Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 17:06

General

  • Target

    0da75d66155612de7e7009c4d14cbd85eafb2901894eacfc7f01c92b84801398.exe

  • Size

    93KB

  • MD5

    151812aa79075ae2f2ccb827f57c65a1

  • SHA1

    0c0e3f24d80bc9dfe2eb962f8c15c97f37d0509b

  • SHA256

    0da75d66155612de7e7009c4d14cbd85eafb2901894eacfc7f01c92b84801398

  • SHA512

    4380a8d978635db65d4db575ef504407e410d202026f9d3b34d06497264016d9ed82409b15a1972b0952d6ccf724046aa2c1f068e68513f6aef731cc344a3316

  • SSDEEP

    1536:DxqjQ+P04wsmJCqvxIRpgU27qgQWhEEJU3SxNnWh:6r85CqvxIAUqZh8CHnWh

Malware Config

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0da75d66155612de7e7009c4d14cbd85eafb2901894eacfc7f01c92b84801398.exe
    "C:\Users\Admin\AppData\Local\Temp\0da75d66155612de7e7009c4d14cbd85eafb2901894eacfc7f01c92b84801398.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    PID:3996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    407f68dbee370d253f7a469d234a0984

    SHA1

    2d192e02c6489be8467f1db1899ef0cc536807dd

    SHA256

    6f2fe8be1d704d3762bad0a0321927f35dfb27916b3107baf4663665cea5da72

    SHA512

    a4606f83cff67dfbee4a72f798a2b214aecb5ed1e359b271192d5f5929bbf7e759b64bdb4303be8a50fce41f9a76be6e19004d12689b798666fc09061d88afa7

  • C:\Users\Admin\AppData\Local\Temp\3582-490\0da75d66155612de7e7009c4d14cbd85eafb2901894eacfc7f01c92b84801398.exe

    Filesize

    52KB

    MD5

    4f64ee199077e7538490181e864cc03f

    SHA1

    3b9e82621b57f8c6ee76927c21fa4ac394b21224

    SHA256

    17ebdae4125850422ea440326a2d8e7a9e1eca8dbf136f1793ae73561a6f4d74

    SHA512

    5025481a8b309dbc15104e2096fbdf0ca7b19a26c036e04b5711f12bdecaeff28f90dbb73c9a55a84e5f685585ae54e2552783f51261af5bd177929551818c0d

  • memory/3996-93-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3996-94-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3996-96-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB