Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2025 14:50

General

  • Target

    c7aa5681b6b20fd42ff23642c71eb4a91ae31156fb4d2dc6d0fd653a28f77ac9N.exe

  • Size

    22KB

  • MD5

    78b4a8d8e12294618ee2ecf265011f30

  • SHA1

    ae6b64188837274c0367acdc7083ea94b473734f

  • SHA256

    c7aa5681b6b20fd42ff23642c71eb4a91ae31156fb4d2dc6d0fd653a28f77ac9

  • SHA512

    cd696f6360bbac8492da5760ff8d14260512d489da319c8699d48e9d9e28ca614c8dddf98de8a110a47e25c842d517db3ff5c66806b26be37ff4607a9c5b83b4

  • SSDEEP

    384:IN5hm+AfVVO8Uw5dPXdCUlDFoea0FZtabYu+Cxss92Xuj0boeKEuvarlnOZpjnUP:O8VVL53ddNg0FpCxs9ugmExnU9

Malware Config

Signatures

  • Detect Neshta payload 2 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7aa5681b6b20fd42ff23642c71eb4a91ae31156fb4d2dc6d0fd653a28f77ac9N.exe
    "C:\Users\Admin\AppData\Local\Temp\c7aa5681b6b20fd42ff23642c71eb4a91ae31156fb4d2dc6d0fd653a28f77ac9N.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe

    Filesize

    547KB

    MD5

    5cd26edb8bb205a64e40e4785c1f5b00

    SHA1

    cd425ee05e72ce13e2c2fee5236f93eb9691862d

    SHA256

    2ec62050bc0193724a1f0a65929608bc1b48091bc11c9000902f19aad81a0cd3

    SHA512

    4451b6fb6782c6d88c8e3de227c43f7b158d0a01bf87942a5711236b62b413763f6d31e46af2e71ea621514144a5a1160c98ab1b5512fa2817adda86af48a369

  • memory/2188-0-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2188-70-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2188-72-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB