Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:11

General

  • Target

    cf0dae788c4fc277a07cc69652b777d959879a69900061a9f9571d21de04ecd7.exe

  • Size

    601KB

  • MD5

    4600ad447023c26c137c79f89e8a371a

  • SHA1

    1618ffbf715e9cf24f93ccfeb2a7dc7e88f09b36

  • SHA256

    cf0dae788c4fc277a07cc69652b777d959879a69900061a9f9571d21de04ecd7

  • SHA512

    13b16ba64acfff270b4f4f83c61e4523e3a81c79f801e309f809f4c1d8e3679a39f3793b4a7c1c1406d4d732900e240e2211b0d6285e1ad470d4b1ab31d8d24b

  • SSDEEP

    12288:hIny5DYTD+x0O9QFB2RutaeJT7a3YafKkxNB9TYaDg8rm:dUTD20keJfaIafKITYaF

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf0dae788c4fc277a07cc69652b777d959879a69900061a9f9571d21de04ecd7.exe
    "C:\Users\Admin\AppData\Local\Temp\cf0dae788c4fc277a07cc69652b777d959879a69900061a9f9571d21de04ecd7.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:536
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:1340
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4744
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:3920
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2172
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2060
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:3560
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1488
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:3020
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1172
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:4184
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:3084
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:1408

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsj86AB.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nsj86AB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsj86AB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsj86AB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsj86AB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsj86AB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsj86AB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsj86AB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsj86AB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            a4a537215fb47d9c15dee6e32f9679f2

            SHA1

            eb4d51ed7348b35228b8b4e25a5f42e6de55ec74

            SHA256

            7adc13b75ae472f0d322207fce609880614d39f3ef25b9b001d7b6c5e8ebc880

            SHA512

            119b9fc71487dc32fa7c65ca474f12c7dbae031eeb31e575d0cffe7cc76ffed0d6950c0fe811fa9a36fc69203506d0cb2313efc37a8b0116f64cdeccdbcd7ad1

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            a4a537215fb47d9c15dee6e32f9679f2

            SHA1

            eb4d51ed7348b35228b8b4e25a5f42e6de55ec74

            SHA256

            7adc13b75ae472f0d322207fce609880614d39f3ef25b9b001d7b6c5e8ebc880

            SHA512

            119b9fc71487dc32fa7c65ca474f12c7dbae031eeb31e575d0cffe7cc76ffed0d6950c0fe811fa9a36fc69203506d0cb2313efc37a8b0116f64cdeccdbcd7ad1

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            a4a537215fb47d9c15dee6e32f9679f2

            SHA1

            eb4d51ed7348b35228b8b4e25a5f42e6de55ec74

            SHA256

            7adc13b75ae472f0d322207fce609880614d39f3ef25b9b001d7b6c5e8ebc880

            SHA512

            119b9fc71487dc32fa7c65ca474f12c7dbae031eeb31e575d0cffe7cc76ffed0d6950c0fe811fa9a36fc69203506d0cb2313efc37a8b0116f64cdeccdbcd7ad1

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            a4a537215fb47d9c15dee6e32f9679f2

            SHA1

            eb4d51ed7348b35228b8b4e25a5f42e6de55ec74

            SHA256

            7adc13b75ae472f0d322207fce609880614d39f3ef25b9b001d7b6c5e8ebc880

            SHA512

            119b9fc71487dc32fa7c65ca474f12c7dbae031eeb31e575d0cffe7cc76ffed0d6950c0fe811fa9a36fc69203506d0cb2313efc37a8b0116f64cdeccdbcd7ad1

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            8f4fe51c1969456cea4cbed371af7111

            SHA1

            7005b485f6c605918c994fd5d982c21ae8a4d9e7

            SHA256

            fb3562ee699c366b5ed3e1c34eab3062f8677664ae1e25676f2a30f59b2932fb

            SHA512

            e005ec01936a23aa38b5f4fa5169a5782ca41530022568d69f6f8ae96db6724992d6c93d9adfb0f391dca4e90be79e1c909b9f665ea20607e182597d1676fff5

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            8f4fe51c1969456cea4cbed371af7111

            SHA1

            7005b485f6c605918c994fd5d982c21ae8a4d9e7

            SHA256

            fb3562ee699c366b5ed3e1c34eab3062f8677664ae1e25676f2a30f59b2932fb

            SHA512

            e005ec01936a23aa38b5f4fa5169a5782ca41530022568d69f6f8ae96db6724992d6c93d9adfb0f391dca4e90be79e1c909b9f665ea20607e182597d1676fff5

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            8f4fe51c1969456cea4cbed371af7111

            SHA1

            7005b485f6c605918c994fd5d982c21ae8a4d9e7

            SHA256

            fb3562ee699c366b5ed3e1c34eab3062f8677664ae1e25676f2a30f59b2932fb

            SHA512

            e005ec01936a23aa38b5f4fa5169a5782ca41530022568d69f6f8ae96db6724992d6c93d9adfb0f391dca4e90be79e1c909b9f665ea20607e182597d1676fff5

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            d1db105a95154516ccd15aeaea083b99

            SHA1

            c50a407e55cf383d9e88b99a9843e22a7a073347

            SHA256

            743951a80521575725e7ae70f6104b2da91fcd7d2cb8426578c999e15802f7f0

            SHA512

            a95ef7ce017a1f75afff7ddba398bc721c76e627ee346aa539e150150eb220ebb43f9655f9b9ebe83a6259c59c956e1c28b3d4bfa875ce4661ea625ea2a37f44

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            d1db105a95154516ccd15aeaea083b99

            SHA1

            c50a407e55cf383d9e88b99a9843e22a7a073347

            SHA256

            743951a80521575725e7ae70f6104b2da91fcd7d2cb8426578c999e15802f7f0

            SHA512

            a95ef7ce017a1f75afff7ddba398bc721c76e627ee346aa539e150150eb220ebb43f9655f9b9ebe83a6259c59c956e1c28b3d4bfa875ce4661ea625ea2a37f44

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            22abfa644f8af3f8469e90d3acbce3c1

            SHA1

            3e6281dcea2f22b4b417d7236048f93189a6f2af

            SHA256

            7edb34e89a4e0be07a3b9cb9c0983b46addf81cc7e56c62cd92a5dfd5dacea65

            SHA512

            d6199b5efafb501e1ad1cd3f97baad770e03870bdcab2237b49424bc26ce60c8c9cf5275b8f2a2d6ec539b16c169c81ee78eb4e47e1d7eed1f7ff4161d2b332b

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            22abfa644f8af3f8469e90d3acbce3c1

            SHA1

            3e6281dcea2f22b4b417d7236048f93189a6f2af

            SHA256

            7edb34e89a4e0be07a3b9cb9c0983b46addf81cc7e56c62cd92a5dfd5dacea65

            SHA512

            d6199b5efafb501e1ad1cd3f97baad770e03870bdcab2237b49424bc26ce60c8c9cf5275b8f2a2d6ec539b16c169c81ee78eb4e47e1d7eed1f7ff4161d2b332b

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            22abfa644f8af3f8469e90d3acbce3c1

            SHA1

            3e6281dcea2f22b4b417d7236048f93189a6f2af

            SHA256

            7edb34e89a4e0be07a3b9cb9c0983b46addf81cc7e56c62cd92a5dfd5dacea65

            SHA512

            d6199b5efafb501e1ad1cd3f97baad770e03870bdcab2237b49424bc26ce60c8c9cf5275b8f2a2d6ec539b16c169c81ee78eb4e47e1d7eed1f7ff4161d2b332b

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            71aa315b5716ac15cd5b42b1e74d96d0

            SHA1

            b2f71c98e16e545c404ab03f6bedabd877408c59

            SHA256

            96144229e67352702bd90d6f4552ad6994e1370b0b2fbc8ae075b5f33d32d2af

            SHA512

            918df1fddfb1d5a699cd65dceb617391b5bc5035f0ec2b07b7ee70179278f3bce868ab89716c921730201ce9af5f9394443e0406ca811c337326acaee2fa1f6d

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            71aa315b5716ac15cd5b42b1e74d96d0

            SHA1

            b2f71c98e16e545c404ab03f6bedabd877408c59

            SHA256

            96144229e67352702bd90d6f4552ad6994e1370b0b2fbc8ae075b5f33d32d2af

            SHA512

            918df1fddfb1d5a699cd65dceb617391b5bc5035f0ec2b07b7ee70179278f3bce868ab89716c921730201ce9af5f9394443e0406ca811c337326acaee2fa1f6d

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            71aa315b5716ac15cd5b42b1e74d96d0

            SHA1

            b2f71c98e16e545c404ab03f6bedabd877408c59

            SHA256

            96144229e67352702bd90d6f4552ad6994e1370b0b2fbc8ae075b5f33d32d2af

            SHA512

            918df1fddfb1d5a699cd65dceb617391b5bc5035f0ec2b07b7ee70179278f3bce868ab89716c921730201ce9af5f9394443e0406ca811c337326acaee2fa1f6d

          • memory/536-135-0x0000000000000000-mapping.dmp

          • memory/1172-165-0x0000000000000000-mapping.dmp

          • memory/1340-136-0x0000000000000000-mapping.dmp

          • memory/1488-158-0x0000000000000000-mapping.dmp

          • memory/2060-147-0x0000000000000000-mapping.dmp

          • memory/2172-142-0x0000000000000000-mapping.dmp

          • memory/3020-159-0x0000000000000000-mapping.dmp

          • memory/3560-153-0x0000000000000000-mapping.dmp

          • memory/3920-141-0x0000000000000000-mapping.dmp

          • memory/4184-166-0x0000000000000000-mapping.dmp

          • memory/4744-140-0x0000000000000000-mapping.dmp

          • memory/5012-137-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/5012-168-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB