Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-12-2024 05:18

General

  • Target

    a948d5a671ce86b84f514772a178e4526939b86331b207de201304686307e66e.exe

  • Size

    2.2MB

  • MD5

    22ad737f258a118843efa7f83ff8466e

  • SHA1

    4a532fa9ff30909e0bca7b574eabe7623fad84ae

  • SHA256

    a948d5a671ce86b84f514772a178e4526939b86331b207de201304686307e66e

  • SHA512

    d11d20814dcce8d7edf05c6d8d8bc6ca64dc5da1da23e1c4cb2165734ff358d45b0fcaa93dcf6296b721b47491143aaa2d6270c6a7de783fd79686171dae8788

  • SSDEEP

    49152:Qifu1DBgutBPNcpwcjVpNMkCZZpsYpmwZ3hQ8cTEoDgwRO:QvguPP4wc3NMkCGGmugTEKgwRO

Malware Config

Signatures

  • Detect Neshta payload 23 IoCs
  • Detects Mimic ransomware 1 IoCs
  • Mimic

    Ransomware family was first exploited in the wild in 2022.

  • Mimic family
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a948d5a671ce86b84f514772a178e4526939b86331b207de201304686307e66e.exe
    "C:\Users\Admin\AppData\Local\Temp\a948d5a671ce86b84f514772a178e4526939b86331b207de201304686307e66e.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Users\Admin\AppData\Local\Temp\3582-490\a948d5a671ce86b84f514772a178e4526939b86331b207de201304686307e66e.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\a948d5a671ce86b84f514772a178e4526939b86331b207de201304686307e66e.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2972
      • C:\Windows\svchost.com
        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe" i
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1960
        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe
          C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe i
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2500
      • C:\Windows\svchost.com
        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe" x -y -p89905472210203597 Everything64.dll
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2300
        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe
          C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe x -y -p89905472210203597 Everything64.dll
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE

    Filesize

    859KB

    MD5

    02ee6a3424782531461fb2f10713d3c1

    SHA1

    b581a2c365d93ebb629e8363fd9f69afc673123f

    SHA256

    ead58c483cb20bcd57464f8a4929079539d634f469b213054bf737d227c026dc

    SHA512

    6c9272cb1b6bde3ee887e1463ab30ea76568cb1a285d11393337b78c4ad1c3b7e6ce47646a92ab6d70bff4b02ab9d699b84af9437b720e52dcd35579fe2693ec

  • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe

    Filesize

    547KB

    MD5

    cf6c595d3e5e9667667af096762fd9c4

    SHA1

    9bb44da8d7f6457099cb56e4f7d1026963dce7ce

    SHA256

    593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d

    SHA512

    ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80

  • C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe

    Filesize

    186KB

    MD5

    58b58875a50a0d8b5e7be7d6ac685164

    SHA1

    1e0b89c1b2585c76e758e9141b846ed4477b0662

    SHA256

    2a0aa0763fdef9c38c5dd4d50703f0c7e27f4903c139804ec75e55f8388139ae

    SHA512

    d67214077162a105d01b11a8e207fab08b45b08fbfba0615a2ea146e1dd99eea35e4f02958a1754d3192292c00caf777f186f0a362e4b8b0da51fabbdb76375b

  • C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe

    Filesize

    1.1MB

    MD5

    566ed4f62fdc96f175afedd811fa0370

    SHA1

    d4b47adc40e0d5a9391d3f6f2942d1889dd2a451

    SHA256

    e17cd94c08fc0e001a49f43a0801cea4625fb9aee211b6dfebebec446c21f460

    SHA512

    cdf8f508d396a1a0d2e0fc25f2ae46398b25039a0dafa0919737cc44e3e926ebae4c3aa26f1a3441511430f1a36241f8e61c515a5d9bd98ad4740d4d0f7b8db7

  • C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE

    Filesize

    305KB

    MD5

    20d724819f31bd89107b7b930ea01f7c

    SHA1

    ec65940fe3e30d3309e232267c000cefc047e42e

    SHA256

    41d6a7e9725262e1c055b5979b4e9ab4b5585e5f3760c3edd5f175552713b365

    SHA512

    16dc256250c81df50a5e270c5a9c24dbfd9a04c258218e0cb96179011b4724426917b16c7fa0f87941f4ab7e4150c6a7bbab4dd11fac1c8ddde2602d2d259fec

  • C:\PROGRA~2\Google\Update\DISABL~1.EXE

    Filesize

    207KB

    MD5

    3b0e91f9bb6c1f38f7b058c91300e582

    SHA1

    6e2e650941b1a96bb0bb19ff26a5d304bb09df5f

    SHA256

    57c993cadf4bf84810cea23a7112c6e260624beaab48d0e4332d3462900fec1d

    SHA512

    a4fbe28a0135f4632e0a5b6bd775f8d010250b0fbfe223db1fe81d18552a6bc166ebce807853ba02e6a476e9829454805e415ca828a5e043bd1e63dc53599d0f

  • C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE

    Filesize

    109KB

    MD5

    44623cc33b1bd689381de8fe6bcd90d1

    SHA1

    187d4f8795c6f87dd402802723e4611bf1d8089e

    SHA256

    380154eab37e79ed26a7142b773b8a8df6627c64c99a434d5a849b18d34805ba

    SHA512

    19002885176caceb235da69ee5af07a92b18dac0fb8bb177f2c1e7413f6606b1666e0ea20f5b95b4fa3d82a3793b1dbe4a430f6f84a991686b024c4e11606082

  • C:\PROGRA~2\MICROS~1\Office14\OIS.EXE

    Filesize

    308KB

    MD5

    4545e2b5fa4062259d5ddd56ecbbd386

    SHA1

    c021dc8488a73bd364cb98758559fe7ba1337263

    SHA256

    318f1f3fbdd1cf17c176cb68b4bc2cf899338186161a16a1adc29426114fb4f8

    SHA512

    cf07436e0219ca5868e11046f2a497583066a9cf68262e7cca22daad72aded665ac66afea8db76182c172041c45fcef1628ea6852751c4bf97969c9af6cfefa1

  • C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE

    Filesize

    1.6MB

    MD5

    08ee3d1a6a5ed48057783b0771abbbea

    SHA1

    ebf911c5899f611b490e2792695924df1c69117d

    SHA256

    3f6decd82b72a5ba1ee224b52d9fbd6486be22a0b855e28eaad47ae92df266f0

    SHA512

    1711d023c60d4b047d553a654797bc3a2eecd951b310698c1a2c549e136c33f55e0fc1167a4a38f793b7796f7cfc3fb30017935127b147a21da2812eb38faac5

  • C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE

    Filesize

    262KB

    MD5

    2d1b4a44f1f9046d9d28e7e70253b31d

    SHA1

    6ab152d17c2e8a169956f3a61ea13460d495d55e

    SHA256

    d1d73220342ff51a1514d2354654c6fcaedc9a963cb3e0a7e5b0858cfc5c5c7d

    SHA512

    dd8f5e343417a3e131b3362f1aecaf9ce0f8a55c9f90aa3b7e55b6ddb6c5f4e06b3e76a7f4481fa13e2f325ab2490553f6977178acf7c486c7315755c05fc7c3

  • C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE

    Filesize

    1.4MB

    MD5

    5ae9c0c497949584ffa06f028a6605ab

    SHA1

    eb24dbd3c8952ee20411691326d650f98d24e992

    SHA256

    07dd9364be7babc5f9a08f0ccd828a9a55137845df1782b147f12943f234ea4e

    SHA512

    2e99bb500c281c367cc54fa283905b2537905ea4fe8986f676adbb1aaf58460dd2db082bb46a3dbe9dc836fbae3ee8832990839432dd99c74de58cc9b9295788

  • C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE

    Filesize

    714KB

    MD5

    af347c1ed4c9439b511585d607aa7a81

    SHA1

    5bccf29c6de8d1e005450f84d8e0ea597d290329

    SHA256

    94626f607c789acc73135c18be6fd93a9e56e839d4739dfebf45ce03d55386b9

    SHA512

    f314ad43f0af94f1178fb40a503c869c2a51ef04f78ee59b8236ca886c01ab7f50b4eb322cf16cbb7fde7015bc926b08df6ef50828c09178da82f2b5d512a5c1

  • C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE

    Filesize

    495KB

    MD5

    9597098cfbc45fae685d9480d135ed13

    SHA1

    84401f03a7942a7e4fcd26e4414b227edd9b0f09

    SHA256

    45966655baaed42df92cd6d8094b4172c0e7a0320528b59cf63fca7c25d66e9c

    SHA512

    16afbdffe4b4b2e54b4cc96fe74e49ca367dea50752321ddf334756519812ba8ce147ef5459e421dc42e103bc3456aab1d185588cc86b35fa2315ac86b2a0164

  • C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE

    Filesize

    536KB

    MD5

    8e7b72380cc9ee9bf35c0de5fde4ab3a

    SHA1

    c19151c331ab274bbf5f6792ca707eb8a7017dba

    SHA256

    d82ca304cf64be3922b12111c962e09a6ddb2b8477e25b6c3f0400eddc38c80b

    SHA512

    acff1c08f9c8443d0b0589f5a7d7cab532462788406feba64825fdd2addf5b6cc8e773713e93c98991afbc7e364233fe7cf0659574cebe2200f8f7f818bfe927

  • C:\Users\ALLUSE~1\PACKAG~1\{33D1F~1\VCREDI~1.EXE

    Filesize

    485KB

    MD5

    86749cd13537a694795be5d87ef7106d

    SHA1

    538030845680a8be8219618daee29e368dc1e06c

    SHA256

    8c35dcc975a5c7c687686a3970306452476d17a89787bc5bd3bf21b9de0d36a5

    SHA512

    7b6ae20515fb6b13701df422cbb0844d26c8a98087b2758427781f0bf11eb9ec5da029096e42960bf99ddd3d4f817db6e29ac172039110df6ea92547d331db4c

  • C:\Users\ALLUSE~1\PACKAG~1\{57A73~1\VC_RED~1.EXE

    Filesize

    674KB

    MD5

    9c10a5ec52c145d340df7eafdb69c478

    SHA1

    57f3d99e41d123ad5f185fc21454367a7285db42

    SHA256

    ccf37e88447a7afdb0ba4351b8c5606dbb05b984fb133194d71bcc00d7be4e36

    SHA512

    2704cfd1a708bfca6db7c52467d3abf0b09313db0cdd1ea8e5d48504c8240c4bf24e677f17c5df9e3ac1f6a678e0328e73e951dc4481f35027cb03b2966dc38f

  • C:\Users\ALLUSE~1\PACKAG~1\{CA675~1\VCREDI~1.EXE

    Filesize

    485KB

    MD5

    87f15006aea3b4433e226882a56f188d

    SHA1

    e3ad6beb8229af62b0824151dbf546c0506d4f65

    SHA256

    8d0045c74270281c705009d49441167c8a51ac70b720f84ff941b39fad220919

    SHA512

    b01a8af6dc836044d2adc6828654fa7a187c3f7ffe2a4db4c73021be6d121f9c1c47b1643513c3f25c0e1b5123b8ce2dc78b2ca8ce638a09c2171f158762c7c1

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\[email protected]

    Filesize

    2.3MB

    MD5

    6775b0b2cdd7cd537f132f77b73144b0

    SHA1

    a1bfc2ea21424a20431d0ac527916c7463eabb65

    SHA256

    4d5a5a19280efcff80150219ab749ca08c692e876b3a9f6a71c1af63b971f47f

    SHA512

    b1bea613fdb9c3d049243f82cb7370ac0c62eed38e6eec3d3312ca3f7e4cfc12283f244ea1eafafa123927b41cc9667603a55058991e8a23e8a4df151de65749

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Everything.ini

    Filesize

    548B

    MD5

    742c2400f2de964d0cce4a8dabadd708

    SHA1

    c452d8d4c3a82af4bc57ca8a76e4407aaf90deca

    SHA256

    2fefb69e4b2310be5e09d329e8cf1bebd1f9e18884c8c2a38af8d7ea46bd5e01

    SHA512

    63a7f1482dc15d558e1a26d1214fcecca14df6db78c88735a67d1a89185c05210edc38b38e3e014dac817df88968aaf47beb40e8298777fbb5308abfe16479e4

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Everything2.ini

    Filesize

    550B

    MD5

    51014c0c06acdd80f9ae4469e7d30a9e

    SHA1

    204e6a57c44242fad874377851b13099dfe60176

    SHA256

    89ad2164717bd5f5f93fbb4cebf0efeb473097408fddfc7fc7b924d790514dc5

    SHA512

    79b5e2727cce5cd9f6d2e886f93b22b72ec0ad4a6b9ad47205d7cf283606280665ead729ab3921d7e84409cfc09a94e749a68918130f0172856626f5f7af010c

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Everything64.dll

    Filesize

    1.2MB

    MD5

    3983d31b7a906d3351ef223ab4ffaa0a

    SHA1

    65b317231fbe779516558261b4b0f3e839e7e946

    SHA256

    db3ba29eb00805d400c41be842b176a24c2a14efffb9a78ed34e630749bf31c1

    SHA512

    5231b5b31aa9702aef52fcde8ce384477ff4ff1a7cc9f9a634035aaa2d328e0eaf991228b71b5e0c51ecf737b95c6a6a937808d22a4ca64432a2c74fbd9f4595

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\xdel.exe

    Filesize

    350KB

    MD5

    803df907d936e08fbbd06020c411be93

    SHA1

    4aa4b498ae037a2b0479659374a5c3af5f6b8d97

    SHA256

    e8eaa39e2adfd49ab69d7bb8504ccb82a902c8b48fbc256472f36f41775e594c

    SHA512

    5b9c44b4ed68b632360c66b35442722d2797807c88555c9fde9c176581d410e4f6ed433fabdcd9ee614db458158e6055a9f7f526ebfbc8e7f5f3d388f5de4532

  • C:\Users\Admin\AppData\Local\Temp\tmp5023.tmp

    Filesize

    8B

    MD5

    742991cfd809ef6e9acfb7188a50250b

    SHA1

    197b3a607693b51bbea1f29d52d823c71f2fac07

    SHA256

    3aabcfb81f8df4d7e11d7d845354bf7cf40a20b39e92709722a03b183d0ef503

    SHA512

    02da16639e9d1169ed56f05480949af02525bc50aacbb32720a12efda8d64b3a7a1024a6612a4a37bbb4d89cc2be15894ea6bc91137c66dec2d934d9cc8ac9d6

  • C:\Windows\directx.sys

    Filesize

    55B

    MD5

    46bc0aeaa9047291ac2842d4a67418a6

    SHA1

    25991aecd5292a2ef58da7ec7335a7216ae1e15f

    SHA256

    e3ee98d23efd940c86489c855abc5882850a9ba29ec5aa50423f3b6cc38f36e9

    SHA512

    f0b3ab4b7466c747c6f2d7e57cff68f919610d1fbc5fc89f7890689761b8a015c77d6b69846ea8c1e2b578a84d668d6e00d466744f421f754c7212da35ed089d

  • C:\Windows\svchost.com

    Filesize

    40KB

    MD5

    36fd5e09c417c767a952b4609d73a54b

    SHA1

    299399c5a2403080a5bf67fb46faec210025b36d

    SHA256

    980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2

    SHA512

    1813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\a948d5a671ce86b84f514772a178e4526939b86331b207de201304686307e66e.exe

    Filesize

    2.2MB

    MD5

    801c430414f434df6fc24a9891b3b118

    SHA1

    27301b1a6c2078f4eec06ec6f1f947f22a1598fc

    SHA256

    2423f6e4b6f015042c4de4a4ad457629b7c4737ec19352abac9dd6136ba46d68

    SHA512

    e2c5e42a09c235d89ceb298ed27815c5b922e547568111ae916032f5cb85d89b197080d6641cf697f2fa18e11aebe66bef1669dc2155e9a89bfeb5e05eff1c29

  • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe

    Filesize

    772KB

    MD5

    b93eb0a48c91a53bda6a1a074a4b431e

    SHA1

    ac693a14c697b1a8ee80318e260e817b8ee2aa86

    SHA256

    ab15a9b27ee2d69a8bc8c8d1f5f40f28cd568f5cbb28d36ed938110203f8d142

    SHA512

    732cb0dcb2b1dac1a7462554c256cec27de243734f79b7f87026e9f5fbae6d5d8a5f14a702d2af0b65897b6abad70a9eff1905dc851ce267d221ddcdd9e640c5

  • memory/1960-161-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1960-166-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2300-177-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2548-160-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2548-163-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB