Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/02/2025, 19:24

General

  • Target

    06fc12241a1f2b104489ee5bdd1dd6e9aa9913ccf85a18dfb85c78122f031df4.exe

  • Size

    1.1MB

  • MD5

    a127d78dc5e3867d9092cf4c346f8ceb

  • SHA1

    6470e1825154c87f51faafd051b00759d63eaf3d

  • SHA256

    06fc12241a1f2b104489ee5bdd1dd6e9aa9913ccf85a18dfb85c78122f031df4

  • SHA512

    c7f268931859cac96153a03d204fe376d8bb099c226f3547772617aa9233a56b0b49da98085a2a940bacc8981f43f2ffabef161a5cba2131e76d76a54748d13c

  • SSDEEP

    24576:XmiZBMLhI6O5HR0Xz8jDvAWVvnZKO5HQAVL1PZuTS:XhZBMLhI/88HAWVvZPNLZoTS

Malware Config

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 14 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06fc12241a1f2b104489ee5bdd1dd6e9aa9913ccf85a18dfb85c78122f031df4.exe
    "C:\Users\Admin\AppData\Local\Temp\06fc12241a1f2b104489ee5bdd1dd6e9aa9913ccf85a18dfb85c78122f031df4.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4500
    • C:\Users\Admin\AppData\Local\Temp\3582-490\06fc12241a1f2b104489ee5bdd1dd6e9aa9913ccf85a18dfb85c78122f031df4.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\06fc12241a1f2b104489ee5bdd1dd6e9aa9913ccf85a18dfb85c78122f031df4.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3872
  • C:\Program Files (x86)\CoreB2b\ExEcm\ExEcmService.exe
    "C:\Program Files (x86)\CoreB2b\ExEcm\ExEcmService.exe"
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1164
    • C:\Program Files (x86)\CoreB2b\ExEcm\ExECM.exe
      "C:\Program Files (x86)\CoreB2b\ExEcm\ExECM.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Program Files (x86)\CoreB2b\ExEcm\ExECM.exe

    Filesize

    150KB

    MD5

    be6a4cea305f68ba4b609b6c8f6bdaca

    SHA1

    19b9c5c18ff6296e2ca6b131deca048ae353574d

    SHA256

    55ab419763b54adf317f56f4294d1e838a2f75c11fb22d35061b05656933de24

    SHA512

    82f3f293f1f5692b4efdf53f48e671e70a2759db4995526dbb1ecd4e0f2f739ed9d29ac00eaa0fbf1d1bcde0958045b24dc33c95d98521cfa5e3b9c55e780dc4

  • C:\Program Files (x86)\CoreB2b\ExEcm\ExECM.exe.config

    Filesize

    2KB

    MD5

    237ef11e55f59baa2ecf132c6ddf698d

    SHA1

    2235bda8730e2e26aac65c92865a3302743be12e

    SHA256

    7d02d990eaf99364b7339971b3b8440253c3d636e32825bcb576998b04658bea

    SHA512

    5f6789aada6e57dcbfe75f9c0690ab6cdf88c49ce3522a9ccc7f69d0e9e394d6afa893f45b89b40af82dc5d4c86b9b14731fa3cb12a875b27a74d0dd2fadfbb9

  • C:\Program Files (x86)\CoreB2b\ExEcm\ExEcmService.exe

    Filesize

    26KB

    MD5

    9109548edae6b1d240210ffc02722153

    SHA1

    3530785fa36d5e9e834142ec83db575c88ce99e6

    SHA256

    daa0ca4fcd5418f2b011d4cecae06c9e822fb15004199f50540f63e1fdf84504

    SHA512

    f8a1df010ce9e2ce09913e0df7d769aa20a36fc845c612d8c0fa095bf7487fad23619f9c69796edbf737a1c6a94d2f4a8ff0ca87de9528c6d4398593ca38e151

  • C:\Program Files (x86)\CoreB2b\ExEcm\ExEcmService.exe.config

    Filesize

    578B

    MD5

    6a4e4c408c491b5b4a7d4698cba4f773

    SHA1

    8ffa0002b62235e094cb18949a245cffc83d7814

    SHA256

    979035ae538cdd3daee3e942bc2a1af6493c54dc1d15b384092d9ed6b8a6f771

    SHA512

    3170eab4147690bacfadf7bdb5ca4e47b4000fad9391cc459135cfcf9396957315b3124d501d04b513d981166e43a290c3969d144a45214d3c0f8398451d74ad

  • C:\Program Files (x86)\CoreB2b\ExEcm\Fleck2.dll

    Filesize

    53KB

    MD5

    80fa1064273fb7f446a4d17f67cf3be1

    SHA1

    396b79e6d9433d2110e4b70351ed7f768592dd99

    SHA256

    3c97eb64eec2e8ab576ce7163fd415c0866455995ebdd31f817e1ec77038b58f

    SHA512

    4fceb6de08c1a2829dcd36a73060e6afe122109da8085bd697dcfb9badf1e94718204bb1eca0807b67fd4ac8d373da91a2e08fc1fb35392c829aedc5eb8d99aa

  • C:\Users\Admin\AppData\Local\Temp\3582-490\06fc12241a1f2b104489ee5bdd1dd6e9aa9913ccf85a18dfb85c78122f031df4.exe

    Filesize

    1.1MB

    MD5

    355f9168c70315383e1c698d0783eb15

    SHA1

    672da2c2744ce6c315bf67923fb689dad6e06136

    SHA256

    cf6e694c2cb7fe0931156c64136829a6f3b4c8b78958732d918bdf49bf2e26af

    SHA512

    efcfd1d923771c22273038e522380cb5dee0492036db7cad1f6e6429099651dbfbaf53dd18fd48674067803981079abaed5683fcc94e5d4b95d0c6221b6e8028

  • C:\Users\Admin\AppData\Local\Temp\TmpCFF2.tmp

    Filesize

    2KB

    MD5

    e7b032bbb3c30a7d841240895d450886

    SHA1

    33f019f3464faa304d5de569009ad3eca66896ae

    SHA256

    bc358a4255a8bfc5fa6a0c71669281c29bf90f7174d1fe2f9debade21413ea74

    SHA512

    af2f7994f08a4ebf33e6cec6617ced5fe72f4895b245f8fac4a09dfcb5a8afd4fb08ae0a4e6cee50018366ba7a7abc0187d694ece1cb5e64c438e3c14d340002

  • C:\Users\Admin\AppData\Local\Temp\nsu856D.tmp\SimpleSC.dll

    Filesize

    1.1MB

    MD5

    7b89329c6d8693fb2f6a4330100490a0

    SHA1

    851b605cdc1c390c4244db56659b6b9aa8abd22c

    SHA256

    1620cdf739f459d1d83411f93648f29dcf947a910cc761e85ac79a69639d127d

    SHA512

    ac07972987ee610a677ea049a8ec521a720f7352d8b93411a95fd4b35ec29bfd1d6ccf55b48f32cc84c3dceef05855f723a88708eb4cf23caec77e7f6596786a

  • C:\Users\Admin\AppData\Local\Temp\nsu856D.tmp\System.dll

    Filesize

    12KB

    MD5

    564bb0373067e1785cba7e4c24aab4bf

    SHA1

    7c9416a01d821b10b2eef97b80899d24014d6fc1

    SHA256

    7a9ddee34562cd3703f1502b5c70e99cd5bba15de2b6845a3555033d7f6cb2a5

    SHA512

    22c61a323cb9293d7ec5c7e7e60674d0e2f7b29d55be25eb3c128ea2cd7440a1400cee17c43896b996278007c0d247f331a9b8964e3a40a0eb1404a9596c4472

  • C:\Users\Admin\AppData\Local\Temp\nsu856D.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    48f3e7860e1de2b4e63ec744a5e9582a

    SHA1

    420c64d802a637c75a53efc8f748e1aede3d6dc6

    SHA256

    6bf9cccd8a600f4d442efe201e8c07b49605ba35f49a4b3ab22fa2641748e156

    SHA512

    28716ddea580eeb23d93d1ff6ea0cf79a725e13c8f8a17ec9dfacb1fe29c7981ad84c03aed05663adc52365d63d19ec2f366762d1c685e3a9d93037570c3c583

  • C:\Users\Admin\AppData\Local\Temp\nsu856D.tmp\nsProcess.dll

    Filesize

    4KB

    MD5

    f0438a894f3a7e01a4aae8d1b5dd0289

    SHA1

    b058e3fcfb7b550041da16bf10d8837024c38bf6

    SHA256

    30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11

    SHA512

    f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7

  • C:\Windows\Temp\TmpCEE9.tmp

    Filesize

    1KB

    MD5

    730292240125c746f958623907b5932c

    SHA1

    a2eec5ae358cf4557f51b39818f3fe7a902774f5

    SHA256

    81ae43b91e7518b3e1afe73bfdfb7366445e38c1091b62cdd687db2926769300

    SHA512

    caa96ce7effe6632f91b15cc33d66b75f9e9e35cd5e1349ffec56e1961606e838d2688332bf00debff8279b23133be1ff04c489288fefa3cd6646236d3cce47a

  • memory/1164-190-0x0000000004190000-0x00000000041B2000-memory.dmp

    Filesize

    136KB

  • memory/1164-191-0x00000000730B0000-0x0000000073860000-memory.dmp

    Filesize

    7.7MB

  • memory/1164-188-0x00000000730BE000-0x00000000730BF000-memory.dmp

    Filesize

    4KB

  • memory/1164-250-0x00000000730B0000-0x0000000073860000-memory.dmp

    Filesize

    7.7MB

  • memory/1164-189-0x0000000000D00000-0x0000000000D0A000-memory.dmp

    Filesize

    40KB

  • memory/1164-247-0x00000000730BE000-0x00000000730BF000-memory.dmp

    Filesize

    4KB

  • memory/3872-171-0x0000000004B30000-0x0000000004C4C000-memory.dmp

    Filesize

    1.1MB

  • memory/3872-143-0x0000000002B00000-0x0000000002C1C000-memory.dmp

    Filesize

    1.1MB

  • memory/4500-246-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4500-249-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4500-137-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4960-224-0x0000000004AB0000-0x0000000004B42000-memory.dmp

    Filesize

    584KB

  • memory/4960-245-0x0000000004F70000-0x0000000004F7A000-memory.dmp

    Filesize

    40KB

  • memory/4960-244-0x0000000004C90000-0x0000000004CA2000-memory.dmp

    Filesize

    72KB

  • memory/4960-223-0x0000000004FC0000-0x0000000005564000-memory.dmp

    Filesize

    5.6MB

  • memory/4960-222-0x0000000000180000-0x00000000001AA000-memory.dmp

    Filesize

    168KB