Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-01-2025 14:50

General

  • Target

    c7aa5681b6b20fd42ff23642c71eb4a91ae31156fb4d2dc6d0fd653a28f77ac9N.exe

  • Size

    22KB

  • MD5

    78b4a8d8e12294618ee2ecf265011f30

  • SHA1

    ae6b64188837274c0367acdc7083ea94b473734f

  • SHA256

    c7aa5681b6b20fd42ff23642c71eb4a91ae31156fb4d2dc6d0fd653a28f77ac9

  • SHA512

    cd696f6360bbac8492da5760ff8d14260512d489da319c8699d48e9d9e28ca614c8dddf98de8a110a47e25c842d517db3ff5c66806b26be37ff4607a9c5b83b4

  • SSDEEP

    384:IN5hm+AfVVO8Uw5dPXdCUlDFoea0FZtabYu+Cxss92Xuj0boeKEuvarlnOZpjnUP:O8VVL53ddNg0FpCxs9ugmExnU9

Malware Config

Signatures

  • Detect Neshta payload 2 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7aa5681b6b20fd42ff23642c71eb4a91ae31156fb4d2dc6d0fd653a28f77ac9N.exe
    "C:\Users\Admin\AppData\Local\Temp\c7aa5681b6b20fd42ff23642c71eb4a91ae31156fb4d2dc6d0fd653a28f77ac9N.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    PID:4816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    921516ffd3f924846e26d5cbc2f92130

    SHA1

    0828ce50856b2e77ac3b45750c0ed99e11eb13e6

    SHA256

    66418bf5707d6c63d6fd1669ceca9181311fae7c0fce3e0df051a4fe9d41750a

    SHA512

    7d88b4364d7f3291eb0c3b39a6573e4d8be9856db4f1ea4a72dbfbaf35bd9933879b941162679a61ebbd5cf20f52442dd14ef53e8034971b1439f24f7376ff5e

  • memory/4816-0-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/4816-85-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/4816-87-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB