Analysis

  • max time kernel
    92s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:07

General

  • Target

    f5f46a1a6e5513711b7b9b68ce4b8b254c6a974dc872729ab36a54ea2950fa2a.exe

  • Size

    603KB

  • MD5

    95b482328805e1d9740de7fe3b969197

  • SHA1

    5e6aa7245928feb64dde31f1a437c91282a44ab6

  • SHA256

    f5f46a1a6e5513711b7b9b68ce4b8b254c6a974dc872729ab36a54ea2950fa2a

  • SHA512

    ce35cc78b111f8650ee08e2104c77a600324dd09a048b571a199bc3e002831fb756d71cf4066c7e0124a9896d90c1ee7ac6ae44455046e7decd434641c7f3bf0

  • SSDEEP

    12288:jIny5DYTMIzZsDOJPLIi5irJrDORZoYsUYWFxbRpd/c4Pl:rUTMAZs8j5QGZjYGZrB

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5f46a1a6e5513711b7b9b68ce4b8b254c6a974dc872729ab36a54ea2950fa2a.exe
    "C:\Users\Admin\AppData\Local\Temp\f5f46a1a6e5513711b7b9b68ce4b8b254c6a974dc872729ab36a54ea2950fa2a.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4776
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4680
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:1716
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4052
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:1804
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1696
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1312
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:4412
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3844
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:4028
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3452
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:5004
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:3936
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:3228

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Discovery

          Query Registry

          1
          T1012

          System Information Discovery

          1
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nst7779.tmp\System.dll
            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nst7779.tmp\nsExec.dll
            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nst7779.tmp\nsExec.dll
            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nst7779.tmp\nsExec.dll
            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nst7779.tmp\nsExec.dll
            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nst7779.tmp\nsExec.dll
            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nst7779.tmp\nsExec.dll
            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nst7779.tmp\nsExec.dll
            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nst7779.tmp\nsExec.dll
            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Windows\SysWOW64\hfnapi.dll
            Filesize

            106KB

            MD5

            e4fd6479d09de199e76ec77f755b6f6c

            SHA1

            81e0434f017323f43aba032615e0df28b0a26b9b

            SHA256

            5cb4bba7124a9d1ef8c9482791d0c1ce7e1734af25bd110c6302621f7b7cbe13

            SHA512

            f54c4247b4bdd4faa87d4d7908d2ab62010130af311188f51734361a4472cca5b1954d98e4cb4e3afc9a6c1b7c07174b23c1f08941e8e6492e6b05d9de7df9e1

          • C:\Windows\SysWOW64\hfnapi.dll
            Filesize

            106KB

            MD5

            e4fd6479d09de199e76ec77f755b6f6c

            SHA1

            81e0434f017323f43aba032615e0df28b0a26b9b

            SHA256

            5cb4bba7124a9d1ef8c9482791d0c1ce7e1734af25bd110c6302621f7b7cbe13

            SHA512

            f54c4247b4bdd4faa87d4d7908d2ab62010130af311188f51734361a4472cca5b1954d98e4cb4e3afc9a6c1b7c07174b23c1f08941e8e6492e6b05d9de7df9e1

          • C:\Windows\SysWOW64\hfnapi.dll
            Filesize

            106KB

            MD5

            e4fd6479d09de199e76ec77f755b6f6c

            SHA1

            81e0434f017323f43aba032615e0df28b0a26b9b

            SHA256

            5cb4bba7124a9d1ef8c9482791d0c1ce7e1734af25bd110c6302621f7b7cbe13

            SHA512

            f54c4247b4bdd4faa87d4d7908d2ab62010130af311188f51734361a4472cca5b1954d98e4cb4e3afc9a6c1b7c07174b23c1f08941e8e6492e6b05d9de7df9e1

          • C:\Windows\SysWOW64\hfnapi.dll
            Filesize

            106KB

            MD5

            e4fd6479d09de199e76ec77f755b6f6c

            SHA1

            81e0434f017323f43aba032615e0df28b0a26b9b

            SHA256

            5cb4bba7124a9d1ef8c9482791d0c1ce7e1734af25bd110c6302621f7b7cbe13

            SHA512

            f54c4247b4bdd4faa87d4d7908d2ab62010130af311188f51734361a4472cca5b1954d98e4cb4e3afc9a6c1b7c07174b23c1f08941e8e6492e6b05d9de7df9e1

          • C:\Windows\SysWOW64\hfpapi.dll
            Filesize

            244KB

            MD5

            8dc892397109c06c31c830e1cc96b8b1

            SHA1

            907c933feffde37e22450d4f5bb5b7fb363a8b3a

            SHA256

            abe60c3ff66971ca823e218eacb6e6fdf53b864204bc13b19f2be782c42571d7

            SHA512

            6f2d36a3d451e1b4fea8682c567542ec17829764fc58edf3baea0d52c3d5cf99012dbc3dc5b63a636d8ff05583992f8058450d44e3be0d45790abaf6b72d6177

          • C:\Windows\SysWOW64\hfpapi.dll
            Filesize

            244KB

            MD5

            8dc892397109c06c31c830e1cc96b8b1

            SHA1

            907c933feffde37e22450d4f5bb5b7fb363a8b3a

            SHA256

            abe60c3ff66971ca823e218eacb6e6fdf53b864204bc13b19f2be782c42571d7

            SHA512

            6f2d36a3d451e1b4fea8682c567542ec17829764fc58edf3baea0d52c3d5cf99012dbc3dc5b63a636d8ff05583992f8058450d44e3be0d45790abaf6b72d6177

          • C:\Windows\SysWOW64\hfpapi.dll
            Filesize

            244KB

            MD5

            8dc892397109c06c31c830e1cc96b8b1

            SHA1

            907c933feffde37e22450d4f5bb5b7fb363a8b3a

            SHA256

            abe60c3ff66971ca823e218eacb6e6fdf53b864204bc13b19f2be782c42571d7

            SHA512

            6f2d36a3d451e1b4fea8682c567542ec17829764fc58edf3baea0d52c3d5cf99012dbc3dc5b63a636d8ff05583992f8058450d44e3be0d45790abaf6b72d6177

          • C:\Windows\SysWOW64\installd.exe
            Filesize

            108KB

            MD5

            c29d5ec3238043020248289a9a7ecf8d

            SHA1

            0b1a4d3d7d245c992f204142f387180445cb9745

            SHA256

            525e5d71e2323aec305c8112b249515e998d61805107c269f8b7da15c9a00f2b

            SHA512

            8c57617f0abd0c6b0fbbc93f0b837c7012e9926eebad84ec7f28c5cca294787f497741e24e8905da8eaddfcdcbeadcf58564d077fe9eeede80e3b6bf81a21caf

          • C:\Windows\SysWOW64\installd.exe
            Filesize

            108KB

            MD5

            c29d5ec3238043020248289a9a7ecf8d

            SHA1

            0b1a4d3d7d245c992f204142f387180445cb9745

            SHA256

            525e5d71e2323aec305c8112b249515e998d61805107c269f8b7da15c9a00f2b

            SHA512

            8c57617f0abd0c6b0fbbc93f0b837c7012e9926eebad84ec7f28c5cca294787f497741e24e8905da8eaddfcdcbeadcf58564d077fe9eeede80e3b6bf81a21caf

          • C:\Windows\SysWOW64\nethtsrv.exe
            Filesize

            176KB

            MD5

            a455bb612eb4b8bdf4a0c002c5ace34b

            SHA1

            ed294faa35371eb74ce40694264b101ce602e7e9

            SHA256

            b371f9e43deac2b933e5eefe762e005622128dbe72e793a4bd33d83dc2db833a

            SHA512

            6d2c45dd01c13685dfd0a08063bc4a37e288eedefc1357684a9dacab2c18c9ae1bd8027f067844e537d1b2502a101ffad2c68e09d2a99daac40f8ed7785c5412

          • C:\Windows\SysWOW64\nethtsrv.exe
            Filesize

            176KB

            MD5

            a455bb612eb4b8bdf4a0c002c5ace34b

            SHA1

            ed294faa35371eb74ce40694264b101ce602e7e9

            SHA256

            b371f9e43deac2b933e5eefe762e005622128dbe72e793a4bd33d83dc2db833a

            SHA512

            6d2c45dd01c13685dfd0a08063bc4a37e288eedefc1357684a9dacab2c18c9ae1bd8027f067844e537d1b2502a101ffad2c68e09d2a99daac40f8ed7785c5412

          • C:\Windows\SysWOW64\nethtsrv.exe
            Filesize

            176KB

            MD5

            a455bb612eb4b8bdf4a0c002c5ace34b

            SHA1

            ed294faa35371eb74ce40694264b101ce602e7e9

            SHA256

            b371f9e43deac2b933e5eefe762e005622128dbe72e793a4bd33d83dc2db833a

            SHA512

            6d2c45dd01c13685dfd0a08063bc4a37e288eedefc1357684a9dacab2c18c9ae1bd8027f067844e537d1b2502a101ffad2c68e09d2a99daac40f8ed7785c5412

          • C:\Windows\SysWOW64\netupdsrv.exe
            Filesize

            158KB

            MD5

            efaedd79c899242e7be53fdb9105f4f1

            SHA1

            e1617d90f92846772a134401872f031d6f92202b

            SHA256

            f9968967dba6f72e727d62a0da0aaa7b239cf08ccfa8a85509c4560d4dced2dd

            SHA512

            1ef423f239293551e948c7e04d21c1a642022d20ac1df1dec150799badf34ffda3da544e95b89d78b7212ad3befd3399c989b7e750396f6728789f7ef5165672

          • C:\Windows\SysWOW64\netupdsrv.exe
            Filesize

            158KB

            MD5

            efaedd79c899242e7be53fdb9105f4f1

            SHA1

            e1617d90f92846772a134401872f031d6f92202b

            SHA256

            f9968967dba6f72e727d62a0da0aaa7b239cf08ccfa8a85509c4560d4dced2dd

            SHA512

            1ef423f239293551e948c7e04d21c1a642022d20ac1df1dec150799badf34ffda3da544e95b89d78b7212ad3befd3399c989b7e750396f6728789f7ef5165672

          • C:\Windows\SysWOW64\netupdsrv.exe
            Filesize

            158KB

            MD5

            efaedd79c899242e7be53fdb9105f4f1

            SHA1

            e1617d90f92846772a134401872f031d6f92202b

            SHA256

            f9968967dba6f72e727d62a0da0aaa7b239cf08ccfa8a85509c4560d4dced2dd

            SHA512

            1ef423f239293551e948c7e04d21c1a642022d20ac1df1dec150799badf34ffda3da544e95b89d78b7212ad3befd3399c989b7e750396f6728789f7ef5165672

          • memory/1312-147-0x0000000000000000-mapping.dmp
          • memory/1696-142-0x0000000000000000-mapping.dmp
          • memory/1716-137-0x0000000000000000-mapping.dmp
          • memory/1804-141-0x0000000000000000-mapping.dmp
          • memory/3452-166-0x0000000000000000-mapping.dmp
          • memory/3844-159-0x0000000000000000-mapping.dmp
          • memory/4028-160-0x0000000000000000-mapping.dmp
          • memory/4052-140-0x0000000000000000-mapping.dmp
          • memory/4412-153-0x0000000000000000-mapping.dmp
          • memory/4680-136-0x0000000000000000-mapping.dmp
          • memory/4776-158-0x0000000000360000-0x00000000007BE000-memory.dmp
            Filesize

            4.4MB

          • memory/4776-132-0x0000000000360000-0x00000000007BE000-memory.dmp
            Filesize

            4.4MB

          • memory/4776-169-0x0000000000360000-0x00000000007BE000-memory.dmp
            Filesize

            4.4MB

          • memory/5004-167-0x0000000000000000-mapping.dmp