Analysis
-
max time kernel
190s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe
Resource
win10v2004-20221111-en
General
-
Target
10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe
-
Size
601KB
-
MD5
adfbff0fe30dc8474f4a857ae2e65da8
-
SHA1
5aff50bedf1d348b39ad2310f55a053fa709cece
-
SHA256
10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d
-
SHA512
587bcc6cfdeae12debd6494e1662c0d88b6a363451b26a54e796f4aac8d60e86adcbfc9a1fa9b53b26ff80a990732062a0c6b8cee593de29bc00e34a11771544
-
SSDEEP
12288:JIny5DYTtrOi7IvqQPNNALuQySD5AWgARvfTB1/phOrVuLaqAYBsY:lUTtrOi6LOySViAFpwZrqhS
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe -
Executes dropped EXE 5 IoCs
pid Process 1976 installd.exe 4908 nethtsrv.exe 3276 netupdsrv.exe 3360 nethtsrv.exe 4948 netupdsrv.exe -
Loads dropped DLL 14 IoCs
pid Process 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 1976 installd.exe 4908 nethtsrv.exe 4908 nethtsrv.exe 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 3360 nethtsrv.exe 3360 nethtsrv.exe 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfpapi.dll 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe File created C:\Windows\SysWOW64\installd.exe 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe File created C:\Windows\SysWOW64\nethtsrv.exe 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe File created C:\Windows\SysWOW64\netupdsrv.exe 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe File created C:\Windows\SysWOW64\hfnapi.dll 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3360 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3728 wrote to memory of 4472 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 82 PID 3728 wrote to memory of 4472 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 82 PID 3728 wrote to memory of 4472 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 82 PID 4472 wrote to memory of 2216 4472 net.exe 84 PID 4472 wrote to memory of 2216 4472 net.exe 84 PID 4472 wrote to memory of 2216 4472 net.exe 84 PID 3728 wrote to memory of 732 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 85 PID 3728 wrote to memory of 732 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 85 PID 3728 wrote to memory of 732 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 85 PID 732 wrote to memory of 2364 732 net.exe 87 PID 732 wrote to memory of 2364 732 net.exe 87 PID 732 wrote to memory of 2364 732 net.exe 87 PID 3728 wrote to memory of 1976 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 88 PID 3728 wrote to memory of 1976 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 88 PID 3728 wrote to memory of 1976 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 88 PID 3728 wrote to memory of 4908 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 94 PID 3728 wrote to memory of 4908 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 94 PID 3728 wrote to memory of 4908 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 94 PID 3728 wrote to memory of 3276 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 96 PID 3728 wrote to memory of 3276 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 96 PID 3728 wrote to memory of 3276 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 96 PID 3728 wrote to memory of 1168 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 98 PID 3728 wrote to memory of 1168 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 98 PID 3728 wrote to memory of 1168 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 98 PID 1168 wrote to memory of 1780 1168 net.exe 100 PID 1168 wrote to memory of 1780 1168 net.exe 100 PID 1168 wrote to memory of 1780 1168 net.exe 100 PID 3728 wrote to memory of 2884 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 103 PID 3728 wrote to memory of 2884 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 103 PID 3728 wrote to memory of 2884 3728 10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe 103 PID 2884 wrote to memory of 4808 2884 net.exe 105 PID 2884 wrote to memory of 4808 2884 net.exe 105 PID 2884 wrote to memory of 4808 2884 net.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe"C:\Users\Admin\AppData\Local\Temp\10c4991bc31553b729b0af24ece2a03145c4fcade286df3fa494f45be99bb29d.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:2216
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:2364
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1976
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4908
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:3276
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1780
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:4808
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3360
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:4948
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5d07cba989ccd755359a9b0386f9594dc
SHA1c80167c40a9d0102753e975cca408f5328256f4f
SHA2565f3233d476e2d15c70e53211951f03a7afd7607dbca282c8eefaf12f03848bd8
SHA5126e285bf6658c45eb325e656ddbc6bf18810d0eb03b0368999b90611b2cc20140bbf8a6676f7962318b582d4ab73be884f5ec3aff8dadd79846f5d8abcf947310
-
Filesize
106KB
MD5d07cba989ccd755359a9b0386f9594dc
SHA1c80167c40a9d0102753e975cca408f5328256f4f
SHA2565f3233d476e2d15c70e53211951f03a7afd7607dbca282c8eefaf12f03848bd8
SHA5126e285bf6658c45eb325e656ddbc6bf18810d0eb03b0368999b90611b2cc20140bbf8a6676f7962318b582d4ab73be884f5ec3aff8dadd79846f5d8abcf947310
-
Filesize
106KB
MD5d07cba989ccd755359a9b0386f9594dc
SHA1c80167c40a9d0102753e975cca408f5328256f4f
SHA2565f3233d476e2d15c70e53211951f03a7afd7607dbca282c8eefaf12f03848bd8
SHA5126e285bf6658c45eb325e656ddbc6bf18810d0eb03b0368999b90611b2cc20140bbf8a6676f7962318b582d4ab73be884f5ec3aff8dadd79846f5d8abcf947310
-
Filesize
106KB
MD5d07cba989ccd755359a9b0386f9594dc
SHA1c80167c40a9d0102753e975cca408f5328256f4f
SHA2565f3233d476e2d15c70e53211951f03a7afd7607dbca282c8eefaf12f03848bd8
SHA5126e285bf6658c45eb325e656ddbc6bf18810d0eb03b0368999b90611b2cc20140bbf8a6676f7962318b582d4ab73be884f5ec3aff8dadd79846f5d8abcf947310
-
Filesize
241KB
MD58678e49515e256f633cc102f27c9eb34
SHA163b353cc09be6c16986f691ad2463d0dc5fb2c30
SHA2569e8b88329a189ee2d4775b86937c73f63c0726b4626fa3c3b4b124e3e8dbd38e
SHA5124e98e890dc316df6eed73bfc19b18aa106650908439af96a04e1c317dba6b82860222b9e01499ede85a6f8c3aa25cd02dc42a1b0c1f38542e71f6dfb3b8ca2ce
-
Filesize
241KB
MD58678e49515e256f633cc102f27c9eb34
SHA163b353cc09be6c16986f691ad2463d0dc5fb2c30
SHA2569e8b88329a189ee2d4775b86937c73f63c0726b4626fa3c3b4b124e3e8dbd38e
SHA5124e98e890dc316df6eed73bfc19b18aa106650908439af96a04e1c317dba6b82860222b9e01499ede85a6f8c3aa25cd02dc42a1b0c1f38542e71f6dfb3b8ca2ce
-
Filesize
241KB
MD58678e49515e256f633cc102f27c9eb34
SHA163b353cc09be6c16986f691ad2463d0dc5fb2c30
SHA2569e8b88329a189ee2d4775b86937c73f63c0726b4626fa3c3b4b124e3e8dbd38e
SHA5124e98e890dc316df6eed73bfc19b18aa106650908439af96a04e1c317dba6b82860222b9e01499ede85a6f8c3aa25cd02dc42a1b0c1f38542e71f6dfb3b8ca2ce
-
Filesize
108KB
MD5abe8457b5e811a85a8fe8d1bbf0bc083
SHA1017c2dd3891e47798840f5a1b50f510458b85b70
SHA25617b8395d5e1f59a23bf8d90a6c6c1361aabb660f86c555b3a64fa6c51a559132
SHA5120773257c15820bd00c395cc942a47c404da8009aa1ca882a5fb9d09c321f818c5c25e8fff6332d6e642c11feb9d87e80a34d38d89aa7b6f3d65f62fb1530bff0
-
Filesize
108KB
MD5abe8457b5e811a85a8fe8d1bbf0bc083
SHA1017c2dd3891e47798840f5a1b50f510458b85b70
SHA25617b8395d5e1f59a23bf8d90a6c6c1361aabb660f86c555b3a64fa6c51a559132
SHA5120773257c15820bd00c395cc942a47c404da8009aa1ca882a5fb9d09c321f818c5c25e8fff6332d6e642c11feb9d87e80a34d38d89aa7b6f3d65f62fb1530bff0
-
Filesize
176KB
MD5330853afd7b067a6a001386047624085
SHA1972581c59268f73fc3adee9b773b042300c42101
SHA256abe009542da56b316e18162d55e3fe1bb90f4b5b6bbe7a3e41a21c07f987b7f5
SHA51295cd5dff91f0fdad63be1292c47b8615fcc666f10ca90ff78ba37b07a32f90ee332a44eb40001b7ca06819eee793f8e666d51693dc16931be853143cb5b96e70
-
Filesize
176KB
MD5330853afd7b067a6a001386047624085
SHA1972581c59268f73fc3adee9b773b042300c42101
SHA256abe009542da56b316e18162d55e3fe1bb90f4b5b6bbe7a3e41a21c07f987b7f5
SHA51295cd5dff91f0fdad63be1292c47b8615fcc666f10ca90ff78ba37b07a32f90ee332a44eb40001b7ca06819eee793f8e666d51693dc16931be853143cb5b96e70
-
Filesize
176KB
MD5330853afd7b067a6a001386047624085
SHA1972581c59268f73fc3adee9b773b042300c42101
SHA256abe009542da56b316e18162d55e3fe1bb90f4b5b6bbe7a3e41a21c07f987b7f5
SHA51295cd5dff91f0fdad63be1292c47b8615fcc666f10ca90ff78ba37b07a32f90ee332a44eb40001b7ca06819eee793f8e666d51693dc16931be853143cb5b96e70
-
Filesize
158KB
MD598bb91993fd56569697efb5c99ace8e0
SHA1baa34241ae5eda5347245523a1ae93ce71ac92dc
SHA256648b2f38db097d38a9222b56be66e1e68b97cd6cb0968d41017409a97c78bf9c
SHA5126269d144e5baffe7a3794caebd68733ea9308991bdb3e0bec4c0e9a07d3c4827dd16cc84ddc4cfba02ae0648a21f0293a77914de4903150c929e262cd0061060
-
Filesize
158KB
MD598bb91993fd56569697efb5c99ace8e0
SHA1baa34241ae5eda5347245523a1ae93ce71ac92dc
SHA256648b2f38db097d38a9222b56be66e1e68b97cd6cb0968d41017409a97c78bf9c
SHA5126269d144e5baffe7a3794caebd68733ea9308991bdb3e0bec4c0e9a07d3c4827dd16cc84ddc4cfba02ae0648a21f0293a77914de4903150c929e262cd0061060
-
Filesize
158KB
MD598bb91993fd56569697efb5c99ace8e0
SHA1baa34241ae5eda5347245523a1ae93ce71ac92dc
SHA256648b2f38db097d38a9222b56be66e1e68b97cd6cb0968d41017409a97c78bf9c
SHA5126269d144e5baffe7a3794caebd68733ea9308991bdb3e0bec4c0e9a07d3c4827dd16cc84ddc4cfba02ae0648a21f0293a77914de4903150c929e262cd0061060