Analysis

  • max time kernel
    224s
  • max time network
    241s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2022 00:20

General

  • Target

    bbede1dac9f30ec98e00fc07016f4e3e2d16f2eb44214ce6454fa49e3e396a9f.exe

  • Size

    695KB

  • MD5

    4b51483bca844930d77f04e6b89b0835

  • SHA1

    fe0010b8e1761acc7f0bc047a8fd83f0d329870b

  • SHA256

    bbede1dac9f30ec98e00fc07016f4e3e2d16f2eb44214ce6454fa49e3e396a9f

  • SHA512

    b1c17a66dd79e93635e98591c6fcb0697b0addd62a2a966777bd7cd654cd804cb1f30ecf5b6fa38db7afa704c2c507d3e5769396ee7aad884774b9173a330c08

  • SSDEEP

    12288:YAbu3fQ+thk6Ez1bfUUnBk56hTId7u/SiXylhtWrrY0juuWDOP:YAbuPPEzxfvG5zdOutWg0i0

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbede1dac9f30ec98e00fc07016f4e3e2d16f2eb44214ce6454fa49e3e396a9f.exe
    "C:\Users\Admin\AppData\Local\Temp\bbede1dac9f30ec98e00fc07016f4e3e2d16f2eb44214ce6454fa49e3e396a9f.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4200
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3496
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:3444
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4604
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:1644
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:900
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4116
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:872
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3692
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:1156
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2288
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:4576
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:1816
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:432

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsw16E0.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nsw16E0.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsw16E0.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsw16E0.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsw16E0.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsw16E0.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsw16E0.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsw16E0.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsw16E0.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            52195a791158f3b9571abe067e8c4872

            SHA1

            41776f0244d79d765e2b9e9c15db00622ab497b8

            SHA256

            d2dcc5b64294bbe7c80cf128c2782fd70995c12d29e728fc3c0da7f412a9de13

            SHA512

            cfbbb081a1a1f616aba9493b7b8c6fc47a950c36055afd64717897acc7f90ef237d28729b92c528d77bbc7012decebe9be6fc2489961dfcead07bfe1ba9a04c7

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            52195a791158f3b9571abe067e8c4872

            SHA1

            41776f0244d79d765e2b9e9c15db00622ab497b8

            SHA256

            d2dcc5b64294bbe7c80cf128c2782fd70995c12d29e728fc3c0da7f412a9de13

            SHA512

            cfbbb081a1a1f616aba9493b7b8c6fc47a950c36055afd64717897acc7f90ef237d28729b92c528d77bbc7012decebe9be6fc2489961dfcead07bfe1ba9a04c7

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            52195a791158f3b9571abe067e8c4872

            SHA1

            41776f0244d79d765e2b9e9c15db00622ab497b8

            SHA256

            d2dcc5b64294bbe7c80cf128c2782fd70995c12d29e728fc3c0da7f412a9de13

            SHA512

            cfbbb081a1a1f616aba9493b7b8c6fc47a950c36055afd64717897acc7f90ef237d28729b92c528d77bbc7012decebe9be6fc2489961dfcead07bfe1ba9a04c7

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            52195a791158f3b9571abe067e8c4872

            SHA1

            41776f0244d79d765e2b9e9c15db00622ab497b8

            SHA256

            d2dcc5b64294bbe7c80cf128c2782fd70995c12d29e728fc3c0da7f412a9de13

            SHA512

            cfbbb081a1a1f616aba9493b7b8c6fc47a950c36055afd64717897acc7f90ef237d28729b92c528d77bbc7012decebe9be6fc2489961dfcead07bfe1ba9a04c7

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            6ae99bf8abe9f955facac3f162531486

            SHA1

            f8a47d2b7cb18b18d9b432b46d69f9d447c50406

            SHA256

            fca430dc476917af64d49f66423398523f23f6413035b5f5ec7226fa5ff6dc94

            SHA512

            1cd21d0446148715eb9a1b75eb90ee7c91661f46244896384fa0eec07bce74feb31fb0e37aa0f8e5bda7bb314a62ea825dc30d8adc611a6c5ae917c0f12028cc

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            6ae99bf8abe9f955facac3f162531486

            SHA1

            f8a47d2b7cb18b18d9b432b46d69f9d447c50406

            SHA256

            fca430dc476917af64d49f66423398523f23f6413035b5f5ec7226fa5ff6dc94

            SHA512

            1cd21d0446148715eb9a1b75eb90ee7c91661f46244896384fa0eec07bce74feb31fb0e37aa0f8e5bda7bb314a62ea825dc30d8adc611a6c5ae917c0f12028cc

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            6ae99bf8abe9f955facac3f162531486

            SHA1

            f8a47d2b7cb18b18d9b432b46d69f9d447c50406

            SHA256

            fca430dc476917af64d49f66423398523f23f6413035b5f5ec7226fa5ff6dc94

            SHA512

            1cd21d0446148715eb9a1b75eb90ee7c91661f46244896384fa0eec07bce74feb31fb0e37aa0f8e5bda7bb314a62ea825dc30d8adc611a6c5ae917c0f12028cc

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            8b9f408e63cf7b028dd7d957515c4d16

            SHA1

            c8e263584db524d8ee583ff7d53d4190462681d8

            SHA256

            4aa8a7ccd2839c4e5dc5c0e849c6a2ba9afd8fd8212c5a507b56f04fe3443f66

            SHA512

            2aece257645e91b8c8c4c142d8640b28cc9cb96c2118c62b38f15ff102abc143cdc5ef3b75a9a8885023bbf9b3ff0582102d2f3fe55da7420bcf98a96832f8d8

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            8b9f408e63cf7b028dd7d957515c4d16

            SHA1

            c8e263584db524d8ee583ff7d53d4190462681d8

            SHA256

            4aa8a7ccd2839c4e5dc5c0e849c6a2ba9afd8fd8212c5a507b56f04fe3443f66

            SHA512

            2aece257645e91b8c8c4c142d8640b28cc9cb96c2118c62b38f15ff102abc143cdc5ef3b75a9a8885023bbf9b3ff0582102d2f3fe55da7420bcf98a96832f8d8

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            c6237fdc519e03614ec58c479e172f21

            SHA1

            2914e369b8ff08e202346d278399bbe633fe9ef5

            SHA256

            a345f13dfa49d0dd2a683395e71706df2bf3ed44ef0f0bee056e6112eb298676

            SHA512

            745d12df97a7ca643f51cf45648ddf23ed32b42674217a0562d373fb3b4e93894e141fbf55497b3c417fda4e3564d492829808952ef87eb92b43fc9e8754ad7a

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            c6237fdc519e03614ec58c479e172f21

            SHA1

            2914e369b8ff08e202346d278399bbe633fe9ef5

            SHA256

            a345f13dfa49d0dd2a683395e71706df2bf3ed44ef0f0bee056e6112eb298676

            SHA512

            745d12df97a7ca643f51cf45648ddf23ed32b42674217a0562d373fb3b4e93894e141fbf55497b3c417fda4e3564d492829808952ef87eb92b43fc9e8754ad7a

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            c6237fdc519e03614ec58c479e172f21

            SHA1

            2914e369b8ff08e202346d278399bbe633fe9ef5

            SHA256

            a345f13dfa49d0dd2a683395e71706df2bf3ed44ef0f0bee056e6112eb298676

            SHA512

            745d12df97a7ca643f51cf45648ddf23ed32b42674217a0562d373fb3b4e93894e141fbf55497b3c417fda4e3564d492829808952ef87eb92b43fc9e8754ad7a

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            327fa4f5e0b5589b13df146c30072a29

            SHA1

            2d49fa98a6544cb17ce45529f07a596aeffa4673

            SHA256

            fa134bfe3fd6fdd00c7f11bfd82e63c198bc495a3a1fb19ef3a7b9df81df224f

            SHA512

            3697d4dcddbb46b94b71c4c125a73f073f35e98404cca4c308b85699cffc524ab8c05bfb4e9f92bff5700af40e365745585b647a9e9e5f1d5e1e0c942f9b403d

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            327fa4f5e0b5589b13df146c30072a29

            SHA1

            2d49fa98a6544cb17ce45529f07a596aeffa4673

            SHA256

            fa134bfe3fd6fdd00c7f11bfd82e63c198bc495a3a1fb19ef3a7b9df81df224f

            SHA512

            3697d4dcddbb46b94b71c4c125a73f073f35e98404cca4c308b85699cffc524ab8c05bfb4e9f92bff5700af40e365745585b647a9e9e5f1d5e1e0c942f9b403d

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            327fa4f5e0b5589b13df146c30072a29

            SHA1

            2d49fa98a6544cb17ce45529f07a596aeffa4673

            SHA256

            fa134bfe3fd6fdd00c7f11bfd82e63c198bc495a3a1fb19ef3a7b9df81df224f

            SHA512

            3697d4dcddbb46b94b71c4c125a73f073f35e98404cca4c308b85699cffc524ab8c05bfb4e9f92bff5700af40e365745585b647a9e9e5f1d5e1e0c942f9b403d

          • memory/872-154-0x0000000000000000-mapping.dmp

          • memory/900-142-0x0000000000000000-mapping.dmp

          • memory/1156-160-0x0000000000000000-mapping.dmp

          • memory/1644-140-0x0000000000000000-mapping.dmp

          • memory/2288-166-0x0000000000000000-mapping.dmp

          • memory/3444-136-0x0000000000000000-mapping.dmp

          • memory/3496-135-0x0000000000000000-mapping.dmp

          • memory/3692-159-0x0000000000000000-mapping.dmp

          • memory/4116-148-0x0000000000000000-mapping.dmp

          • memory/4200-141-0x0000000000340000-0x00000000007BE000-memory.dmp

            Filesize

            4.5MB

          • memory/4200-147-0x0000000000340000-0x00000000007BE000-memory.dmp

            Filesize

            4.5MB

          • memory/4200-169-0x0000000000340000-0x00000000007BE000-memory.dmp

            Filesize

            4.5MB

          • memory/4576-167-0x0000000000000000-mapping.dmp

          • memory/4604-139-0x0000000000000000-mapping.dmp