Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2024 20:51

General

  • Target

    massexe/winpcap-4.13.exe

  • Size

    464KB

  • MD5

    ce5cf0bb6b5d6da269289007b17652e3

  • SHA1

    9d81fd8d4b20dc7d68e6783ff872ff577dbebd2c

  • SHA256

    4ac6a84eda7b4b474f00118733da6e7f33c35f009a554a6f78d4464cb7101192

  • SHA512

    c503821a71ef2e4861d6009fa48a1b69ff88e8bfc6ff2244f652e2dca60004c80e4cc6b1cb22f67ccd43a26dc037d1c7fcce1ff031ecc16820dbc96675857d77

  • SSDEEP

    6144:k9X3dmkMIdQQkpxYLcP+k471Xr4bjMxiW+D/xqfF3o2KCzDunki8m/VlidXTj2EF:W34kDdc8L4bQA5qt3CxnkLwlQFPcOLsk

Malware Config

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies registry class 1 IoCs
  • Runs net.exe
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\massexe\winpcap-4.13.exe
    "C:\Users\Admin\AppData\Local\Temp\massexe\winpcap-4.13.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3276
    • C:\Users\Admin\AppData\Local\Temp\3582-490\winpcap-4.13.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\winpcap-4.13.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3628
      • C:\Windows\SysWOW64\net.exe
        net stop npf
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3664
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop npf
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Users\Admin\AppData\Local\Temp\3582-490\winpcap-4.13.exe

    Filesize

    423KB

    MD5

    ae26452c8b3d97ef2037521ac0dd3a8b

    SHA1

    3ad99ec2bf6cc4f947bb09be627c91f82a898aa8

    SHA256

    f28156a96be558dfb83a3d935223a127816ad124b94f92c499400c38078ad842

    SHA512

    f5012a9600542b46eca137f41d58d6a6d3071aa36ca2b4c0f0119639cdf051c0a0e597c674583c4ec5753f8368ca121282acbf084930d2b1f30671f2032448d9

  • C:\Users\Admin\AppData\Local\Temp\nsu7958.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    79327201915b7cf3ba0c5d1a143aa925

    SHA1

    185b6f5520b1c39d3e7d9d91ed099698fac46d92

    SHA256

    1edf8dc7b6ef67e7cf68f6b07f38be5b336b5e6b2d1d5500cdb3e121b8381394

    SHA512

    c51086b7e039c83abb727a33b7f1ccac4fa999373b0423ac4b253e87195a5515d29e98ea2ed64f30406a14db4bf94422d34e6c9db8fc80be5c4e3fc77fd0207e

  • C:\Users\Admin\AppData\Local\Temp\nsu7958.tmp\System.dll

    Filesize

    10KB

    MD5

    5c22bbf6730572e50eed4108af6081df

    SHA1

    8a13196f4d47ee7de2e35509058db954db10c72a

    SHA256

    3198d832c222a9907d3d5822116c944fd1c6670a263b775212104a9ecf88beec

    SHA512

    264b194a50cb523f5758569d918b5f60cb2959c4d091ae6712efc95644700a7bc2bb440a22acdf2285b754691a9cc04633fcc7c5b354dae75c7260d6b27ebb18

  • C:\Users\Admin\AppData\Local\Temp\nsu7958.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    6d376db8c870c88759ab0fac0f91bde4

    SHA1

    c1df9264442c84858735550af99c1af55204dc31

    SHA256

    7994b5dbbd63253b8e11ee5d4aa34c61852d5f86a9c4a35ef421de2c26c80cd9

    SHA512

    ed37d2b97e44c5f2e3bb63dcae3b7eafff0a00ea6d315b6764b322d4dd68ec5d3f9c8a5b8e23cf585612c8b6fdd5bd6eb03e13237c445f990eca86a59579fd23

  • C:\Users\Admin\AppData\Local\Temp\nsu7958.tmp\options.ini

    Filesize

    319B

    MD5

    9e7d5f869f26f7a3906804f92b247c36

    SHA1

    04aa384d2d9b89cd66f82137ff7f3dc07594424f

    SHA256

    78037d4b8feee17ae048abd11f718ab407d6be0032c494cef2badbe12dfd053f

    SHA512

    8f54e52a2d74ba3f22d7baa315181674f93f6579a0d04dd4f33ca11ba809fbffac74125adfcccc4c6a005841e6e5e811f34f880ab956c71855e78e50b458c247

  • memory/3276-120-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3276-170-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3276-172-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB