Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2025 13:39

General

  • Target

    c0dde918dc717ae798bfaa44c5148aa68c1d575bcde34feaeb1c3e4817de0b14.exe

  • Size

    3.1MB

  • MD5

    eb20fa848b81378a98ca03f30e0ec649

  • SHA1

    b8bab803ac33448eba91250aa4f384941b93ace0

  • SHA256

    c0dde918dc717ae798bfaa44c5148aa68c1d575bcde34feaeb1c3e4817de0b14

  • SHA512

    a7609de8489af7f503e608b3fb162fc1c0735ab36a60a6c35fdb4459d9c3288beda13d7e270519ca8bc32096b69da91516b6f453bd7a96c5200de3319be8cb55

  • SSDEEP

    49152:ZQVD8jdMUOyeEpIC7F/iw+6pdM9X376IbAMINhqhFN7f6LlGiFkcmHAgC9T3i:6VwB8E/iUdM9X3ucFN7f6zdMHi3i

Malware Config

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0dde918dc717ae798bfaa44c5148aa68c1d575bcde34feaeb1c3e4817de0b14.exe
    "C:\Users\Admin\AppData\Local\Temp\c0dde918dc717ae798bfaa44c5148aa68c1d575bcde34feaeb1c3e4817de0b14.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    PID:3548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Users\Admin\AppData\Local\Temp\3582-490\c0dde918dc717ae798bfaa44c5148aa68c1d575bcde34feaeb1c3e4817de0b14.exe

    Filesize

    3.1MB

    MD5

    201688013d54b05bb124aadd8ac76a40

    SHA1

    41f5969f9f6e32d0dc5a2468f53acafee070e247

    SHA256

    b177d61e4bfc54ef3a325fc9994d731d2da7f6ce88a66ec2415ea46c573a7189

    SHA512

    535b31fbbc06941c14c84abad778e6ca142bf2293f92922e2546421f0e7a0094b4f59e035ee192ca316ad6a716ec29b0e9e71ed21d9c49712c155af591cab768

  • memory/3548-93-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3548-94-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3548-96-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB