Analysis
-
max time kernel
138s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 00:04
Static task
static1
Behavioral task
behavioral1
Sample
48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe
Resource
win10v2004-20220812-en
General
-
Target
48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe
-
Size
603KB
-
MD5
370d58e0c5c50b5d589e2c581864192f
-
SHA1
422d5e3dcf16a303f1f6d58f21ebdb1096ed34fe
-
SHA256
48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253
-
SHA512
2be3888d97ab79f5a74a4ec81b43f22d8a2fafa5d2b24e4a423e4c1a3d4b6339e73221982cd35d531b56719c0b70f882288261212bf35e9eaca8bb15f915d5cd
-
SSDEEP
12288:VIny5DYTmIt1C4PB+01KgYFvckkt0tkJmqp7dt:hUTmu15B+0sFxyJmgX
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe -
Executes dropped EXE 5 IoCs
pid Process 1744 installd.exe 1352 nethtsrv.exe 2660 netupdsrv.exe 1568 nethtsrv.exe 2408 netupdsrv.exe -
Loads dropped DLL 14 IoCs
pid Process 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 1744 installd.exe 1352 nethtsrv.exe 1352 nethtsrv.exe 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 1568 nethtsrv.exe 1568 nethtsrv.exe 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfnapi.dll 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe File created C:\Windows\SysWOW64\hfpapi.dll 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe File created C:\Windows\SysWOW64\installd.exe 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe File created C:\Windows\SysWOW64\nethtsrv.exe 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe File created C:\Windows\SysWOW64\netupdsrv.exe 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1568 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4460 wrote to memory of 4724 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 79 PID 4460 wrote to memory of 4724 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 79 PID 4460 wrote to memory of 4724 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 79 PID 4724 wrote to memory of 2108 4724 net.exe 81 PID 4724 wrote to memory of 2108 4724 net.exe 81 PID 4724 wrote to memory of 2108 4724 net.exe 81 PID 4460 wrote to memory of 552 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 82 PID 4460 wrote to memory of 552 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 82 PID 4460 wrote to memory of 552 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 82 PID 552 wrote to memory of 2140 552 net.exe 84 PID 552 wrote to memory of 2140 552 net.exe 84 PID 552 wrote to memory of 2140 552 net.exe 84 PID 4460 wrote to memory of 1744 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 85 PID 4460 wrote to memory of 1744 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 85 PID 4460 wrote to memory of 1744 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 85 PID 4460 wrote to memory of 1352 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 86 PID 4460 wrote to memory of 1352 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 86 PID 4460 wrote to memory of 1352 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 86 PID 4460 wrote to memory of 2660 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 88 PID 4460 wrote to memory of 2660 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 88 PID 4460 wrote to memory of 2660 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 88 PID 4460 wrote to memory of 4016 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 90 PID 4460 wrote to memory of 4016 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 90 PID 4460 wrote to memory of 4016 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 90 PID 4016 wrote to memory of 1124 4016 net.exe 92 PID 4016 wrote to memory of 1124 4016 net.exe 92 PID 4016 wrote to memory of 1124 4016 net.exe 92 PID 4460 wrote to memory of 4112 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 94 PID 4460 wrote to memory of 4112 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 94 PID 4460 wrote to memory of 4112 4460 48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe 94 PID 4112 wrote to memory of 1180 4112 net.exe 96 PID 4112 wrote to memory of 1180 4112 net.exe 96 PID 4112 wrote to memory of 1180 4112 net.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe"C:\Users\Admin\AppData\Local\Temp\48d7fa8c136bace6749ba8862ebc1d721667cfbd872e752446fbcefc79261253.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:2108
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:2140
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1744
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1352
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:2660
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1124
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1180
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:2408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5a02cb91ae0b84972d35c8109f626e403
SHA1a7b04a79d9467510066f5465fda780676dd4631b
SHA2562b21bdffe53f5cc9ec9f380a973f3dca542d0efef394ef8f71c0cdbfb916ca01
SHA512f20a07178668938a87b96cc514889b7e726b7debd4759ebba8beda2297b8f8b84e1c9be2a7c42cbb69982934badee14cc96da1e74a2dda34710f48823abaf1b9
-
Filesize
106KB
MD5a02cb91ae0b84972d35c8109f626e403
SHA1a7b04a79d9467510066f5465fda780676dd4631b
SHA2562b21bdffe53f5cc9ec9f380a973f3dca542d0efef394ef8f71c0cdbfb916ca01
SHA512f20a07178668938a87b96cc514889b7e726b7debd4759ebba8beda2297b8f8b84e1c9be2a7c42cbb69982934badee14cc96da1e74a2dda34710f48823abaf1b9
-
Filesize
106KB
MD5a02cb91ae0b84972d35c8109f626e403
SHA1a7b04a79d9467510066f5465fda780676dd4631b
SHA2562b21bdffe53f5cc9ec9f380a973f3dca542d0efef394ef8f71c0cdbfb916ca01
SHA512f20a07178668938a87b96cc514889b7e726b7debd4759ebba8beda2297b8f8b84e1c9be2a7c42cbb69982934badee14cc96da1e74a2dda34710f48823abaf1b9
-
Filesize
106KB
MD5a02cb91ae0b84972d35c8109f626e403
SHA1a7b04a79d9467510066f5465fda780676dd4631b
SHA2562b21bdffe53f5cc9ec9f380a973f3dca542d0efef394ef8f71c0cdbfb916ca01
SHA512f20a07178668938a87b96cc514889b7e726b7debd4759ebba8beda2297b8f8b84e1c9be2a7c42cbb69982934badee14cc96da1e74a2dda34710f48823abaf1b9
-
Filesize
241KB
MD523eb1e54777a27ecb88fb22b0c456934
SHA1e02096d28509c0374599d83470c02fc887b0cacd
SHA25665b182da10e819b7dd4933b0912b0d1038637d0ddea465ec87223fa936962bd1
SHA5126f0586c31ffb3eaa7cbf62a893ed140ba731bc6810237d9916d76325ac5054fb0ebd662ede63b7db03f0e0c48bac3e0fdf4ea293686c66f9c5dc6c5f8a3c8c8a
-
Filesize
241KB
MD523eb1e54777a27ecb88fb22b0c456934
SHA1e02096d28509c0374599d83470c02fc887b0cacd
SHA25665b182da10e819b7dd4933b0912b0d1038637d0ddea465ec87223fa936962bd1
SHA5126f0586c31ffb3eaa7cbf62a893ed140ba731bc6810237d9916d76325ac5054fb0ebd662ede63b7db03f0e0c48bac3e0fdf4ea293686c66f9c5dc6c5f8a3c8c8a
-
Filesize
241KB
MD523eb1e54777a27ecb88fb22b0c456934
SHA1e02096d28509c0374599d83470c02fc887b0cacd
SHA25665b182da10e819b7dd4933b0912b0d1038637d0ddea465ec87223fa936962bd1
SHA5126f0586c31ffb3eaa7cbf62a893ed140ba731bc6810237d9916d76325ac5054fb0ebd662ede63b7db03f0e0c48bac3e0fdf4ea293686c66f9c5dc6c5f8a3c8c8a
-
Filesize
108KB
MD5c4f6b5e1fa1d1d3309f29f27b4abbff9
SHA1f04ed5082b34efec3759f73e8c3f14ec3216f300
SHA256256311e00a099b2ffac3b43b7404c662e5ace98c6fe3281ddd0d724e2af6a121
SHA512b6b50ac7d1c148e4dff7ad5a7cc858d29d5021ad7aea891f3ab98b26a40e6ef99d769dd6dbcf84f1308ddb74c425cd04e41bb03854dc25507c9ff9fc69d49f9d
-
Filesize
108KB
MD5c4f6b5e1fa1d1d3309f29f27b4abbff9
SHA1f04ed5082b34efec3759f73e8c3f14ec3216f300
SHA256256311e00a099b2ffac3b43b7404c662e5ace98c6fe3281ddd0d724e2af6a121
SHA512b6b50ac7d1c148e4dff7ad5a7cc858d29d5021ad7aea891f3ab98b26a40e6ef99d769dd6dbcf84f1308ddb74c425cd04e41bb03854dc25507c9ff9fc69d49f9d
-
Filesize
176KB
MD5de7d57f622b7046d24c3ebf9eadb54cc
SHA1d04000bde411ae9a15eb90df92e5bf7ec2404215
SHA256e5805aa10b5a2e6b8b45fbcc72048310984565bd87a3cecced3dd3a76f5c66bd
SHA512594fce1cebd0980db52c35492f802e8e121b5c04cb40f81dca93cd5ebb675287024f84107cdaa0d1da953785046ee902699b23f8d09a69edb6c4df083958e562
-
Filesize
176KB
MD5de7d57f622b7046d24c3ebf9eadb54cc
SHA1d04000bde411ae9a15eb90df92e5bf7ec2404215
SHA256e5805aa10b5a2e6b8b45fbcc72048310984565bd87a3cecced3dd3a76f5c66bd
SHA512594fce1cebd0980db52c35492f802e8e121b5c04cb40f81dca93cd5ebb675287024f84107cdaa0d1da953785046ee902699b23f8d09a69edb6c4df083958e562
-
Filesize
176KB
MD5de7d57f622b7046d24c3ebf9eadb54cc
SHA1d04000bde411ae9a15eb90df92e5bf7ec2404215
SHA256e5805aa10b5a2e6b8b45fbcc72048310984565bd87a3cecced3dd3a76f5c66bd
SHA512594fce1cebd0980db52c35492f802e8e121b5c04cb40f81dca93cd5ebb675287024f84107cdaa0d1da953785046ee902699b23f8d09a69edb6c4df083958e562
-
Filesize
158KB
MD5f85efa37e7a5686d5a3b5ffd6c600f38
SHA1b99150c7c712bc5c28b60a789efdf96803b7b1c7
SHA256d9caa83d256b52ef2f5d1e6554bfd7e4ceb7356e8f2444c71bfccbab005acf1f
SHA5123e11ea32c93420beca51c96d0744fc83226d0bd9eddde9ceb65f058c535f7f945738c5545c9bd4c15b48ea7bf771620bda7b911cd200976ff755286e51bcafbd
-
Filesize
158KB
MD5f85efa37e7a5686d5a3b5ffd6c600f38
SHA1b99150c7c712bc5c28b60a789efdf96803b7b1c7
SHA256d9caa83d256b52ef2f5d1e6554bfd7e4ceb7356e8f2444c71bfccbab005acf1f
SHA5123e11ea32c93420beca51c96d0744fc83226d0bd9eddde9ceb65f058c535f7f945738c5545c9bd4c15b48ea7bf771620bda7b911cd200976ff755286e51bcafbd
-
Filesize
158KB
MD5f85efa37e7a5686d5a3b5ffd6c600f38
SHA1b99150c7c712bc5c28b60a789efdf96803b7b1c7
SHA256d9caa83d256b52ef2f5d1e6554bfd7e4ceb7356e8f2444c71bfccbab005acf1f
SHA5123e11ea32c93420beca51c96d0744fc83226d0bd9eddde9ceb65f058c535f7f945738c5545c9bd4c15b48ea7bf771620bda7b911cd200976ff755286e51bcafbd