Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 00:02
Static task
static1
Behavioral task
behavioral1
Sample
5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe
Resource
win10v2004-20221111-en
General
-
Target
5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe
-
Size
602KB
-
MD5
05239eb2cb528477354107e231b9629b
-
SHA1
ceb65759138277df695cf04d7d6ea30ea3044915
-
SHA256
5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093
-
SHA512
a19da673c0ff2c811a8a6c9e724a86bd2cb9cd08d5ac8953d5c11767afd72bcd08b8ef9fc7ddb514783c269b7716158bdf8b54c8aaa3f0a51fb67f8b527affc6
-
SSDEEP
12288:WIny5DYTtgkmZ0HkkkoMHcqICiAww+v6E6Eryo5e:YUTtgkmZtR7D3Gfe
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe -
Executes dropped EXE 5 IoCs
pid Process 1756 installd.exe 176 nethtsrv.exe 4392 netupdsrv.exe 5044 nethtsrv.exe 2832 netupdsrv.exe -
Loads dropped DLL 14 IoCs
pid Process 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 1756 installd.exe 176 nethtsrv.exe 176 nethtsrv.exe 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 5044 nethtsrv.exe 5044 nethtsrv.exe 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfpapi.dll 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe File created C:\Windows\SysWOW64\installd.exe 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe File created C:\Windows\SysWOW64\nethtsrv.exe 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe File created C:\Windows\SysWOW64\netupdsrv.exe 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe File created C:\Windows\SysWOW64\hfnapi.dll 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\ver.xml 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe File created C:\Program Files (x86)\Common Files\Config\data.xml 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5044 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4464 wrote to memory of 3372 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 85 PID 4464 wrote to memory of 3372 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 85 PID 4464 wrote to memory of 3372 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 85 PID 3372 wrote to memory of 4536 3372 net.exe 87 PID 3372 wrote to memory of 4536 3372 net.exe 87 PID 3372 wrote to memory of 4536 3372 net.exe 87 PID 4464 wrote to memory of 3668 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 88 PID 4464 wrote to memory of 3668 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 88 PID 4464 wrote to memory of 3668 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 88 PID 3668 wrote to memory of 4676 3668 net.exe 90 PID 3668 wrote to memory of 4676 3668 net.exe 90 PID 3668 wrote to memory of 4676 3668 net.exe 90 PID 4464 wrote to memory of 1756 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 91 PID 4464 wrote to memory of 1756 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 91 PID 4464 wrote to memory of 1756 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 91 PID 4464 wrote to memory of 176 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 92 PID 4464 wrote to memory of 176 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 92 PID 4464 wrote to memory of 176 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 92 PID 4464 wrote to memory of 4392 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 94 PID 4464 wrote to memory of 4392 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 94 PID 4464 wrote to memory of 4392 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 94 PID 4464 wrote to memory of 3100 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 96 PID 4464 wrote to memory of 3100 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 96 PID 4464 wrote to memory of 3100 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 96 PID 3100 wrote to memory of 3824 3100 net.exe 98 PID 3100 wrote to memory of 3824 3100 net.exe 98 PID 3100 wrote to memory of 3824 3100 net.exe 98 PID 4464 wrote to memory of 3644 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 100 PID 4464 wrote to memory of 3644 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 100 PID 4464 wrote to memory of 3644 4464 5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe 100 PID 3644 wrote to memory of 3620 3644 net.exe 102 PID 3644 wrote to memory of 3620 3644 net.exe 102 PID 3644 wrote to memory of 3620 3644 net.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe"C:\Users\Admin\AppData\Local\Temp\5d366c0fb784aeda311c635caf31279da17fddb8f70a30fe0f1d5255afbf6093.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:4536
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:4676
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1756
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:176
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:4392
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:3824
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:3620
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:2832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD54ed58c8adf4fbed82dea64311fd621f0
SHA1d5afd5589f81607db44bf39c3eb50010921b222a
SHA25693f481f15b4ea5022a6c85efbe949efdcc02a770dbc650dea5f64d665d538502
SHA512397a779727a379bad63d53da20b7ef81ba3d4780f644f345fdb7eee0667db5a6085611760c5db44cd6d4b1e85453d0e9777808018957def327f31038683a1ae4
-
Filesize
106KB
MD54ed58c8adf4fbed82dea64311fd621f0
SHA1d5afd5589f81607db44bf39c3eb50010921b222a
SHA25693f481f15b4ea5022a6c85efbe949efdcc02a770dbc650dea5f64d665d538502
SHA512397a779727a379bad63d53da20b7ef81ba3d4780f644f345fdb7eee0667db5a6085611760c5db44cd6d4b1e85453d0e9777808018957def327f31038683a1ae4
-
Filesize
106KB
MD54ed58c8adf4fbed82dea64311fd621f0
SHA1d5afd5589f81607db44bf39c3eb50010921b222a
SHA25693f481f15b4ea5022a6c85efbe949efdcc02a770dbc650dea5f64d665d538502
SHA512397a779727a379bad63d53da20b7ef81ba3d4780f644f345fdb7eee0667db5a6085611760c5db44cd6d4b1e85453d0e9777808018957def327f31038683a1ae4
-
Filesize
106KB
MD54ed58c8adf4fbed82dea64311fd621f0
SHA1d5afd5589f81607db44bf39c3eb50010921b222a
SHA25693f481f15b4ea5022a6c85efbe949efdcc02a770dbc650dea5f64d665d538502
SHA512397a779727a379bad63d53da20b7ef81ba3d4780f644f345fdb7eee0667db5a6085611760c5db44cd6d4b1e85453d0e9777808018957def327f31038683a1ae4
-
Filesize
241KB
MD532160a2c852ef7a5ef0fcdf8c47534db
SHA10c47dcde402dcbf4549b2b41b3796a8b02836a3f
SHA256f500b128527d506c2d90c9a4ad62a7eb7dc712e8c63e90d4bd83945d74402dd7
SHA512c628a4d1383752ce8fdfb7cea537267caf501cb98bcd86ca19e115d7ad1fd1fe4b82456cf598d3c585830c52a23bba959af0c5bc4442ae9654ba1bcbe977f295
-
Filesize
241KB
MD532160a2c852ef7a5ef0fcdf8c47534db
SHA10c47dcde402dcbf4549b2b41b3796a8b02836a3f
SHA256f500b128527d506c2d90c9a4ad62a7eb7dc712e8c63e90d4bd83945d74402dd7
SHA512c628a4d1383752ce8fdfb7cea537267caf501cb98bcd86ca19e115d7ad1fd1fe4b82456cf598d3c585830c52a23bba959af0c5bc4442ae9654ba1bcbe977f295
-
Filesize
241KB
MD532160a2c852ef7a5ef0fcdf8c47534db
SHA10c47dcde402dcbf4549b2b41b3796a8b02836a3f
SHA256f500b128527d506c2d90c9a4ad62a7eb7dc712e8c63e90d4bd83945d74402dd7
SHA512c628a4d1383752ce8fdfb7cea537267caf501cb98bcd86ca19e115d7ad1fd1fe4b82456cf598d3c585830c52a23bba959af0c5bc4442ae9654ba1bcbe977f295
-
Filesize
108KB
MD52399ff9eb0fed18634891c19896e6a7c
SHA142e08dd74e8397526b1cb5565b7ce10307ae16f3
SHA2561b5eec795c4074d2c9c11f804dd40a2a6bdae9c485cce7feb85248498bd82434
SHA5122faf25df824d2bdd324a0b6406c40d6881dc3acd7eef283fa3cd41f796ae25e4d32498d43a43ce506a750f00452b87be2e267a2c2b5fce74c4fdab78bfed4eb5
-
Filesize
108KB
MD52399ff9eb0fed18634891c19896e6a7c
SHA142e08dd74e8397526b1cb5565b7ce10307ae16f3
SHA2561b5eec795c4074d2c9c11f804dd40a2a6bdae9c485cce7feb85248498bd82434
SHA5122faf25df824d2bdd324a0b6406c40d6881dc3acd7eef283fa3cd41f796ae25e4d32498d43a43ce506a750f00452b87be2e267a2c2b5fce74c4fdab78bfed4eb5
-
Filesize
176KB
MD547c931a4d528f248f6e4911ce0e0007c
SHA1d2c32611392335b9ac688b048c2d51fd2286e72d
SHA25608dc8e9ec56b0f31eaa871fafa43688572c26f1bce4d459af4e90570cf98a155
SHA51245beb482389c44ad5939d19e4354c630341fce7f3c0aba519208c58b382c4dfc8e89cc879af4f165f2f9fffb4d4697cadb458ff9f5915bda374c62cef32b3538
-
Filesize
176KB
MD547c931a4d528f248f6e4911ce0e0007c
SHA1d2c32611392335b9ac688b048c2d51fd2286e72d
SHA25608dc8e9ec56b0f31eaa871fafa43688572c26f1bce4d459af4e90570cf98a155
SHA51245beb482389c44ad5939d19e4354c630341fce7f3c0aba519208c58b382c4dfc8e89cc879af4f165f2f9fffb4d4697cadb458ff9f5915bda374c62cef32b3538
-
Filesize
176KB
MD547c931a4d528f248f6e4911ce0e0007c
SHA1d2c32611392335b9ac688b048c2d51fd2286e72d
SHA25608dc8e9ec56b0f31eaa871fafa43688572c26f1bce4d459af4e90570cf98a155
SHA51245beb482389c44ad5939d19e4354c630341fce7f3c0aba519208c58b382c4dfc8e89cc879af4f165f2f9fffb4d4697cadb458ff9f5915bda374c62cef32b3538
-
Filesize
158KB
MD5683ecc64a796d4a4bbe5de6684d3c802
SHA18329d1b755429ffbe8cc1835a312ac6fd6abc84e
SHA256a09f02157d389964647d84354d117e6a81c5bb9c4dfc1de1d0d635d7f4dac335
SHA51237ed93133117b23664ab9a248b15cac57924f22d155194e7965d50b0b64ddac9ddefcb17f727f9d20a89e860b6db06dff3062b9043ce50c0f4eea9be258b2c1d
-
Filesize
158KB
MD5683ecc64a796d4a4bbe5de6684d3c802
SHA18329d1b755429ffbe8cc1835a312ac6fd6abc84e
SHA256a09f02157d389964647d84354d117e6a81c5bb9c4dfc1de1d0d635d7f4dac335
SHA51237ed93133117b23664ab9a248b15cac57924f22d155194e7965d50b0b64ddac9ddefcb17f727f9d20a89e860b6db06dff3062b9043ce50c0f4eea9be258b2c1d
-
Filesize
158KB
MD5683ecc64a796d4a4bbe5de6684d3c802
SHA18329d1b755429ffbe8cc1835a312ac6fd6abc84e
SHA256a09f02157d389964647d84354d117e6a81c5bb9c4dfc1de1d0d635d7f4dac335
SHA51237ed93133117b23664ab9a248b15cac57924f22d155194e7965d50b0b64ddac9ddefcb17f727f9d20a89e860b6db06dff3062b9043ce50c0f4eea9be258b2c1d