Analysis

  • max time kernel
    138s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2022, 00:04

General

  • Target

    48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe

  • Size

    603KB

  • MD5

    370d58e0c5c50b5d589e2c581864192f

  • SHA1

    422d5e3dcf16a303f1f6d58f21ebdb1096ed34fe

  • SHA256

    48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253

  • SHA512

    2be3888d97ab79f5a74a4ec81b43f22d8a2fafa5d2b24e4a423e4c1a3d4b6339e73221982cd35d531b56719c0b70f882288261212bf35e9eaca8bb15f915d5cd

  • SSDEEP

    12288:VIny5DYTmIt1C4PB+01KgYFvckkt0tkJmqp7dt:hUTmu15B+0sFxyJmgX

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe
    "C:\Users\Admin\AppData\Local\Temp\48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4724
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:2108
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:552
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:2140
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1744
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1352
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:2660
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4016
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:1124
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4112
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:1180
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:1568
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:2408

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsv7045.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nsv7045.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsv7045.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsv7045.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsv7045.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsv7045.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsv7045.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsv7045.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsv7045.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            a02cb91ae0b84972d35c8109f626e403

            SHA1

            a7b04a79d9467510066f5465fda780676dd4631b

            SHA256

            2b21bdffe53f5cc9ec9f380a973f3dca542d0efef394ef8f71c0cdbfb916ca01

            SHA512

            f20a07178668938a87b96cc514889b7e726b7debd4759ebba8beda2297b8f8b84e1c9be2a7c42cbb69982934badee14cc96da1e74a2dda34710f48823abaf1b9

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            a02cb91ae0b84972d35c8109f626e403

            SHA1

            a7b04a79d9467510066f5465fda780676dd4631b

            SHA256

            2b21bdffe53f5cc9ec9f380a973f3dca542d0efef394ef8f71c0cdbfb916ca01

            SHA512

            f20a07178668938a87b96cc514889b7e726b7debd4759ebba8beda2297b8f8b84e1c9be2a7c42cbb69982934badee14cc96da1e74a2dda34710f48823abaf1b9

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            a02cb91ae0b84972d35c8109f626e403

            SHA1

            a7b04a79d9467510066f5465fda780676dd4631b

            SHA256

            2b21bdffe53f5cc9ec9f380a973f3dca542d0efef394ef8f71c0cdbfb916ca01

            SHA512

            f20a07178668938a87b96cc514889b7e726b7debd4759ebba8beda2297b8f8b84e1c9be2a7c42cbb69982934badee14cc96da1e74a2dda34710f48823abaf1b9

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            a02cb91ae0b84972d35c8109f626e403

            SHA1

            a7b04a79d9467510066f5465fda780676dd4631b

            SHA256

            2b21bdffe53f5cc9ec9f380a973f3dca542d0efef394ef8f71c0cdbfb916ca01

            SHA512

            f20a07178668938a87b96cc514889b7e726b7debd4759ebba8beda2297b8f8b84e1c9be2a7c42cbb69982934badee14cc96da1e74a2dda34710f48823abaf1b9

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            23eb1e54777a27ecb88fb22b0c456934

            SHA1

            e02096d28509c0374599d83470c02fc887b0cacd

            SHA256

            65b182da10e819b7dd4933b0912b0d1038637d0ddea465ec87223fa936962bd1

            SHA512

            6f0586c31ffb3eaa7cbf62a893ed140ba731bc6810237d9916d76325ac5054fb0ebd662ede63b7db03f0e0c48bac3e0fdf4ea293686c66f9c5dc6c5f8a3c8c8a

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            23eb1e54777a27ecb88fb22b0c456934

            SHA1

            e02096d28509c0374599d83470c02fc887b0cacd

            SHA256

            65b182da10e819b7dd4933b0912b0d1038637d0ddea465ec87223fa936962bd1

            SHA512

            6f0586c31ffb3eaa7cbf62a893ed140ba731bc6810237d9916d76325ac5054fb0ebd662ede63b7db03f0e0c48bac3e0fdf4ea293686c66f9c5dc6c5f8a3c8c8a

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            23eb1e54777a27ecb88fb22b0c456934

            SHA1

            e02096d28509c0374599d83470c02fc887b0cacd

            SHA256

            65b182da10e819b7dd4933b0912b0d1038637d0ddea465ec87223fa936962bd1

            SHA512

            6f0586c31ffb3eaa7cbf62a893ed140ba731bc6810237d9916d76325ac5054fb0ebd662ede63b7db03f0e0c48bac3e0fdf4ea293686c66f9c5dc6c5f8a3c8c8a

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            c4f6b5e1fa1d1d3309f29f27b4abbff9

            SHA1

            f04ed5082b34efec3759f73e8c3f14ec3216f300

            SHA256

            256311e00a099b2ffac3b43b7404c662e5ace98c6fe3281ddd0d724e2af6a121

            SHA512

            b6b50ac7d1c148e4dff7ad5a7cc858d29d5021ad7aea891f3ab98b26a40e6ef99d769dd6dbcf84f1308ddb74c425cd04e41bb03854dc25507c9ff9fc69d49f9d

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            c4f6b5e1fa1d1d3309f29f27b4abbff9

            SHA1

            f04ed5082b34efec3759f73e8c3f14ec3216f300

            SHA256

            256311e00a099b2ffac3b43b7404c662e5ace98c6fe3281ddd0d724e2af6a121

            SHA512

            b6b50ac7d1c148e4dff7ad5a7cc858d29d5021ad7aea891f3ab98b26a40e6ef99d769dd6dbcf84f1308ddb74c425cd04e41bb03854dc25507c9ff9fc69d49f9d

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            de7d57f622b7046d24c3ebf9eadb54cc

            SHA1

            d04000bde411ae9a15eb90df92e5bf7ec2404215

            SHA256

            e5805aa10b5a2e6b8b45fbcc72048310984565bd87a3cecced3dd3a76f5c66bd

            SHA512

            594fce1cebd0980db52c35492f802e8e121b5c04cb40f81dca93cd5ebb675287024f84107cdaa0d1da953785046ee902699b23f8d09a69edb6c4df083958e562

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            de7d57f622b7046d24c3ebf9eadb54cc

            SHA1

            d04000bde411ae9a15eb90df92e5bf7ec2404215

            SHA256

            e5805aa10b5a2e6b8b45fbcc72048310984565bd87a3cecced3dd3a76f5c66bd

            SHA512

            594fce1cebd0980db52c35492f802e8e121b5c04cb40f81dca93cd5ebb675287024f84107cdaa0d1da953785046ee902699b23f8d09a69edb6c4df083958e562

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            de7d57f622b7046d24c3ebf9eadb54cc

            SHA1

            d04000bde411ae9a15eb90df92e5bf7ec2404215

            SHA256

            e5805aa10b5a2e6b8b45fbcc72048310984565bd87a3cecced3dd3a76f5c66bd

            SHA512

            594fce1cebd0980db52c35492f802e8e121b5c04cb40f81dca93cd5ebb675287024f84107cdaa0d1da953785046ee902699b23f8d09a69edb6c4df083958e562

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            f85efa37e7a5686d5a3b5ffd6c600f38

            SHA1

            b99150c7c712bc5c28b60a789efdf96803b7b1c7

            SHA256

            d9caa83d256b52ef2f5d1e6554bfd7e4ceb7356e8f2444c71bfccbab005acf1f

            SHA512

            3e11ea32c93420beca51c96d0744fc83226d0bd9eddde9ceb65f058c535f7f945738c5545c9bd4c15b48ea7bf771620bda7b911cd200976ff755286e51bcafbd

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            f85efa37e7a5686d5a3b5ffd6c600f38

            SHA1

            b99150c7c712bc5c28b60a789efdf96803b7b1c7

            SHA256

            d9caa83d256b52ef2f5d1e6554bfd7e4ceb7356e8f2444c71bfccbab005acf1f

            SHA512

            3e11ea32c93420beca51c96d0744fc83226d0bd9eddde9ceb65f058c535f7f945738c5545c9bd4c15b48ea7bf771620bda7b911cd200976ff755286e51bcafbd

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            f85efa37e7a5686d5a3b5ffd6c600f38

            SHA1

            b99150c7c712bc5c28b60a789efdf96803b7b1c7

            SHA256

            d9caa83d256b52ef2f5d1e6554bfd7e4ceb7356e8f2444c71bfccbab005acf1f

            SHA512

            3e11ea32c93420beca51c96d0744fc83226d0bd9eddde9ceb65f058c535f7f945738c5545c9bd4c15b48ea7bf771620bda7b911cd200976ff755286e51bcafbd

          • memory/4460-163-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/4460-137-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/4460-169-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB