Analysis

  • max time kernel
    113s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:10

General

  • Target

    e04ff24a8a2fd1ab1e24878903721f52fbeb124c1f817b16d67e7480d769f5b2.exe

  • Size

    602KB

  • MD5

    29afb05afcfa9697e2e5681562d46fc7

  • SHA1

    c742a533aca491d8f96c728d079c6ca9dddbe547

  • SHA256

    e04ff24a8a2fd1ab1e24878903721f52fbeb124c1f817b16d67e7480d769f5b2

  • SHA512

    6745d001bf51b084d53c73a850c42af5af4560c164f979275bb232b4c126539fadaa882ae44e1dc3506c037ad6a5b6e8301241e4f791562dc694a5ea98490c38

  • SSDEEP

    12288:iIny5DYTcIb8cJFdNxy4CsTRNnBxe27XTE:EUTcw8cLdry4C8Lx57Y

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e04ff24a8a2fd1ab1e24878903721f52fbeb124c1f817b16d67e7480d769f5b2.exe
    "C:\Users\Admin\AppData\Local\Temp\e04ff24a8a2fd1ab1e24878903721f52fbeb124c1f817b16d67e7480d769f5b2.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:952
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:1512
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4988
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:4944
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4964
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1648
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:224
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3132
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:3948
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3996
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:2084
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:4428
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:524

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nso3EA.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nso3EA.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nso3EA.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nso3EA.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nso3EA.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nso3EA.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nso3EA.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nso3EA.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nso3EA.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            2cd8dce89329cabce4f58059d50eb290

            SHA1

            2690da37f29e780c23a6dc9e3d6cf4424ab2b1c8

            SHA256

            d20b7ac8f38492992d51213cf2a3346ec0a5a142a135f8051bef98ca6a0d5b5b

            SHA512

            0d2a32591012d52d847d94cd0ad432af8adc5f2a0717563afab3329c902c3d628c093456e4bb940f13efdc8d2e72bd21d466ef7230f841223c4f3c09bfcea72c

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            2cd8dce89329cabce4f58059d50eb290

            SHA1

            2690da37f29e780c23a6dc9e3d6cf4424ab2b1c8

            SHA256

            d20b7ac8f38492992d51213cf2a3346ec0a5a142a135f8051bef98ca6a0d5b5b

            SHA512

            0d2a32591012d52d847d94cd0ad432af8adc5f2a0717563afab3329c902c3d628c093456e4bb940f13efdc8d2e72bd21d466ef7230f841223c4f3c09bfcea72c

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            2cd8dce89329cabce4f58059d50eb290

            SHA1

            2690da37f29e780c23a6dc9e3d6cf4424ab2b1c8

            SHA256

            d20b7ac8f38492992d51213cf2a3346ec0a5a142a135f8051bef98ca6a0d5b5b

            SHA512

            0d2a32591012d52d847d94cd0ad432af8adc5f2a0717563afab3329c902c3d628c093456e4bb940f13efdc8d2e72bd21d466ef7230f841223c4f3c09bfcea72c

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            2cd8dce89329cabce4f58059d50eb290

            SHA1

            2690da37f29e780c23a6dc9e3d6cf4424ab2b1c8

            SHA256

            d20b7ac8f38492992d51213cf2a3346ec0a5a142a135f8051bef98ca6a0d5b5b

            SHA512

            0d2a32591012d52d847d94cd0ad432af8adc5f2a0717563afab3329c902c3d628c093456e4bb940f13efdc8d2e72bd21d466ef7230f841223c4f3c09bfcea72c

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            f6f76f0c3765ae9c1dd59d6a1fe64e79

            SHA1

            15380fa9c0b1c451069e9c8570327ba5f3e8ecad

            SHA256

            3047421b74da513c374799bc5d7c619b229c82de1a5780960ac173ebd9e9f81d

            SHA512

            af96f0b2d7c97b89e5c0559ec021fd223b317875f03d517568b56f9837fa42b8dd3cc9fde87898b626acebd3cdfcc5dd6e5b216ad56595d47071a012602476f5

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            f6f76f0c3765ae9c1dd59d6a1fe64e79

            SHA1

            15380fa9c0b1c451069e9c8570327ba5f3e8ecad

            SHA256

            3047421b74da513c374799bc5d7c619b229c82de1a5780960ac173ebd9e9f81d

            SHA512

            af96f0b2d7c97b89e5c0559ec021fd223b317875f03d517568b56f9837fa42b8dd3cc9fde87898b626acebd3cdfcc5dd6e5b216ad56595d47071a012602476f5

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            f6f76f0c3765ae9c1dd59d6a1fe64e79

            SHA1

            15380fa9c0b1c451069e9c8570327ba5f3e8ecad

            SHA256

            3047421b74da513c374799bc5d7c619b229c82de1a5780960ac173ebd9e9f81d

            SHA512

            af96f0b2d7c97b89e5c0559ec021fd223b317875f03d517568b56f9837fa42b8dd3cc9fde87898b626acebd3cdfcc5dd6e5b216ad56595d47071a012602476f5

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            d1490a779fee43b6de89d37a81b6e1ce

            SHA1

            bdc144f151e85f80fc0a566f4ad4bc49f30d9b6d

            SHA256

            a543d3336fb56667e12db8c973244289ef33f2653ac4f3cc01b4aabdb5bbad51

            SHA512

            00874e1f1aac68c2907d5c2fcebe48728a6e89e438082e1bfa0ebbe4292c45dd8ad40470903a5bd5f024561bf93a8451cff814239fd4d594c7fac3d5ec536789

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            d1490a779fee43b6de89d37a81b6e1ce

            SHA1

            bdc144f151e85f80fc0a566f4ad4bc49f30d9b6d

            SHA256

            a543d3336fb56667e12db8c973244289ef33f2653ac4f3cc01b4aabdb5bbad51

            SHA512

            00874e1f1aac68c2907d5c2fcebe48728a6e89e438082e1bfa0ebbe4292c45dd8ad40470903a5bd5f024561bf93a8451cff814239fd4d594c7fac3d5ec536789

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            d349d2eb7b11edf76e5615304836304e

            SHA1

            22d808abc993235d847a824eca1100275e7724d0

            SHA256

            d25342296badecd5fd694bc94d481fc49cd17830d8f012b59f238a0a59ac665c

            SHA512

            55ed1bd68eda7e8374f9d0a493922537d762f44ae9cc6dceae5619f8e435896d150e6e037361276871e90fbe8ef12299a67cd5fc05b200a5ee11cf9c8f30e7dd

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            d349d2eb7b11edf76e5615304836304e

            SHA1

            22d808abc993235d847a824eca1100275e7724d0

            SHA256

            d25342296badecd5fd694bc94d481fc49cd17830d8f012b59f238a0a59ac665c

            SHA512

            55ed1bd68eda7e8374f9d0a493922537d762f44ae9cc6dceae5619f8e435896d150e6e037361276871e90fbe8ef12299a67cd5fc05b200a5ee11cf9c8f30e7dd

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            d349d2eb7b11edf76e5615304836304e

            SHA1

            22d808abc993235d847a824eca1100275e7724d0

            SHA256

            d25342296badecd5fd694bc94d481fc49cd17830d8f012b59f238a0a59ac665c

            SHA512

            55ed1bd68eda7e8374f9d0a493922537d762f44ae9cc6dceae5619f8e435896d150e6e037361276871e90fbe8ef12299a67cd5fc05b200a5ee11cf9c8f30e7dd

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            89b4a2c6845056116928b7f99f90b5d3

            SHA1

            71ca2875f750ad3c98d7647a90e626bfc4a7e9a3

            SHA256

            03877e37b7496de5048ddc6de5fa3e067719e8ac3633b0ea13ed3d924e94f609

            SHA512

            69e1e349aab1f8e8bcd023bf8dbaf0ad11bf6799ab6bcf90472cdde52c3e361948a786fbaefc07fc7f187420127a7abe97c64ad6fed4588fe95952f876808fee

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            89b4a2c6845056116928b7f99f90b5d3

            SHA1

            71ca2875f750ad3c98d7647a90e626bfc4a7e9a3

            SHA256

            03877e37b7496de5048ddc6de5fa3e067719e8ac3633b0ea13ed3d924e94f609

            SHA512

            69e1e349aab1f8e8bcd023bf8dbaf0ad11bf6799ab6bcf90472cdde52c3e361948a786fbaefc07fc7f187420127a7abe97c64ad6fed4588fe95952f876808fee

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            89b4a2c6845056116928b7f99f90b5d3

            SHA1

            71ca2875f750ad3c98d7647a90e626bfc4a7e9a3

            SHA256

            03877e37b7496de5048ddc6de5fa3e067719e8ac3633b0ea13ed3d924e94f609

            SHA512

            69e1e349aab1f8e8bcd023bf8dbaf0ad11bf6799ab6bcf90472cdde52c3e361948a786fbaefc07fc7f187420127a7abe97c64ad6fed4588fe95952f876808fee

          • memory/224-153-0x0000000000000000-mapping.dmp

          • memory/952-135-0x0000000000000000-mapping.dmp

          • memory/1200-168-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1200-137-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1512-136-0x0000000000000000-mapping.dmp

          • memory/1648-147-0x0000000000000000-mapping.dmp

          • memory/2084-166-0x0000000000000000-mapping.dmp

          • memory/3132-158-0x0000000000000000-mapping.dmp

          • memory/3948-159-0x0000000000000000-mapping.dmp

          • memory/3996-165-0x0000000000000000-mapping.dmp

          • memory/4944-141-0x0000000000000000-mapping.dmp

          • memory/4964-142-0x0000000000000000-mapping.dmp

          • memory/4988-140-0x0000000000000000-mapping.dmp