Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-01-2025 00:33

General

  • Target

    586258e7447136b06af232cbf2cae01757350e3ec798667248a182b3d9256d6b.exe

  • Size

    912KB

  • MD5

    204fbe880f78594dd8fb082dbfd3e1a4

  • SHA1

    72bf48d18585fdd9dd4f37b29fb1a2a4a1aef6e4

  • SHA256

    586258e7447136b06af232cbf2cae01757350e3ec798667248a182b3d9256d6b

  • SHA512

    7515c2930ddb15cc588b2d392751fbf4acac7e01bd1030684f88d76f88fe3be9e76f1c37bf32f3c935d2e78faf48a59c0579d6e6d10f3010e5bb4b24cc0d65b0

  • SSDEEP

    12288:ruWOhSytsZu2WzAj6iafCA/vvl/RM9++tN+W/F8EorFFe1B:rc4pDpafCAv9/RMDtN+Q0GB

Malware Config

Signatures

  • Detect Neshta payload 3 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\586258e7447136b06af232cbf2cae01757350e3ec798667248a182b3d9256d6b.exe
    "C:\Users\Admin\AppData\Local\Temp\586258e7447136b06af232cbf2cae01757350e3ec798667248a182b3d9256d6b.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Users\Admin\AppData\Local\Temp\3582-490\586258e7447136b06af232cbf2cae01757350e3ec798667248a182b3d9256d6b.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\586258e7447136b06af232cbf2cae01757350e3ec798667248a182b3d9256d6b.exe"
      2⤵
      • Executes dropped EXE
      PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe

    Filesize

    547KB

    MD5

    cf6c595d3e5e9667667af096762fd9c4

    SHA1

    9bb44da8d7f6457099cb56e4f7d1026963dce7ce

    SHA256

    593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d

    SHA512

    ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\586258e7447136b06af232cbf2cae01757350e3ec798667248a182b3d9256d6b.exe

    Filesize

    872KB

    MD5

    8673daaf678a59328b6c5b18dcb5ac26

    SHA1

    96d33dee17c368aac95b2ec805163e8953757060

    SHA256

    90ede78e593a5fe8b40170f5f33f10b6180da19b3d0f42f81dd94d27aee6ff8d

    SHA512

    6cc15f288bb8c9892cab31ba72439cc573d895da45e3e88a4b96e137a02f9efa290e2bc3e150d3a8e09a1315878a71940431419f210d9d3cc8da4fa9355f9457

  • memory/2384-82-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2384-84-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB