Analysis

  • max time kernel
    186s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:11

General

  • Target

    d49a6a9948c3558e979c7b28c76782d5dd6e57c82db8ac906de73a1ba8de6629.exe

  • Size

    602KB

  • MD5

    af9344bae144b5a09f0353fb4adea82c

  • SHA1

    2a7d4eb46b113d604c370738a492f2f7ad7b11a8

  • SHA256

    d49a6a9948c3558e979c7b28c76782d5dd6e57c82db8ac906de73a1ba8de6629

  • SHA512

    08a4bf636daaa2f1f8afbc3e5ab37040b1aeb426f2058b176f134a6bf107cd732c727b6a1e4a916edfb71c14d010ee66ed17a2f59810839e62d993df071f04f4

  • SSDEEP

    12288:5Iny5DYTm4+nIltDayKnEKwvf/Nrhvcd8p6el12zp9PHMo4K:1UTH+nStDayKnEKwvf1r2Xej2zppgK

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d49a6a9948c3558e979c7b28c76782d5dd6e57c82db8ac906de73a1ba8de6629.exe
    "C:\Users\Admin\AppData\Local\Temp\d49a6a9948c3558e979c7b28c76782d5dd6e57c82db8ac906de73a1ba8de6629.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4840
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3376
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:400
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:424
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:2000
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3364
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2236
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:4312
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4324
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:2060
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2660
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:3460
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:3940
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:1020

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsp3990.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nsp3990.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsp3990.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsp3990.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsp3990.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsp3990.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsp3990.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsp3990.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsp3990.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            11f0ad6b5371dd2ec3ac4422c0339e78

            SHA1

            aa5bae1187c443f111833722dafcbe8ee7af8dcd

            SHA256

            8c85f3b31ed6e70b3df3b989a2b7a2ea4a8c318d08c7d9bfa3019669e507aeb1

            SHA512

            4c143f666f75cbc9ee6c5ba43f8eae2b15cdfc292cd2643b3b57b639caec9c997999f3aa1fdc0d250fb18449eb7fb81ca6148a367db9fda7310e3896fce079f6

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            11f0ad6b5371dd2ec3ac4422c0339e78

            SHA1

            aa5bae1187c443f111833722dafcbe8ee7af8dcd

            SHA256

            8c85f3b31ed6e70b3df3b989a2b7a2ea4a8c318d08c7d9bfa3019669e507aeb1

            SHA512

            4c143f666f75cbc9ee6c5ba43f8eae2b15cdfc292cd2643b3b57b639caec9c997999f3aa1fdc0d250fb18449eb7fb81ca6148a367db9fda7310e3896fce079f6

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            11f0ad6b5371dd2ec3ac4422c0339e78

            SHA1

            aa5bae1187c443f111833722dafcbe8ee7af8dcd

            SHA256

            8c85f3b31ed6e70b3df3b989a2b7a2ea4a8c318d08c7d9bfa3019669e507aeb1

            SHA512

            4c143f666f75cbc9ee6c5ba43f8eae2b15cdfc292cd2643b3b57b639caec9c997999f3aa1fdc0d250fb18449eb7fb81ca6148a367db9fda7310e3896fce079f6

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            11f0ad6b5371dd2ec3ac4422c0339e78

            SHA1

            aa5bae1187c443f111833722dafcbe8ee7af8dcd

            SHA256

            8c85f3b31ed6e70b3df3b989a2b7a2ea4a8c318d08c7d9bfa3019669e507aeb1

            SHA512

            4c143f666f75cbc9ee6c5ba43f8eae2b15cdfc292cd2643b3b57b639caec9c997999f3aa1fdc0d250fb18449eb7fb81ca6148a367db9fda7310e3896fce079f6

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            3f9991411901594ba3a5c79fd3543808

            SHA1

            128bea11cdba1736b72ed29cd869e94312b9b156

            SHA256

            bdc8afce27d5116bcceb4da77ea657a8e3ec6205b93e010e4ce514ae6e646192

            SHA512

            a74edc5deef5ff09d12a6319283f1ce3090ada613f2c9754e86bcfe3c1be2621f4e87758e7dcdcff4672be2b4a9593f36639356d740c22216dba45313dbdebf5

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            3f9991411901594ba3a5c79fd3543808

            SHA1

            128bea11cdba1736b72ed29cd869e94312b9b156

            SHA256

            bdc8afce27d5116bcceb4da77ea657a8e3ec6205b93e010e4ce514ae6e646192

            SHA512

            a74edc5deef5ff09d12a6319283f1ce3090ada613f2c9754e86bcfe3c1be2621f4e87758e7dcdcff4672be2b4a9593f36639356d740c22216dba45313dbdebf5

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            3f9991411901594ba3a5c79fd3543808

            SHA1

            128bea11cdba1736b72ed29cd869e94312b9b156

            SHA256

            bdc8afce27d5116bcceb4da77ea657a8e3ec6205b93e010e4ce514ae6e646192

            SHA512

            a74edc5deef5ff09d12a6319283f1ce3090ada613f2c9754e86bcfe3c1be2621f4e87758e7dcdcff4672be2b4a9593f36639356d740c22216dba45313dbdebf5

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            4ebe4cffe86571712cf4870fe77f45b7

            SHA1

            755d48ec6f70fb578b2bead656abcafc1e8bdb23

            SHA256

            6c1a341480207958411279aaea6355e2b33e7d2704434bd3808eb3809c9eb519

            SHA512

            69dc6f4024293417c0ba3bebae5109f1d5ff69abc406be34916828a05b576574fd7a8d658ecc5f67a26a8dcd0a3d54007d2fd035e6a346f7ecb86ac70c571e09

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            4ebe4cffe86571712cf4870fe77f45b7

            SHA1

            755d48ec6f70fb578b2bead656abcafc1e8bdb23

            SHA256

            6c1a341480207958411279aaea6355e2b33e7d2704434bd3808eb3809c9eb519

            SHA512

            69dc6f4024293417c0ba3bebae5109f1d5ff69abc406be34916828a05b576574fd7a8d658ecc5f67a26a8dcd0a3d54007d2fd035e6a346f7ecb86ac70c571e09

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            98161a1f9509c10fe0ff882740d8dc3b

            SHA1

            dba908764e30b5d62c7d21f870ffffc794e36166

            SHA256

            c34c295a8aa9e04a3fbec0ccc1518ebed107c20b65efe0f9758c9539d08ccaa0

            SHA512

            249e49c46fd5f256f34961fa49bb703b8e0056955d4e377d38577dc14a58fd79d25d4d0e75935daed7979a10f3d24502b39550362c3918a925d2ac61d19efd55

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            98161a1f9509c10fe0ff882740d8dc3b

            SHA1

            dba908764e30b5d62c7d21f870ffffc794e36166

            SHA256

            c34c295a8aa9e04a3fbec0ccc1518ebed107c20b65efe0f9758c9539d08ccaa0

            SHA512

            249e49c46fd5f256f34961fa49bb703b8e0056955d4e377d38577dc14a58fd79d25d4d0e75935daed7979a10f3d24502b39550362c3918a925d2ac61d19efd55

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            98161a1f9509c10fe0ff882740d8dc3b

            SHA1

            dba908764e30b5d62c7d21f870ffffc794e36166

            SHA256

            c34c295a8aa9e04a3fbec0ccc1518ebed107c20b65efe0f9758c9539d08ccaa0

            SHA512

            249e49c46fd5f256f34961fa49bb703b8e0056955d4e377d38577dc14a58fd79d25d4d0e75935daed7979a10f3d24502b39550362c3918a925d2ac61d19efd55

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            8239364f3b5fd345eef5f52bd81e9f14

            SHA1

            83738542397af54eca678138d326e61a9c15c318

            SHA256

            73495e2741e3dc481f87a07dafbad1d86e6348d4f1d573ab328a934a0a06e1ca

            SHA512

            6683fd1b51f9f97227c7f4a74a4aca76b26a4c81ed2ad72da0db1ccdb0efb7e7a47ba84de51283ee72d7befc6815460f3c5545487d4ea5f50732a68b14ae0588

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            8239364f3b5fd345eef5f52bd81e9f14

            SHA1

            83738542397af54eca678138d326e61a9c15c318

            SHA256

            73495e2741e3dc481f87a07dafbad1d86e6348d4f1d573ab328a934a0a06e1ca

            SHA512

            6683fd1b51f9f97227c7f4a74a4aca76b26a4c81ed2ad72da0db1ccdb0efb7e7a47ba84de51283ee72d7befc6815460f3c5545487d4ea5f50732a68b14ae0588

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            8239364f3b5fd345eef5f52bd81e9f14

            SHA1

            83738542397af54eca678138d326e61a9c15c318

            SHA256

            73495e2741e3dc481f87a07dafbad1d86e6348d4f1d573ab328a934a0a06e1ca

            SHA512

            6683fd1b51f9f97227c7f4a74a4aca76b26a4c81ed2ad72da0db1ccdb0efb7e7a47ba84de51283ee72d7befc6815460f3c5545487d4ea5f50732a68b14ae0588

          • memory/400-137-0x0000000000000000-mapping.dmp

          • memory/424-140-0x0000000000000000-mapping.dmp

          • memory/2000-141-0x0000000000000000-mapping.dmp

          • memory/2060-160-0x0000000000000000-mapping.dmp

          • memory/2236-147-0x0000000000000000-mapping.dmp

          • memory/2660-166-0x0000000000000000-mapping.dmp

          • memory/3364-142-0x0000000000000000-mapping.dmp

          • memory/3376-136-0x0000000000000000-mapping.dmp

          • memory/3460-167-0x0000000000000000-mapping.dmp

          • memory/4312-154-0x0000000000000000-mapping.dmp

          • memory/4324-159-0x0000000000000000-mapping.dmp

          • memory/4840-153-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/4840-132-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/4840-169-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB