Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 00:25
Static task
static1
Behavioral task
behavioral1
Sample
32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe
Resource
win10v2004-20220812-en
General
-
Target
32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe
-
Size
695KB
-
MD5
43af0121b3b5ce65684c3745d2f70b74
-
SHA1
1fbf76ba2ee4bf2bc0c8553de914ee330af2785b
-
SHA256
32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8
-
SHA512
f3bb1af2b5a1586eb8d6ce82ea6097ba27b2de6cdef01752e641f7863bb0b186b73fd90d8287e35dfe7116f694e059c9ed6eeb00bd37cb411fd501e74534e873
-
SSDEEP
12288:VAbu3fQ+thk6EzmbfuY9/3JuNi5HSR+6BedCW18fWpfsqpLoCYE+:VAbuPPEzqfzfANi5HSR+Zo+dR1JvYE+
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe -
Executes dropped EXE 5 IoCs
pid Process 5008 installd.exe 4864 nethtsrv.exe 2076 netupdsrv.exe 4916 nethtsrv.exe 2376 netupdsrv.exe -
Loads dropped DLL 14 IoCs
pid Process 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 5008 installd.exe 4864 nethtsrv.exe 4864 nethtsrv.exe 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 4916 nethtsrv.exe 4916 nethtsrv.exe 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfnapi.dll 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe File created C:\Windows\SysWOW64\hfpapi.dll 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe File created C:\Windows\SysWOW64\installd.exe 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe File created C:\Windows\SysWOW64\nethtsrv.exe 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe File created C:\Windows\SysWOW64\netupdsrv.exe 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\ver.xml 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe File created C:\Program Files (x86)\Common Files\Config\data.xml 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4916 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2412 wrote to memory of 3292 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 79 PID 2412 wrote to memory of 3292 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 79 PID 2412 wrote to memory of 3292 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 79 PID 3292 wrote to memory of 4364 3292 net.exe 81 PID 3292 wrote to memory of 4364 3292 net.exe 81 PID 3292 wrote to memory of 4364 3292 net.exe 81 PID 2412 wrote to memory of 1836 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 82 PID 2412 wrote to memory of 1836 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 82 PID 2412 wrote to memory of 1836 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 82 PID 1836 wrote to memory of 5048 1836 net.exe 84 PID 1836 wrote to memory of 5048 1836 net.exe 84 PID 1836 wrote to memory of 5048 1836 net.exe 84 PID 2412 wrote to memory of 5008 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 85 PID 2412 wrote to memory of 5008 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 85 PID 2412 wrote to memory of 5008 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 85 PID 2412 wrote to memory of 4864 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 86 PID 2412 wrote to memory of 4864 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 86 PID 2412 wrote to memory of 4864 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 86 PID 2412 wrote to memory of 2076 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 88 PID 2412 wrote to memory of 2076 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 88 PID 2412 wrote to memory of 2076 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 88 PID 2412 wrote to memory of 3716 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 90 PID 2412 wrote to memory of 3716 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 90 PID 2412 wrote to memory of 3716 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 90 PID 3716 wrote to memory of 3592 3716 net.exe 92 PID 3716 wrote to memory of 3592 3716 net.exe 92 PID 3716 wrote to memory of 3592 3716 net.exe 92 PID 2412 wrote to memory of 2660 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 94 PID 2412 wrote to memory of 2660 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 94 PID 2412 wrote to memory of 2660 2412 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 94 PID 2660 wrote to memory of 4488 2660 net.exe 96 PID 2660 wrote to memory of 4488 2660 net.exe 96 PID 2660 wrote to memory of 4488 2660 net.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe"C:\Users\Admin\AppData\Local\Temp\32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:4364
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:5048
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5008
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4864
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:2076
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:3592
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:4488
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:2376
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD564fddddd467d56dd947c29c206c09523
SHA11f3c0689614b1f171056b0d60c7c6d6b4bb3ac17
SHA2566a1ccb19f8978ebd7e621c07c7638deb59e3ebd105c5ee27ee87a19b4e6d54b2
SHA512e1ec7577d7e14569b6c33bca8a5f7121e795c0ae413f62f05e0aab095d29e30240a546718764a5dcb861c0febc1e1b2b91692d7835ada73157225a39ef99d900
-
Filesize
106KB
MD564fddddd467d56dd947c29c206c09523
SHA11f3c0689614b1f171056b0d60c7c6d6b4bb3ac17
SHA2566a1ccb19f8978ebd7e621c07c7638deb59e3ebd105c5ee27ee87a19b4e6d54b2
SHA512e1ec7577d7e14569b6c33bca8a5f7121e795c0ae413f62f05e0aab095d29e30240a546718764a5dcb861c0febc1e1b2b91692d7835ada73157225a39ef99d900
-
Filesize
106KB
MD564fddddd467d56dd947c29c206c09523
SHA11f3c0689614b1f171056b0d60c7c6d6b4bb3ac17
SHA2566a1ccb19f8978ebd7e621c07c7638deb59e3ebd105c5ee27ee87a19b4e6d54b2
SHA512e1ec7577d7e14569b6c33bca8a5f7121e795c0ae413f62f05e0aab095d29e30240a546718764a5dcb861c0febc1e1b2b91692d7835ada73157225a39ef99d900
-
Filesize
106KB
MD564fddddd467d56dd947c29c206c09523
SHA11f3c0689614b1f171056b0d60c7c6d6b4bb3ac17
SHA2566a1ccb19f8978ebd7e621c07c7638deb59e3ebd105c5ee27ee87a19b4e6d54b2
SHA512e1ec7577d7e14569b6c33bca8a5f7121e795c0ae413f62f05e0aab095d29e30240a546718764a5dcb861c0febc1e1b2b91692d7835ada73157225a39ef99d900
-
Filesize
241KB
MD55f1ed2a7320cac324d36155debd9b01a
SHA140a5c73637d88b6093ff10eb69804f807cfb994b
SHA2562e3904b723f5825d449d77b0242a6783f2ac4913b35b1f71de813c25ed4c6d68
SHA512b055fbe8075ccb5d30280d67b0c79f46e852d5c4fd8fd9821a34c22cc0b8ff8ab09545808ac65632259dcfb072720af9df46080aff6c1dbf03c04fc8349d3b01
-
Filesize
241KB
MD55f1ed2a7320cac324d36155debd9b01a
SHA140a5c73637d88b6093ff10eb69804f807cfb994b
SHA2562e3904b723f5825d449d77b0242a6783f2ac4913b35b1f71de813c25ed4c6d68
SHA512b055fbe8075ccb5d30280d67b0c79f46e852d5c4fd8fd9821a34c22cc0b8ff8ab09545808ac65632259dcfb072720af9df46080aff6c1dbf03c04fc8349d3b01
-
Filesize
241KB
MD55f1ed2a7320cac324d36155debd9b01a
SHA140a5c73637d88b6093ff10eb69804f807cfb994b
SHA2562e3904b723f5825d449d77b0242a6783f2ac4913b35b1f71de813c25ed4c6d68
SHA512b055fbe8075ccb5d30280d67b0c79f46e852d5c4fd8fd9821a34c22cc0b8ff8ab09545808ac65632259dcfb072720af9df46080aff6c1dbf03c04fc8349d3b01
-
Filesize
108KB
MD5dfbd08f0326a49ef387d1fa24984da82
SHA1a928904d01b71090cb90548ebedffab0ccd14775
SHA256b01ed2df8f120711d3a42b38ed98c791dee136a15b3b6b0a2fc5c97f7d70acdb
SHA5121b9a993bf4813ca5b358f850699f71829f2df8cc2825cbc02e7d96d04501a024e3b4a9eccbe110c4ed7c2f5f6989bdb0d142bb391f3f7c720eee5d94cf7f5a3f
-
Filesize
108KB
MD5dfbd08f0326a49ef387d1fa24984da82
SHA1a928904d01b71090cb90548ebedffab0ccd14775
SHA256b01ed2df8f120711d3a42b38ed98c791dee136a15b3b6b0a2fc5c97f7d70acdb
SHA5121b9a993bf4813ca5b358f850699f71829f2df8cc2825cbc02e7d96d04501a024e3b4a9eccbe110c4ed7c2f5f6989bdb0d142bb391f3f7c720eee5d94cf7f5a3f
-
Filesize
176KB
MD55b8ca9a1cf18ce9fdcd26f6505f19d6c
SHA1f466cfaa42a02e00bab471b163ac9d46372d1820
SHA256076f3181c4d56c728d453e1695fa4ee3054b459b7eddc46419edb075596a9692
SHA5124a50b67d1ebff7b6f6eea0b8e3fd4bd12f97d5bc48bdbf0e34d52c1188259e1866658a2dda64fe5433d78418d70ca256065d247cacc88816d8242c0bae27c3f0
-
Filesize
176KB
MD55b8ca9a1cf18ce9fdcd26f6505f19d6c
SHA1f466cfaa42a02e00bab471b163ac9d46372d1820
SHA256076f3181c4d56c728d453e1695fa4ee3054b459b7eddc46419edb075596a9692
SHA5124a50b67d1ebff7b6f6eea0b8e3fd4bd12f97d5bc48bdbf0e34d52c1188259e1866658a2dda64fe5433d78418d70ca256065d247cacc88816d8242c0bae27c3f0
-
Filesize
176KB
MD55b8ca9a1cf18ce9fdcd26f6505f19d6c
SHA1f466cfaa42a02e00bab471b163ac9d46372d1820
SHA256076f3181c4d56c728d453e1695fa4ee3054b459b7eddc46419edb075596a9692
SHA5124a50b67d1ebff7b6f6eea0b8e3fd4bd12f97d5bc48bdbf0e34d52c1188259e1866658a2dda64fe5433d78418d70ca256065d247cacc88816d8242c0bae27c3f0
-
Filesize
158KB
MD570e2a1c67548da22bc1df490ab7e88c8
SHA11d0e57b1177a81d4d6db8f880b1c00a50ff01496
SHA256889893b83603f45086c6a03d36435d3fda31ed590d6cf4109df6486517f49cfa
SHA512599de779b800edbea1dd7039128607a3361d29c18d162e0a5aefe0dda38797d0046f2e87d1ac572313a45bff714367fe09a8972d933798c5b5eb5acacc154415
-
Filesize
158KB
MD570e2a1c67548da22bc1df490ab7e88c8
SHA11d0e57b1177a81d4d6db8f880b1c00a50ff01496
SHA256889893b83603f45086c6a03d36435d3fda31ed590d6cf4109df6486517f49cfa
SHA512599de779b800edbea1dd7039128607a3361d29c18d162e0a5aefe0dda38797d0046f2e87d1ac572313a45bff714367fe09a8972d933798c5b5eb5acacc154415
-
Filesize
158KB
MD570e2a1c67548da22bc1df490ab7e88c8
SHA11d0e57b1177a81d4d6db8f880b1c00a50ff01496
SHA256889893b83603f45086c6a03d36435d3fda31ed590d6cf4109df6486517f49cfa
SHA512599de779b800edbea1dd7039128607a3361d29c18d162e0a5aefe0dda38797d0046f2e87d1ac572313a45bff714367fe09a8972d933798c5b5eb5acacc154415