Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/11/2024, 07:36

General

  • Target

    3e044f99952802a1c2a932dea88b577979e8edb3fd6d42561335355754181448N.exe

  • Size

    90KB

  • MD5

    705b2534b4128d4c3a9dbf6233160dd0

  • SHA1

    0dd5ed3513522938059367e30acdd0a86737ee74

  • SHA256

    3e044f99952802a1c2a932dea88b577979e8edb3fd6d42561335355754181448

  • SHA512

    e4103ae738d62e1a3a9cafb6953dde7774b91f4830d6f6731c568eb7621ffe8b10ad0b4f13fed5ee9171a83b8775d434150d78929b761d11a5c3f9e012ae4127

  • SSDEEP

    1536:JxqjQ+P04wsmJCfrbUFhf+q8RYLFCE7YekcbQSn3n:sr85CfrIyYBD

Malware Config

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e044f99952802a1c2a932dea88b577979e8edb3fd6d42561335355754181448N.exe
    "C:\Users\Admin\AppData\Local\Temp\3e044f99952802a1c2a932dea88b577979e8edb3fd6d42561335355754181448N.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    PID:3460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe

    Filesize

    2.4MB

    MD5

    8ffc3bdf4a1903d9e28b99d1643fc9c7

    SHA1

    919ba8594db0ae245a8abd80f9f3698826fc6fe5

    SHA256

    8268d3fefe8ca96a25a73690d14bacf644170ab5e9e70d2f8eeb350a4c83f9f6

    SHA512

    0b94ead97374d74eaee87e7614ddd3911d2cf66d4c49abbfd06b02c03e5dd56fd00993b4947e8a4bcd9d891fa39cab18cc6b61efc7d0812e91eb3aea9cd1a427

  • C:\Users\Admin\AppData\Local\Temp\3582-490\3e044f99952802a1c2a932dea88b577979e8edb3fd6d42561335355754181448N.exe

    Filesize

    50KB

    MD5

    c003019f9a87192399ab26afbe9db4e3

    SHA1

    1b34780d05b688d91574353d8cea69f4c36f5ea9

    SHA256

    5ea5411748e4bf022a986a6980ad1578e91bda5903d0d515aaa1de97f18cf518

    SHA512

    56c7c9ec3c4c3ded070bd645283ce36535c19b0b6d1d8e3059a51bfa920521a6c2fe5c1f0ab967e231a68e50c85b1643f7d8506886c17ceac2dce5f6218f282e

  • memory/3460-93-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3460-94-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3460-96-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB