Analysis

  • max time kernel
    93s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2024 00:53

General

  • Target

    36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe

  • Size

    541KB

  • MD5

    6b906d57676cc916d404cc88fef0c590

  • SHA1

    e368ca486debf6f912924dfc11df3b64983e1b2b

  • SHA256

    36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6

  • SHA512

    4655ff302552ae86f9fb0c9c7db9f454a522fcf8c004224db7ea58da5e9ff58770c934a5399645887a78a2d068baa6c516b172c37190c5304a7beebe918fbad2

  • SSDEEP

    6144:k9BmAQIPvTmaEVmP02yCUE+cw0wIceA4D55qv4t/uBmohChYgXP6RIeLWKiBlwq:9AQIXqaE0yCgqwXeAVmoEAlLViBlwq

Malware Config

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 53 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe
    "C:\Users\Admin\AppData\Local\Temp\36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3372
    • C:\Users\Admin\AppData\Local\Temp\3582-490\36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe"
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:3900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Users\Admin\AppData\Local\Temp\3582-490\36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe

    Filesize

    501KB

    MD5

    fa19fa821963093b0dff3098abb90943

    SHA1

    bed146a970a3bc9fac8b9e9c9acd1803e977035b

    SHA256

    3a80f5d2e1d38044dcd932c4fcf677ee30972042144d2a67669c7ad34a7d005e

    SHA512

    8a4eb412737bb0479487a8279795862dff21e56dd368746e353a4b731e767c2a812f4ea87b2d3cd3b5b55e90ead0562362fba92c4a11098dcc7cd505d0ae1007

  • memory/3372-95-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3372-96-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3372-98-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB