Analysis

  • max time kernel
    78s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:14

General

  • Target

    b74690c59f6e08bf4c22045aff62440d22c9f1d76ecb255d1648c24c6e34a4e6.exe

  • Size

    602KB

  • MD5

    95770f706ac462b41e0910cf48c0b79f

  • SHA1

    891437336174945e00f86807d413e0c9e1e544e5

  • SHA256

    b74690c59f6e08bf4c22045aff62440d22c9f1d76ecb255d1648c24c6e34a4e6

  • SHA512

    5a7c146a7a0cd5c4088d79c8393fdd8d6a5e5f846dd1856efe6003c8439edd868d700eb359dc6a0d589e3ae09b277b3f7bc7742e2e5ec22af608256f9e375c5c

  • SSDEEP

    12288:kIny5DYTOJ9iqCB889+XhWgpfnULmWLlGFNyhJZrWguy:CUTK6JWZULmUGFEjss

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b74690c59f6e08bf4c22045aff62440d22c9f1d76ecb255d1648c24c6e34a4e6.exe
    "C:\Users\Admin\AppData\Local\Temp\b74690c59f6e08bf4c22045aff62440d22c9f1d76ecb255d1648c24c6e34a4e6.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1456
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:1184
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1068
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:664
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1164
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2040
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:2032
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:112
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:1340
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1348
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:1920
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1536
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:1720

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            f5a7dbf265ef89ff5c5933d82c703d49

            SHA1

            18ed37761689e9c257b0cdda5a5aa23df696944a

            SHA256

            ec427a326267da2120e4d0dcc0d0e4910b0e7e90f3c7b5427c14b5119721d90a

            SHA512

            508ca50a109f3ec782bbe0f7b1830b9b92ab53ca679e3c45755ab35bd2c59620e38b40e4f9a2d2318f41d3ed68c725d1a92311163dca98eb77b09c42861dcdf8

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            b2e1f641550506414af184154d8e7b64

            SHA1

            20c16984f3f170d061a276da5066201d4f032661

            SHA256

            87d12e7f5df1a1d077c911f9a3490be5e37ebfe111c8ebd2b0df2242e7cde432

            SHA512

            19e71ff71f784d150ff163b5f195fe63c02933ee19f970cf6afb68beeb5be44fd72c24c0a05002a0c081cd15f6bb46f809ccdb4136bdfddea424d529ac9b2db7

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            af36d659cfcfc718c49668bf1215af90

            SHA1

            459573073b17d866b3f7017d9cce1b777fc4bc5f

            SHA256

            ece207b37aa04476a802ab9a4457d99d377c641de0d3eadd0b31f5114ff694f7

            SHA512

            751654f0d1acd32775b618834819e5f28634e0090b349ceb4ce9113337a853d3d4ca6140f75c08efd7b431ae265c6eb6edb182a63c7ae9533a713d4a8de55d33

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            1dc70c064e4bcbc8068e438e445bb1c1

            SHA1

            e94656910570415ac34329b3d8b93f47e8b654d5

            SHA256

            fd4a022081296d0ebf872f7b4c717607481d2b873d7d17b836ebc813889e4c21

            SHA512

            835db2836b8bab81b86c85b6d54a426bea77b9516af94a8f2c9766761aa1c289bb0807cbda4843d562bdbe6d1a49b9728948008069ec6af4ec3306cd616dc584

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            1dc70c064e4bcbc8068e438e445bb1c1

            SHA1

            e94656910570415ac34329b3d8b93f47e8b654d5

            SHA256

            fd4a022081296d0ebf872f7b4c717607481d2b873d7d17b836ebc813889e4c21

            SHA512

            835db2836b8bab81b86c85b6d54a426bea77b9516af94a8f2c9766761aa1c289bb0807cbda4843d562bdbe6d1a49b9728948008069ec6af4ec3306cd616dc584

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            bbb192ae0028aad7b3d218a05c2c0485

            SHA1

            068805259b78a0062e41c6128d5381c23c4206f9

            SHA256

            7c3b4debaf077014ea5082c0b8bbb685a3512ff2b8816a439282228933e7944e

            SHA512

            c48af8091e05ea217c30537b93f5c53488cc8deb5f75912a3d948cc2797be31a218cbb020522366c7a8069ca791df2de3513d6cf3dbec7207381eaa0a79fcc3c

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            bbb192ae0028aad7b3d218a05c2c0485

            SHA1

            068805259b78a0062e41c6128d5381c23c4206f9

            SHA256

            7c3b4debaf077014ea5082c0b8bbb685a3512ff2b8816a439282228933e7944e

            SHA512

            c48af8091e05ea217c30537b93f5c53488cc8deb5f75912a3d948cc2797be31a218cbb020522366c7a8069ca791df2de3513d6cf3dbec7207381eaa0a79fcc3c

          • \Users\Admin\AppData\Local\Temp\nsjA5A5.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • \Users\Admin\AppData\Local\Temp\nsjA5A5.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsjA5A5.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsjA5A5.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsjA5A5.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            f5a7dbf265ef89ff5c5933d82c703d49

            SHA1

            18ed37761689e9c257b0cdda5a5aa23df696944a

            SHA256

            ec427a326267da2120e4d0dcc0d0e4910b0e7e90f3c7b5427c14b5119721d90a

            SHA512

            508ca50a109f3ec782bbe0f7b1830b9b92ab53ca679e3c45755ab35bd2c59620e38b40e4f9a2d2318f41d3ed68c725d1a92311163dca98eb77b09c42861dcdf8

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            f5a7dbf265ef89ff5c5933d82c703d49

            SHA1

            18ed37761689e9c257b0cdda5a5aa23df696944a

            SHA256

            ec427a326267da2120e4d0dcc0d0e4910b0e7e90f3c7b5427c14b5119721d90a

            SHA512

            508ca50a109f3ec782bbe0f7b1830b9b92ab53ca679e3c45755ab35bd2c59620e38b40e4f9a2d2318f41d3ed68c725d1a92311163dca98eb77b09c42861dcdf8

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            f5a7dbf265ef89ff5c5933d82c703d49

            SHA1

            18ed37761689e9c257b0cdda5a5aa23df696944a

            SHA256

            ec427a326267da2120e4d0dcc0d0e4910b0e7e90f3c7b5427c14b5119721d90a

            SHA512

            508ca50a109f3ec782bbe0f7b1830b9b92ab53ca679e3c45755ab35bd2c59620e38b40e4f9a2d2318f41d3ed68c725d1a92311163dca98eb77b09c42861dcdf8

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            b2e1f641550506414af184154d8e7b64

            SHA1

            20c16984f3f170d061a276da5066201d4f032661

            SHA256

            87d12e7f5df1a1d077c911f9a3490be5e37ebfe111c8ebd2b0df2242e7cde432

            SHA512

            19e71ff71f784d150ff163b5f195fe63c02933ee19f970cf6afb68beeb5be44fd72c24c0a05002a0c081cd15f6bb46f809ccdb4136bdfddea424d529ac9b2db7

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            b2e1f641550506414af184154d8e7b64

            SHA1

            20c16984f3f170d061a276da5066201d4f032661

            SHA256

            87d12e7f5df1a1d077c911f9a3490be5e37ebfe111c8ebd2b0df2242e7cde432

            SHA512

            19e71ff71f784d150ff163b5f195fe63c02933ee19f970cf6afb68beeb5be44fd72c24c0a05002a0c081cd15f6bb46f809ccdb4136bdfddea424d529ac9b2db7

          • \Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            af36d659cfcfc718c49668bf1215af90

            SHA1

            459573073b17d866b3f7017d9cce1b777fc4bc5f

            SHA256

            ece207b37aa04476a802ab9a4457d99d377c641de0d3eadd0b31f5114ff694f7

            SHA512

            751654f0d1acd32775b618834819e5f28634e0090b349ceb4ce9113337a853d3d4ca6140f75c08efd7b431ae265c6eb6edb182a63c7ae9533a713d4a8de55d33

          • \Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            1dc70c064e4bcbc8068e438e445bb1c1

            SHA1

            e94656910570415ac34329b3d8b93f47e8b654d5

            SHA256

            fd4a022081296d0ebf872f7b4c717607481d2b873d7d17b836ebc813889e4c21

            SHA512

            835db2836b8bab81b86c85b6d54a426bea77b9516af94a8f2c9766761aa1c289bb0807cbda4843d562bdbe6d1a49b9728948008069ec6af4ec3306cd616dc584

          • \Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            bbb192ae0028aad7b3d218a05c2c0485

            SHA1

            068805259b78a0062e41c6128d5381c23c4206f9

            SHA256

            7c3b4debaf077014ea5082c0b8bbb685a3512ff2b8816a439282228933e7944e

            SHA512

            c48af8091e05ea217c30537b93f5c53488cc8deb5f75912a3d948cc2797be31a218cbb020522366c7a8069ca791df2de3513d6cf3dbec7207381eaa0a79fcc3c

          • memory/112-81-0x0000000000000000-mapping.dmp

          • memory/664-62-0x0000000000000000-mapping.dmp

          • memory/1068-61-0x0000000000000000-mapping.dmp

          • memory/1164-64-0x0000000000000000-mapping.dmp

          • memory/1184-58-0x0000000000000000-mapping.dmp

          • memory/1340-82-0x0000000000000000-mapping.dmp

          • memory/1348-87-0x0000000000000000-mapping.dmp

          • memory/1456-57-0x0000000000000000-mapping.dmp

          • memory/1636-69-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1636-54-0x00000000757B1000-0x00000000757B3000-memory.dmp

            Filesize

            8KB

          • memory/1636-59-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1636-91-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1920-88-0x0000000000000000-mapping.dmp

          • memory/2032-77-0x0000000000000000-mapping.dmp

          • memory/2040-71-0x0000000000000000-mapping.dmp