95.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    73.190.18.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    73.190.18.2.in-addr.arpa
    IN PTR
    Response
    73.190.18.2.in-addr.arpa
    IN PTR
    a2-18-190-73deploystaticakamaitechnologiescom
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    19.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    19.229.111.52.in-addr.arpa
    IN PTR
    Response
No results found
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    133.211.185.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    133.211.185.52.in-addr.arpa

  • 8.8.8.8:53
    71.209.201.84.in-addr.arpa
    dns
    72 B
    132 B
    1
    1

    DNS Request

    71.209.201.84.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    133.32.126.40.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    133.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    200.163.202.172.in-addr.arpa
    dns
    74 B
    160 B
    1
    1

    DNS Request

    200.163.202.172.in-addr.arpa

  • 8.8.8.8:53
    18.31.95.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    18.31.95.13.in-addr.arpa

  • 8.8.8.8:53
    73.190.18.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    73.190.18.2.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    148 B
    128 B
    2
    1

    DNS Request

    172.210.232.199.in-addr.arpa

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    19.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    19.229.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    c324431305861add7ddf9186a9221bd9

    SHA1

    61855e1f81606f3cb336f842a1cdd697c7a40912

    SHA256

    f331213f5bcfed2a6dba0dc0c97b5b309c00b013dc47bdb4726d51cf2c274570

    SHA512

    4b532b2bf6eaf3f618bb08b0a6f7af88ce23d76df146b2d007d5a8224ea0463525a86aacc996468cd3a513404aa66cbc516ed27aa9bd142e46492b160d411dc8

  • C:\Users\Admin\AppData\Local\Temp\3582-490\b36ee72fbe2f53748b79053cb050d9049d80468359fb14bf87c975b41946a5a4.exe

    Filesize

    864KB

    MD5

    8a4685a0cf1146ae2af27aff1ccaa2c9

    SHA1

    bd69b5f941e6b75585c048ebd21cf438e136289c

    SHA256

    06f4f0be8a7c913d7fc5e51f7b718127d2cc4602eeab62dc1d5b6fe601572600

    SHA512

    50f166d9a53e633424618d1f54d8bcab088a255b10df3cb67128c3ca23ce14e318fedce947b27a508884cf740c211388ff777e62045aad8c9579d8f34b8b2061

  • memory/3548-93-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3548-94-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3548-96-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.