Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12-12-2024 16:21

General

  • Target

    1a5a11f3-dc1f-42ad-b31d-186066997d0d (1).exe

  • Size

    2.0MB

  • MD5

    5fbca2e5cb2da5756c2b22327de906ed

  • SHA1

    3f00d1375dfe492ba6ae4335a94ed6d13e5b9171

  • SHA256

    3382e972bc510ae3bc77db416fb07fbc80f5d56cf4a7f177a6608427fafed8f4

  • SHA512

    14fcfff0c8af8a4bf67c3897cc33faca268f3401b0fec42f06676179cae03926265a64b6abc0ec4a0536eee6475650e7c0489cbca564eaf285fcf993bd9a6ced

  • SSDEEP

    12288:BJIJhk7lHfbtcidl5TYyUyQc8uHgo2aYdwodR:BJ2hAlHjjnSDuAxasn

Malware Config

Signatures

  • Detect Neshta payload 5 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Drops file in Drivers directory 1 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a5a11f3-dc1f-42ad-b31d-186066997d0d (1).exe
    "C:\Users\Admin\AppData\Local\Temp\1a5a11f3-dc1f-42ad-b31d-186066997d0d (1).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3952
    • C:\Users\Admin\AppData\Roaming\sysapp.exe
      "C:\Users\Admin\AppData\Roaming\sysapp.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3380
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch
        3⤵
        • Drops file in Drivers directory
        • Suspicious behavior: EnumeratesProcesses
        PID:3400
    • C:\Users\Admin\AppData\Local\Temp\PayChecker.exe
      "PayChecker.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:916
      • C:\Users\Admin\AppData\Local\Temp\3582-490\PayChecker.exe
        "C:\Users\Admin\AppData\Local\Temp\3582-490\PayChecker.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE

    Filesize

    328KB

    MD5

    39c8a4c2c3984b64b701b85cb724533b

    SHA1

    c911f4c4070dfe9a35d9adcb7de6e6fb1482ce00

    SHA256

    888a1dd0033e5d758a4e731e3e55357de866e80d03b1b194375f714e1fd4351d

    SHA512

    f42ca2962fe60cff1a13dea8b81ff0647b317c785ee4f5159c38487c34d33aecba8478757047d31ab2ee893fbdcb91a21655353456ba6a018fc71b2278db4db2

  • C:\Users\Admin\AppData\Local\Temp\3582-490\PayChecker.exe

    Filesize

    1.5MB

    MD5

    7980ae935f0bbc9740653efb6a16d380

    SHA1

    a0b9a1e3baa0c168252cd77972c6bbb3d9a97389

    SHA256

    420028c19b27489ec1c57159c4611b28a78b8c4183cbaa0bcba90d28448890ba

    SHA512

    3389946df7d4d2cc6577be2dfd5a50d45f053d736d0b725b60acbf09ca5dbd9ab28056d1ccc2abac35ddbfe85f1b314cdb1d5467c0c616dc99e572e948b257e2

  • C:\Users\Admin\AppData\Local\Temp\PayChecker.exe

    Filesize

    1.6MB

    MD5

    b2cc36f6b742d6700279d1766d30b9e3

    SHA1

    1cad4796fa844fc071a4bf49d54fee479df0e0db

    SHA256

    07d7deaf6dd32d9fff4ceea1a180824c28b4d10f3f4ff12520476d1e184723df

    SHA512

    64d2aada159538c5a6f370ea94903a4730aa953873360f99049d6046ffdb2f5657c17a2c4760aeffda4cb8076cad31f5f6bc8d04401bbbf5b299bb62199172bc

  • C:\Users\Admin\AppData\Roaming\sysapp.exe

    Filesize

    278KB

    MD5

    8a3a576d178ac1abbd9e1c58d00d4afd

    SHA1

    28ee0f532ab1df4a9a589aa66c6537bebb32751e

    SHA256

    2786dfc70c53aaef43bfe38177962278530c1593cb3e0c096e88facec0e2f803

    SHA512

    a641973d0f67c9c4d65a6429b83bbc29a011bdc9ac4f4d57bb88e2dff6ecbbb1db91bb5d280098897f24766f0313004730273d87cbbeb2986caed8d8ca55aa1e

  • C:\Windows\System32\drivers\etc\hosts

    Filesize

    1KB

    MD5

    7aed163a7c554d2c86de68d11a55d030

    SHA1

    8416928fbe1aa0ab181a6d6abe1e30ef82ea25ea

    SHA256

    b5f1a672f239b65afa1f8e8a0b7da5f793e9ff6f3f8aff2818c6c635f0b360b9

    SHA512

    6dc00db724ce2567754a79fc3f5e0e2133abad323ced5beed053fd51f93227c3e263e008ada5f853cf47a27080a66ef921c2c210be7386d589383fcb984b3cfd

  • memory/916-189-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/916-191-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/916-194-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2212-77-0x0000000000170000-0x00000000002F8000-memory.dmp

    Filesize

    1.5MB

  • memory/2212-78-0x0000000005400000-0x00000000059A6000-memory.dmp

    Filesize

    5.6MB

  • memory/2212-79-0x0000000004D90000-0x0000000004E22000-memory.dmp

    Filesize

    584KB

  • memory/2212-80-0x0000000004E50000-0x0000000004E5A000-memory.dmp

    Filesize

    40KB

  • memory/2212-81-0x0000000004FD0000-0x0000000005036000-memory.dmp

    Filesize

    408KB

  • memory/3400-190-0x00007FF70D5F0000-0x00007FF70D63C000-memory.dmp

    Filesize

    304KB