Analysis

  • max time kernel
    93s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2025 07:22

General

  • Target

    dc07e8ac3ac953d1bf32adc61c2081100013a64d1d66dcaf397c8e53146e9f01.exe

  • Size

    2.1MB

  • MD5

    e4bed2e74e8dae4e9f9ec9defdc52d59

  • SHA1

    5d0cf17b7aeebd048b7aa0407a769cbe26a48fd5

  • SHA256

    dc07e8ac3ac953d1bf32adc61c2081100013a64d1d66dcaf397c8e53146e9f01

  • SHA512

    828c683c6e48a20ef26726861ab37588b94f11169cefc198fd03267c2ac32449cc4da33ef24fc81d3d0e37a3c10634d12e75ff7fd3c317048addcb8198b7c902

  • SSDEEP

    24576:vLex97RhQEfj9RIZdg9gAt2Rg5WOjADousRtJSyoEa6XQZiNJRFxoIWHTU115soi:vG7Rdfj3ywgAxWQAsuCAEvdpQTU11OWC

Malware Config

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc07e8ac3ac953d1bf32adc61c2081100013a64d1d66dcaf397c8e53146e9f01.exe
    "C:\Users\Admin\AppData\Local\Temp\dc07e8ac3ac953d1bf32adc61c2081100013a64d1d66dcaf397c8e53146e9f01.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Users\Admin\AppData\Local\Temp\3582-490\dc07e8ac3ac953d1bf32adc61c2081100013a64d1d66dcaf397c8e53146e9f01.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\dc07e8ac3ac953d1bf32adc61c2081100013a64d1d66dcaf397c8e53146e9f01.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Users\Admin\AppData\Local\Temp\3582-490\dc07e8ac3ac953d1bf32adc61c2081100013a64d1d66dcaf397c8e53146e9f01.exe

    Filesize

    2.1MB

    MD5

    1fa2db88d26acd3c0873688ef06699b5

    SHA1

    52d5b5f5a98a5c7eb0a4542bfadbc182aab7c8fe

    SHA256

    8883a1105c9b9b86547f07a2412982dce07657f573c89925848d649873717053

    SHA512

    42103b17cc1e6f8199f417fec0594a96ed4b17c004a89f190e98ac846eb9d655c1f159d7a503b381bbc776c2825c5694ff283a321d846d1a0e8ffac2fcb02a27

  • C:\Users\Admin\AppData\Local\Temp\TWAIN.LOG

    Filesize

    485B

    MD5

    da76c03705db001ab83b4e323480e1f4

    SHA1

    63cff0f5caf2c992286373da27ca7de0b087fa52

    SHA256

    df255f481793c26dabcdb4a56c353f760682bda9508ec59b7754e2d4a70b67fd

    SHA512

    b8d2d884122b7bf0123910184662b1f75d022bd25b5b5b58b4513c25bef96be600ebd209ff5678298287f16dc348c97b10a69fa3c0fd9153273b16d8a4fa7ac0

  • memory/2456-108-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2456-109-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2456-111-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB