Analysis

  • max time kernel
    111s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 09:08

General

  • Target

    212233c1038ede44ca3833081b8e6a4e75c656abe884aac412bef2b5b2dd51a6N.exe

  • Size

    880KB

  • MD5

    0ae61fbe5369cf1bff062e29986d2920

  • SHA1

    12bb8851d08c99ba0f87598422d5cb681aa9b415

  • SHA256

    212233c1038ede44ca3833081b8e6a4e75c656abe884aac412bef2b5b2dd51a6

  • SHA512

    c35924633f285e554d98ebc5d6b5bb381e3831299837cdd62a18b5df479a725991989ebc0fb44080f0f45430b8986090df46cafb282ed7869e712eccf2b99b63

  • SSDEEP

    24576:YxesON826V84ViythW8GTFThS6qFHAOet3GstG2ReuVyh:Yxe826lViybCZiEE/h

Malware Config

Signatures

  • Detect Neshta payload 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\212233c1038ede44ca3833081b8e6a4e75c656abe884aac412bef2b5b2dd51a6N.exe
    "C:\Users\Admin\AppData\Local\Temp\212233c1038ede44ca3833081b8e6a4e75c656abe884aac412bef2b5b2dd51a6N.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:212
    • C:\Users\Admin\AppData\Local\Temp\3582-490\212233c1038ede44ca3833081b8e6a4e75c656abe884aac412bef2b5b2dd51a6N.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\212233c1038ede44ca3833081b8e6a4e75c656abe884aac412bef2b5b2dd51a6N.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:748
      • C:\Users\Admin\AppData\Local\Temp\is-FB2UC.tmp\212233c1038ede44ca3833081b8e6a4e75c656abe884aac412bef2b5b2dd51a6N.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-FB2UC.tmp\212233c1038ede44ca3833081b8e6a4e75c656abe884aac412bef2b5b2dd51a6N.tmp" /SL5="$F0054,468623,97792,C:\Users\Admin\AppData\Local\Temp\3582-490\212233c1038ede44ca3833081b8e6a4e75c656abe884aac412bef2b5b2dd51a6N.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2076
        • C:\Windows\system32\cmd.exe
          "C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-QEFH6.tmp\Win_ver.bat""
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4936
          • C:\Windows\system32\find.exe
            find /i "6.2.9200"
            5⤵
              PID:1840
            • C:\Windows\system32\find.exe
              find /i "6.3.9600"
              5⤵
                PID:4900
              • C:\Windows\system32\find.exe
                find /i "10.0."
                5⤵
                  PID:3428
                • C:\Windows\system32\find.exe
                  find /i "6.1.7601"
                  5⤵
                    PID:2412
                  • C:\Windows\system32\find.exe
                    find /i "10.0.14393"
                    5⤵
                      PID:4400
                    • C:\Windows\system32\find.exe
                      find /i "10.0.15063"
                      5⤵
                        PID:4520
                      • C:\Windows\system32\find.exe
                        find /i "10.0.16299"
                        5⤵
                          PID:2696
                        • C:\Windows\system32\find.exe
                          find /i "10.0.17134"
                          5⤵
                            PID:4064
                          • C:\Windows\system32\find.exe
                            find /i "10.0.17763"
                            5⤵
                              PID:808

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

                      Filesize

                      86KB

                      MD5

                      3b73078a714bf61d1c19ebc3afc0e454

                      SHA1

                      9abeabd74613a2f533e2244c9ee6f967188e4e7e

                      SHA256

                      ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

                      SHA512

                      75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

                    • C:\Users\Admin\AppData\Local\Temp\3582-490\212233c1038ede44ca3833081b8e6a4e75c656abe884aac412bef2b5b2dd51a6N.exe

                      Filesize

                      840KB

                      MD5

                      d7c6b9469a8ade82b4fcff029e9c30f7

                      SHA1

                      6266b2fa8358e55eb8957475202352f938791d04

                      SHA256

                      49ccd90828bb0908c40cd557212ceb6d1c4acdd867cb986c44148f4faea751b9

                      SHA512

                      b8c65ab2414ad06baba7e8271d6c0466abf562e6bdd4f03e31c8794f75e33200bdde12236edd12095c3251e9cc3c31df8007eb3f9cddd74baedf5c9da79bc9e4

                    • C:\Users\Admin\AppData\Local\Temp\is-FB2UC.tmp\212233c1038ede44ca3833081b8e6a4e75c656abe884aac412bef2b5b2dd51a6N.tmp

                      Filesize

                      943KB

                      MD5

                      603d510b304d2ebbc55d3cf4d049b6ff

                      SHA1

                      bd028110aa4d0179e3e04854c9279b0f5e2d895e

                      SHA256

                      0963beb22fe4b5d52bc5b10adc63c72a379a3bbed138273aeffa502ecc7feeb2

                      SHA512

                      8ea32b11988003ccf67dddfd3cb46edc8b6b8135e6aba2bb0251ff55a25224f94e5bae8c64199f8c5b8046bbb42d77c34f7a4d74058b5afe2a6d9238d4688475

                    • C:\Users\Admin\AppData\Local\Temp\is-QEFH6.tmp\IsProgressBar.dll

                      Filesize

                      154KB

                      MD5

                      3aa93aebd65e6816be4829e57f58e0c2

                      SHA1

                      37ea752eae1ae3e3630776d26d09b446e86cf83a

                      SHA256

                      1e25cf231be401d20c332afc3e399ce4323340612cd8ef4ce344f080aab2c283

                      SHA512

                      7ff18e1b3405860fc8880b6c4cd85e15b9b68587436bbb2d3153154f571dd70a0d3f8ec651686478b2f66e7407ce7ab59cb81f35be9f8c8bcb7ab78e4c9de5f3

                    • C:\Users\Admin\AppData\Local\Temp\is-QEFH6.tmp\Skin.cjstyles

                      Filesize

                      821KB

                      MD5

                      6afcf673714e1c0f88e443b07867cad7

                      SHA1

                      acf6a8927231ab1e47249a05d45c55b0d0133c38

                      SHA256

                      23801684937fd06d0d00b5321517e3869e7c614e3401099f1d040498c7147f89

                      SHA512

                      f40dc22b8c1a503ce0d68a691b28c715df5cf037a937bf4cb8e1942b774d74951da4863b2ca8fad31cf7033a99c9d54fb940a8e267d125f70a16e6b4e75143e5

                    • C:\Users\Admin\AppData\Local\Temp\is-QEFH6.tmp\Version.txt

                      Filesize

                      47B

                      MD5

                      1a1ea0c1a7df5f91ecd62cda837a3273

                      SHA1

                      f358bcfc14b04949db83e04c4e181f526b3fc5f3

                      SHA256

                      9fea0616868155973e2b5ca5d1524359e47916e8aee14dfad123b533c737ee76

                      SHA512

                      666a013157c5544ef7ebad000d6a5e0f2b4020bb7e7d8792880b7c35c662b1c710e25a8893f75b8599cba5bb934c18f91a689f0f24c53b287e601475b1ae9f01

                    • C:\Users\Admin\AppData\Local\Temp\is-QEFH6.tmp\Win_ver.bat

                      Filesize

                      1KB

                      MD5

                      3cb6a90e67d6605abdc3602292e5ef2b

                      SHA1

                      bd80bd159e6033d3bb40bf262c1f8412a29c6893

                      SHA256

                      4b1a34abf4dc7a7b98507b1b37eae6a0da5ce951cde221ab426a56988b834f89

                      SHA512

                      bd0942de8ec0db64fccaa3dac9773a44f219a6eeaf5a969a55db8aa861e247c9a3ef1404ac59fe6addc198e87afc1721eb4fdd36f1b3df03277ec9bc8f6732bc

                    • C:\Users\Admin\AppData\Local\Temp\is-QEFH6.tmp\descctrl.dll

                      Filesize

                      6KB

                      MD5

                      c0cce6e6ea0444b77d938671beb6269a

                      SHA1

                      480120d268d9bb763241301e95ee340c38b73e71

                      SHA256

                      9473cb7259c02a227cd61df613dacacbbd54b7ae1f465cd46feeeab7a74d0b41

                      SHA512

                      1bdfea634bbf0ed637ac7d28b315006e05db9fd70ee1ab855448d12ae9b3cfe226b54e064c289b3e3a9e46d182616ce55ddcb0b9ef53ad84f8d41a09cb469754

                    • C:\Users\Admin\AppData\Local\Temp\is-QEFH6.tmp\isskin.dll

                      Filesize

                      385KB

                      MD5

                      92c2e247392e0e02261dea67e1bb1a5e

                      SHA1

                      db72fed8771364bf8039b2bc83ed01dda2908554

                      SHA256

                      25fdb94e386f8a41f10aba00ed092a91b878339f8e256a7252b11169122b0a68

                      SHA512

                      e938d2a1870ccb437d818b5301e6ecffaa6efbf4f0122e1a1ae0981057d7d0376039ea927c6fd326456da2d6904803fca26b87245367a4c5de2aebc47bdcd4b5

                    • memory/748-14-0x0000000000401000-0x000000000040B000-memory.dmp

                      Filesize

                      40KB

                    • memory/748-12-0x0000000000400000-0x000000000041F000-memory.dmp

                      Filesize

                      124KB

                    • memory/2076-105-0x0000000076B90000-0x0000000077143000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2076-96-0x0000000076B90000-0x0000000077143000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2076-44-0x0000000000400000-0x00000000004FF000-memory.dmp

                      Filesize

                      1020KB

                    • memory/2076-69-0x0000000075AA0000-0x0000000075B1A000-memory.dmp

                      Filesize

                      488KB

                    • memory/2076-72-0x0000000075AA0000-0x0000000075B1A000-memory.dmp

                      Filesize

                      488KB

                    • memory/2076-88-0x00000000752D0000-0x000000007537F000-memory.dmp

                      Filesize

                      700KB

                    • memory/2076-93-0x0000000010000000-0x0000000010060000-memory.dmp

                      Filesize

                      384KB

                    • memory/2076-125-0x0000000010000000-0x0000000010060000-memory.dmp

                      Filesize

                      384KB

                    • memory/2076-124-0x00000000032F0000-0x0000000003358000-memory.dmp

                      Filesize

                      416KB

                    • memory/2076-123-0x00000000736B0000-0x00000000737D4000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2076-43-0x00000000032F0000-0x0000000003358000-memory.dmp

                      Filesize

                      416KB

                    • memory/2076-120-0x0000000076B90000-0x0000000077143000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2076-122-0x0000000074B60000-0x0000000074BD4000-memory.dmp

                      Filesize

                      464KB

                    • memory/2076-121-0x0000000073D50000-0x0000000073F60000-memory.dmp

                      Filesize

                      2.1MB

                    • memory/2076-119-0x00000000752D0000-0x000000007537F000-memory.dmp

                      Filesize

                      700KB

                    • memory/2076-118-0x0000000010000000-0x0000000010060000-memory.dmp

                      Filesize

                      384KB

                    • memory/2076-117-0x00000000032F0000-0x0000000003358000-memory.dmp

                      Filesize

                      416KB

                    • memory/2076-116-0x00000000736B0000-0x00000000737D4000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2076-115-0x0000000074B60000-0x0000000074BD4000-memory.dmp

                      Filesize

                      464KB

                    • memory/2076-114-0x0000000075B20000-0x0000000075B45000-memory.dmp

                      Filesize

                      148KB

                    • memory/2076-113-0x0000000073D50000-0x0000000073F60000-memory.dmp

                      Filesize

                      2.1MB

                    • memory/2076-112-0x0000000076B90000-0x0000000077143000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2076-111-0x00000000752D0000-0x000000007537F000-memory.dmp

                      Filesize

                      700KB

                    • memory/2076-110-0x0000000010000000-0x0000000010060000-memory.dmp

                      Filesize

                      384KB

                    • memory/2076-109-0x00000000032F0000-0x0000000003358000-memory.dmp

                      Filesize

                      416KB

                    • memory/2076-108-0x00000000736B0000-0x00000000737D4000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2076-107-0x0000000074B60000-0x0000000074BD4000-memory.dmp

                      Filesize

                      464KB

                    • memory/2076-19-0x0000000000400000-0x00000000004FF000-memory.dmp

                      Filesize

                      1020KB

                    • memory/2076-103-0x0000000010000000-0x0000000010060000-memory.dmp

                      Filesize

                      384KB

                    • memory/2076-104-0x00000000752D0000-0x000000007537F000-memory.dmp

                      Filesize

                      700KB

                    • memory/2076-99-0x0000000074B60000-0x0000000074BD4000-memory.dmp

                      Filesize

                      464KB

                    • memory/2076-98-0x0000000073D50000-0x0000000073F60000-memory.dmp

                      Filesize

                      2.1MB

                    • memory/2076-97-0x0000000076430000-0x0000000076513000-memory.dmp

                      Filesize

                      908KB

                    • memory/2076-40-0x00000000032F0000-0x0000000003358000-memory.dmp

                      Filesize

                      416KB

                    • memory/2076-95-0x00000000752D0000-0x000000007537F000-memory.dmp

                      Filesize

                      700KB

                    • memory/2076-94-0x0000000075F70000-0x000000007604C000-memory.dmp

                      Filesize

                      880KB

                    • memory/2076-92-0x0000000073510000-0x0000000073679000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/2076-91-0x0000000073D50000-0x0000000073F60000-memory.dmp

                      Filesize

                      2.1MB

                    • memory/2076-90-0x0000000076430000-0x0000000076513000-memory.dmp

                      Filesize

                      908KB

                    • memory/2076-106-0x0000000073D50000-0x0000000073F60000-memory.dmp

                      Filesize

                      2.1MB

                    • memory/2076-102-0x0000000073510000-0x0000000073679000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/2076-101-0x00000000032F0000-0x0000000003358000-memory.dmp

                      Filesize

                      416KB

                    • memory/2076-100-0x00000000736B0000-0x00000000737D4000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2076-87-0x0000000010000000-0x0000000010060000-memory.dmp

                      Filesize

                      384KB

                    • memory/2076-86-0x00000000032F0000-0x0000000003358000-memory.dmp

                      Filesize

                      416KB

                    • memory/2076-89-0x0000000076B90000-0x0000000077143000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2076-79-0x0000000010000000-0x0000000010060000-memory.dmp

                      Filesize

                      384KB

                    • memory/2076-82-0x0000000075B20000-0x0000000075B45000-memory.dmp

                      Filesize

                      148KB

                    • memory/2076-81-0x0000000010000000-0x0000000010060000-memory.dmp

                      Filesize

                      384KB

                    • memory/2076-80-0x00000000032F0000-0x0000000003358000-memory.dmp

                      Filesize

                      416KB

                    • memory/2076-78-0x00000000032F0000-0x0000000003358000-memory.dmp

                      Filesize

                      416KB

                    • memory/2076-76-0x0000000075B20000-0x0000000075B45000-memory.dmp

                      Filesize

                      148KB

                    • memory/2076-71-0x0000000010000000-0x0000000010060000-memory.dmp

                      Filesize

                      384KB

                    • memory/2076-73-0x0000000075B20000-0x0000000075B45000-memory.dmp

                      Filesize

                      148KB

                    • memory/2076-70-0x00000000032F0000-0x0000000003358000-memory.dmp

                      Filesize

                      416KB

                    • memory/2076-67-0x0000000075AA0000-0x0000000075B1A000-memory.dmp

                      Filesize

                      488KB

                    • memory/2076-66-0x0000000010000000-0x0000000010060000-memory.dmp

                      Filesize

                      384KB

                    • memory/2076-65-0x00000000032F0000-0x0000000003358000-memory.dmp

                      Filesize

                      416KB

                    • memory/2076-85-0x00000000736B0000-0x00000000737D4000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2076-84-0x0000000010000000-0x0000000010060000-memory.dmp

                      Filesize

                      384KB

                    • memory/2076-83-0x00000000032F0000-0x0000000003358000-memory.dmp

                      Filesize

                      416KB

                    • memory/2076-75-0x0000000075AA0000-0x0000000075B1A000-memory.dmp

                      Filesize

                      488KB

                    • memory/2076-77-0x0000000073840000-0x0000000073870000-memory.dmp

                      Filesize

                      192KB

                    • memory/2076-74-0x0000000010000000-0x0000000010060000-memory.dmp

                      Filesize

                      384KB

                    • memory/2076-68-0x0000000010000000-0x0000000010060000-memory.dmp

                      Filesize

                      384KB

                    • memory/2076-64-0x0000000075AA0000-0x0000000075B1A000-memory.dmp

                      Filesize

                      488KB

                    • memory/2076-299-0x0000000000400000-0x00000000004FF000-memory.dmp

                      Filesize

                      1020KB

                    • memory/2076-302-0x00000000032F0000-0x0000000003358000-memory.dmp

                      Filesize

                      416KB