Analysis
-
max time kernel
172s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:12
Static task
static1
Behavioral task
behavioral1
Sample
c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe
Resource
win10v2004-20220812-en
General
-
Target
c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe
-
Size
601KB
-
MD5
cc4f0798367dccf42c90961c74f682bc
-
SHA1
c7470c888b0379c35f8ed21acf83c10ce35a4cf0
-
SHA256
c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0
-
SHA512
4b3aa3813c1c4f13c255b749f7476c0b9db6d97529d40a1c63a1567f3fe2dcf004e940ae3b148f87209b56cec1357468ad4124f3b33d81337265eb74f32a3da9
-
SSDEEP
12288:vIny5DYT9Z35JaanvWCWe9XdSzTHbRz+Wm2Wb:3UT955UantWe9ETx+Wm2
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exedescription ioc process File created C:\Windows\system32\drivers\nethfdrv.sys c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe -
Executes dropped EXE 5 IoCs
Processes:
installd.exenethtsrv.exenetupdsrv.exenethtsrv.exenetupdsrv.exepid process 4812 installd.exe 4748 nethtsrv.exe 1596 netupdsrv.exe 3640 nethtsrv.exe 212 netupdsrv.exe -
Loads dropped DLL 14 IoCs
Processes:
c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exeinstalld.exenethtsrv.exenethtsrv.exepid process 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe 4812 installd.exe 4748 nethtsrv.exe 4748 nethtsrv.exe 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe 3640 nethtsrv.exe 3640 nethtsrv.exe 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
Processes:
c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exedescription ioc process File created C:\Windows\SysWOW64\hfnapi.dll c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe File created C:\Windows\SysWOW64\hfpapi.dll c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe File created C:\Windows\SysWOW64\installd.exe c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe File created C:\Windows\SysWOW64\nethtsrv.exe c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe File created C:\Windows\SysWOW64\netupdsrv.exe c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe -
Drops file in Program Files directory 3 IoCs
Processes:
c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exedescription ioc process File created C:\Program Files (x86)\Common Files\Config\data.xml c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
Processes:
nethtsrv.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 656 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nethtsrv.exedescription pid process Token: SeDebugPrivilege 3640 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exenet.exenet.exenet.exenet.exedescription pid process target process PID 3468 wrote to memory of 3760 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe net.exe PID 3468 wrote to memory of 3760 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe net.exe PID 3468 wrote to memory of 3760 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe net.exe PID 3760 wrote to memory of 4680 3760 net.exe net1.exe PID 3760 wrote to memory of 4680 3760 net.exe net1.exe PID 3760 wrote to memory of 4680 3760 net.exe net1.exe PID 3468 wrote to memory of 752 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe net.exe PID 3468 wrote to memory of 752 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe net.exe PID 3468 wrote to memory of 752 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe net.exe PID 752 wrote to memory of 4536 752 net.exe net1.exe PID 752 wrote to memory of 4536 752 net.exe net1.exe PID 752 wrote to memory of 