Analysis

  • max time kernel
    101s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2024 17:58

General

  • Target

    793d672eebb162671fe989024f767e7146020de8582abd7b260f24b30a15c87a.exe

  • Size

    40KB

  • MD5

    855db5a0c738db26e229ffadac14dc37

  • SHA1

    52f95642b2d0ef90d5fdbdd00699f02ad5cff2e4

  • SHA256

    793d672eebb162671fe989024f767e7146020de8582abd7b260f24b30a15c87a

  • SHA512

    ea50d1afdc8e792f6f1a332c35bfb37dc4e36a492777690693844d3dae4e8173668b4c043f7248651c1880c27822bd5eabdb8798e72867c09cfede3d6207c919

  • SSDEEP

    768:KyxqjQl/EMQt4Oei7RwsHxyP7nbxzOQdJvPnE:9xqjQ+P04wsmJCivE

Malware Config

Signatures

  • Detect Neshta payload 7 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\793d672eebb162671fe989024f767e7146020de8582abd7b260f24b30a15c87a.exe
    "C:\Users\Admin\AppData\Local\Temp\793d672eebb162671fe989024f767e7146020de8582abd7b260f24b30a15c87a.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    a40427e3788637e741fb69ea8d76cd52

    SHA1

    f8c8c7ec493e32a7573d90ce400fccd79fc98f31

    SHA256

    18dcc8fae245869d02b7db0edbe22ec57a30bdd51a64090452118a79ba194052

    SHA512

    e6b688d4ad0506c74db323b50a2588472f45e66da2a3456450aea96d93882b13662f8b3bbed7773180f5bec851a31d2e45262ecb9283b425c60c8caa06d56ca2

  • C:\Users\Admin\AppData\Local\Temp\3582-490\793d672eebb162671fe989024f767e7146020de8582abd7b260f24b30a15c87a.exe

    Filesize

    40KB

    MD5

    870c095dcba6c1a2c1b8557acce1a439

    SHA1

    1d162e86daaef7f779a3fb2e97ddc62e31ecd70f

    SHA256

    b10c7cdf9eb3fe802c1ae309222caa95474f0ddf18f0955cdbe7eaf9b6053fb7

    SHA512

    ae8d8ce4919bb3ea67b52d6199fefa05acfa2d55216737f9494eb69bd738b92002a546d137ade90a6d54c43effa65bc58a731fdc020b49799ef8a3c1b8321280

  • memory/2684-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2684-95-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2684-94-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2684-96-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2684-98-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB