Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2024 22:09

General

  • Target

    49a0151f4124b518d9f3ab909e5479da55f18ddc44b23dbe266a44d500857fd6.exe

  • Size

    90KB

  • MD5

    577a5a19c5016f4a1866588ed115da34

  • SHA1

    a7e9197c8830b9115ed369dce6f14f5b50b1b088

  • SHA256

    49a0151f4124b518d9f3ab909e5479da55f18ddc44b23dbe266a44d500857fd6

  • SHA512

    e9b05a5c033f7078e21af312ddf9881ffaffd44a7cafed450a2bedf5bbc354ff644175af933912da36f1bb3361154fb78c7a3d0a53771df6035c3e14f1199a67

  • SSDEEP

    1536:JxqjQ+P04wsmJCUnEMRH38+cKJ29EHZk4UR80jdqK7ciZ83F3Mw:sr85CUnEeH38jKJ29G1URNJciZ81X

Malware Config

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49a0151f4124b518d9f3ab909e5479da55f18ddc44b23dbe266a44d500857fd6.exe
    "C:\Users\Admin\AppData\Local\Temp\49a0151f4124b518d9f3ab909e5479da55f18ddc44b23dbe266a44d500857fd6.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Users\Admin\AppData\Local\Temp\3582-490\49a0151f4124b518d9f3ab909e5479da55f18ddc44b23dbe266a44d500857fd6.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\49a0151f4124b518d9f3ab909e5479da55f18ddc44b23dbe266a44d500857fd6.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1464
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 884
        3⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:4468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Users\Admin\AppData\Local\Temp\3582-490\49a0151f4124b518d9f3ab909e5479da55f18ddc44b23dbe266a44d500857fd6.exe

    Filesize

    50KB

    MD5

    f46a2cf2051b7905ff585626efe006a8

    SHA1

    cd1e66b515277ef5ae984eb53f1248e24d2ca43c

    SHA256

    2bbc0d89aacb9ec5bdd5fd173aea4f5993c90596c15512a8bb0db2d8f85d1d7d

    SHA512

    4f3da5a0fa6c761f6e61d270f8f663a46605c696010337015a3709d38e2ab50651c7eefff30b6760d4617c742975751e0016160cd11b57e8ed92e3e4577a084d

  • memory/640-105-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/640-106-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/640-108-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1464-12-0x0000000074202000-0x0000000074203000-memory.dmp

    Filesize

    4KB

  • memory/1464-13-0x0000000074200000-0x00000000747B1000-memory.dmp

    Filesize

    5.7MB

  • memory/1464-14-0x0000000074200000-0x00000000747B1000-memory.dmp

    Filesize

    5.7MB

  • memory/1464-21-0x0000000074200000-0x00000000747B1000-memory.dmp

    Filesize

    5.7MB