4536 752 net.exe net1.exe PID 3468 wrote to memory of 4812 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe installd.exe PID 3468 wrote to memory of 4812 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe installd.exe PID 3468 wrote to memory of 4812 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe installd.exe PID 3468 wrote to memory of 4748 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe nethtsrv.exe PID 3468 wrote to memory of 4748 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe nethtsrv.exe PID 3468 wrote to memory of 4748 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe nethtsrv.exe PID 3468 wrote to memory of 1596 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe netupdsrv.exe PID 3468 wrote to memory of 1596 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe netupdsrv.exe PID 3468 wrote to memory of 1596 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe netupdsrv.exe PID 3468 wrote to memory of 428 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe net.exe PID 3468 wrote to memory of 428 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe net.exe PID 3468 wrote to memory of 428 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe net.exe PID 428 wrote to memory of 1660 428 net.exe net1.exe PID 428 wrote to memory of 1660 428 net.exe net1.exe PID 428 wrote to memory of 1660 428 net.exe net1.exe PID 3468 wrote to memory of 4060 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe net.exe PID 3468 wrote to memory of 4060 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe net.exe PID 3468 wrote to memory of 4060 3468 c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe net.exe PID 4060 wrote to memory of 1672 4060 net.exe net1.exe PID 4060 wrote to memory of 1672 4060 net.exe net1.exe PID 4060 wrote to memory of 1672 4060 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe"C:\Users\Admin\AppData\Local\Temp\c9fc9bb0e45891df41ab686499995540c638ef114fb85647847c193629aec6c0.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:4680
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:4536
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4812 -
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4748 -
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1596 -
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1660
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1672
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:212
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5421355e4f8d947af5debe8abbcb81cd7
SHA1f43ee7aa5f72b468941f86667cb4c547be052321
SHA2560eb38391421f28b8a3f8a35ed7853236d3b51677d2ec5d5f70343f36a29b99b6
SHA512c74a4d62608acb7c6b7ed17085f4fce680bdbf25a6530d82554a4cbe608d1f1453fa2f4c35d7e90dff9fd1585e5f545dce7d425a03b816583916393f10331e98
-
Filesize
106KB
MD5421355e4f8d947af5debe8abbcb81cd7
SHA1f43ee7aa5f72b468941f86667cb4c547be052321
SHA2560eb38391421f28b8a3f8a35ed7853236d3b51677d2ec5d5f70343f36a29b99b6
SHA512c74a4d62608acb7c6b7ed17085f4fce680bdbf25a6530d82554a4cbe608d1f1453fa2f4c35d7e90dff9fd1585e5f545dce7d425a03b816583916393f10331e98
-
Filesize
106KB
MD5421355e4f8d947af5debe8abbcb81cd7
SHA1f43ee7aa5f72b468941f86667cb4c547be052321
SHA2560eb38391421f28b8a3f8a35ed7853236d3b51677d2ec5d5f70343f36a29b99b6
SHA512c74a4d62608acb7c6b7ed17085f4fce680bdbf25a6530d82554a4cbe608d1f1453fa2f4c35d7e90dff9fd1585e5f545dce7d425a03b816583916393f10331e98
-
Filesize
106KB
MD5421355e4f8d947af5debe8abbcb81cd7
SHA1f43ee7aa5f72b468941f86667cb4c547be052321
SHA2560eb38391421f28b8a3f8a35ed7853236d3b51677d2ec5d5f70343f36a29b99b6
SHA512c74a4d62608acb7c6b7ed17085f4fce680bdbf25a6530d82554a4cbe608d1f1453fa2f4c35d7e90dff9fd1585e5f545dce7d425a03b816583916393f10331e98
-
Filesize
241KB
MD531c9ee5287d3554aa43386c81a8f5d86
SHA1271f202aec7d2814e84eb83aa1aaabcc6d79b6b6
SHA25696fec6a6a486be7defe7a120d8313ad277c1841756d7d7481fa33b6f45b9ad61
SHA512cb0c9d3f1036fa0a69797510452cee3acd0a69a5f1b7637acb335036541ddd00333045cff4ceaf09d45845d2b8d2d931286faed80574e7947c10fc8d8a92766e
-
Filesize
241KB
MD531c9ee5287d3554aa43386c81a8f5d86
SHA1271f202aec7d2814e84eb83aa1aaabcc6d79b6b6
SHA25696fec6a6a486be7defe7a120d8313ad277c1841756d7d7481fa33b6f45b9ad61
SHA512cb0c9d3f1036fa0a69797510452cee3acd0a69a5f1b7637acb335036541ddd00333045cff4ceaf09d45845d2b8d2d931286faed80574e7947c10fc8d8a92766e
-
Filesize
241KB
MD531c9ee5287d3554aa43386c81a8f5d86
SHA1271f202aec7d2814e84eb83aa1aaabcc6d79b6b6
SHA25696fec6a6a486be7defe7a120d8313ad277c1841756d7d7481fa33b6f45b9ad61
SHA512cb0c9d3f1036fa0a69797510452cee3acd0a69a5f1b7637acb335036541ddd00333045cff4ceaf09d45845d2b8d2d931286faed80574e7947c10fc8d8a92766e
-
Filesize
108KB
MD5d3c58916228d79ca1f296c40f1709309
SHA174408dae7ae26fb363300503987951ca1ac67ba8
SHA2567fb27db4efe1045e196ec4f726f360daf51233769f5b0a923f9dde585286f30d
SHA512f4ef71c6a26670a3245be3c80f52bc33ddd2afc778ae1129798044d32d6ce85ad01db0a0d90a922657d6950ab4700707544ce68ae1b2cfaf5717dd80eaf68d3c
-
Filesize
108KB
MD5d3c58916228d79ca1f296c40f1709309
SHA174408dae7ae26fb363300503987951ca1ac67ba8
SHA2567fb27db4efe1045e196ec4f726f360daf51233769f5b0a923f9dde585286f30d
SHA512f4ef71c6a26670a3245be3c80f52bc33ddd2afc778ae1129798044d32d6ce85ad01db0a0d90a922657d6950ab4700707544ce68ae1b2cfaf5717dd80eaf68d3c
-
Filesize
176KB
MD59827ac154496db2ce8db6a1e2cbb731b
SHA11a34bfcf269d66e63e4c7a437e28230642e3f042
SHA256f7c59e1ecd3376d5585b8aa5403fb50a3b2d0be783a4141b2563d1b7fcd74327
SHA51269a6989873f74b5763e4440fb655185ed55012db86056864fe81ed5ae73cfe1406dcd9145ae61139920d6b50ff3888528bf71588c61d9aa5ffc41461bb04d931
-
Filesize
176KB
MD59827ac154496db2ce8db6a1e2cbb731b
SHA11a34bfcf269d66e63e4c7a437e28230642e3f042
SHA256f7c59e1ecd3376d5585b8aa5403fb50a3b2d0be783a4141b2563d1b7fcd74327
SHA51269a6989873f74b5763e4440fb655185ed55012db86056864fe81ed5ae73cfe1406dcd9145ae61139920d6b50ff3888528bf71588c61d9aa5ffc41461bb04d931
-
Filesize
176KB
MD59827ac154496db2ce8db6a1e2cbb731b
SHA11a34bfcf269d66e63e4c7a437e28230642e3f042
SHA256f7c59e1ecd3376d5585b8aa5403fb50a3b2d0be783a4141b2563d1b7fcd74327
SHA51269a6989873f74b5763e4440fb655185ed55012db86056864fe81ed5ae73cfe1406dcd9145ae61139920d6b50ff3888528bf71588c61d9aa5ffc41461bb04d931
-
Filesize
158KB
MD5340794dd3815d377817efb970928871f
SHA12f429d3937a3164a7401254a133859b28bf7f899
SHA256ad7ec17f46f60e6cc35ad253f31f07327d54b2bd2b8e9be52d775c81af36d75a
SHA5121e08411fb0724bcbcb05dbb4b12c673cac2556288a727edf858f68bbad0bacb9a09d10a08f773a02ca5b9b2157d4ec3535acc32bdfc3f4d000b466b09433b268
-
Filesize
158KB
MD5340794dd3815d377817efb970928871f
SHA12f429d3937a3164a7401254a133859b28bf7f899
SHA256ad7ec17f46f60e6cc35ad253f31f07327d54b2bd2b8e9be52d775c81af36d75a
SHA5121e08411fb0724bcbcb05dbb4b12c673cac2556288a727edf858f68bbad0bacb9a09d10a08f773a02ca5b9b2157d4ec3535acc32bdfc3f4d000b466b09433b268
-
Filesize
158KB
MD5340794dd3815d377817efb970928871f
SHA12f429d3937a3164a7401254a133859b28bf7f899
SHA256ad7ec17f46f60e6cc35ad253f31f07327d54b2bd2b8e9be52d775c81af36d75a
SHA5121e08411fb0724bcbcb05dbb4b12c673cac2556288a727edf858f68bbad0bacb9a09d10a08f773a02ca5b9b2157d4ec3535acc32bdfc3f4d000b466b09433b268