Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2024 00:23

General

  • Target

    4b1b0ca72faed6058ba707e56d47616ffbe07e65be804842da6386b6ffa17dd8.exe

  • Size

    2.2MB

  • MD5

    fb2ea8ae73c4d488d24cb61cefa31a38

  • SHA1

    433192b10b98acfb432417f39af5d4bf8fa7e257

  • SHA256

    4b1b0ca72faed6058ba707e56d47616ffbe07e65be804842da6386b6ffa17dd8

  • SHA512

    87143a720fe8d47aa4a59b1e76e417db7fbea49acdf3381c1a8131830b8fc7b479536fa5509494a42109ab4b8c9dbac9d36b4260618c38e3c4fd98912c08ef73

  • SSDEEP

    49152:Cf9+HnchpRjHxOjFj4YNmJs08wjpDgAMsU58vXZTLjp:CVlhptWFjis08wjpDdU5UJF

Malware Config

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b1b0ca72faed6058ba707e56d47616ffbe07e65be804842da6386b6ffa17dd8.exe
    "C:\Users\Admin\AppData\Local\Temp\4b1b0ca72faed6058ba707e56d47616ffbe07e65be804842da6386b6ffa17dd8.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    PID:4336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Users\Admin\AppData\Local\Temp\3582-490\4b1b0ca72faed6058ba707e56d47616ffbe07e65be804842da6386b6ffa17dd8.exe

    Filesize

    2.2MB

    MD5

    d148b13b37cacd13a0acd1dfd13661d7

    SHA1

    50884432d832d7993cbe4c420fd10edd7bea1e50

    SHA256

    550165276894f822f0c86eec5723d1db1f0da6e555f3cf93caee07caab5d485b

    SHA512

    2a300b8d84358024cdae5d3a96cf808090b04dafc58fc622414b29697c15606d2ce9847a595c00988790163df11c4c891701fae32406ba37cfb3e7850bdc8b42

  • memory/4336-93-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4336-94-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4336-96-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB