Analysis

  • max time kernel
    100s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:57

General

  • Target

    52b3873b4fbf0166be8aa551ca64de6bd6b9c94b9058a4d20b8b553b4cfa970f.exe

  • Size

    447KB

  • MD5

    b2673b3ec8f332ab3aeb22d66b08d691

  • SHA1

    b5f86fca67753ae83389ae75ddd57504a9a8e6a3

  • SHA256

    52b3873b4fbf0166be8aa551ca64de6bd6b9c94b9058a4d20b8b553b4cfa970f

  • SHA512

    c964e8bc80b64c4c0596f59da950a4932ebce74d33a792de5be0a12f6b55a9f5be73719de9e2a30417f28711f4b94b7c6d0d9bba6bf9e077933354c604b1553c

  • SSDEEP

    6144:XzfsJuDS9cog+jLlFx1nZqmn8sK5jt8RP0ghOp0ZK1HV783UQzZL7sgxGGFvAOyP:Yw++ohlFHnZs7t8Z5hacZLgqhAOy1Pd

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52b3873b4fbf0166be8aa551ca64de6bd6b9c94b9058a4d20b8b553b4cfa970f.exe
    "C:\Users\Admin\AppData\Local\Temp\52b3873b4fbf0166be8aa551ca64de6bd6b9c94b9058a4d20b8b553b4cfa970f.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:680
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1340
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:1644
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2020
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:1752
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1560
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1484
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:1032
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1788
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:1140
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1228
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:888
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:2040
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:360

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            532ec58a0001b14e4d4b27658dd0a1aa

            SHA1

            b33302306ed15f4b60b2891f970a5bea59577e23

            SHA256

            d54657ece473f42c455e11a46a9fe79a78d9ff821bea5ddfe9d8b7b0f7d3a9c6

            SHA512

            72434523aa84e7162b975a17d3e893d75a58765efc0d3ebbdd190d052bb8b2d3bc0cb384f686b7071a676ccf9d10a918de88f703edc34c4e1a3260d56e126513

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            87af4833882a51419b463ff6d7cfd153

            SHA1

            c68164201072ed46c126408e062321a21331eabc

            SHA256

            c29c55ac82e0b25996d902b94cd92685767e0f7473f0e8c12172d90ec18a7361

            SHA512

            7c2f167ac36b702e45f06c8047a748dae602065425eed824ea615f1f93f16d2f54a6374aa37096c425a9a4cc2d39caba40c3f32b97f97faa7b0d4f78346872a2

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            febc14919e4466474d33593040e41c0f

            SHA1

            a0a7517e1a232df360664bcc6aff7b773dd2fe57

            SHA256

            602db2ad0eacb250af0d91bb5c55e9ab7fb54853bfe140007e34216ccfd1d16b

            SHA512

            a3d3aceee96f0761fc64991cd414eb681389c91369eee113a7bf80993eaaf59f97471e75c4680c2d04dbfe57599879cca945e57e6142df3d178078687d096f17

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            3d3bd714fad6ab4d4918fc09efadee45

            SHA1

            03c9be3641527c37e37a518ae4ae8421bc927177

            SHA256

            e31ca92f0490b6c563a7f8398f4f05fa4af2d32229509041e849fa15ac3fccb9

            SHA512

            9303fc0479e6a9ef4d03e463b0fe1f541991517fbe611b7c23525c362d6a63915218891cebe4899c972557cdf0d74ff8f3145c4253fa7bf1c8e165e26ecfceee

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            3d3bd714fad6ab4d4918fc09efadee45

            SHA1

            03c9be3641527c37e37a518ae4ae8421bc927177

            SHA256

            e31ca92f0490b6c563a7f8398f4f05fa4af2d32229509041e849fa15ac3fccb9

            SHA512

            9303fc0479e6a9ef4d03e463b0fe1f541991517fbe611b7c23525c362d6a63915218891cebe4899c972557cdf0d74ff8f3145c4253fa7bf1c8e165e26ecfceee

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            159KB

            MD5

            b9d70b66f407c64adad2210aacf78e17

            SHA1

            bbeeafe3c88c574b0433a25054c1e9ba0046168b

            SHA256

            4cefea1f0627f20c3f1bdf6dcc2b5152ad462bf4d32d929b68a787a648122b79

            SHA512

            cdecab3fd5a36a0ea43da5ddafe8e10da7202905ed1cb1404ec0b8a08000d6b8748305ad6a94df0754b35509dfc753e312430693c9b2233d66975b83effdb5b5

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            159KB

            MD5

            b9d70b66f407c64adad2210aacf78e17

            SHA1

            bbeeafe3c88c574b0433a25054c1e9ba0046168b

            SHA256

            4cefea1f0627f20c3f1bdf6dcc2b5152ad462bf4d32d929b68a787a648122b79

            SHA512

            cdecab3fd5a36a0ea43da5ddafe8e10da7202905ed1cb1404ec0b8a08000d6b8748305ad6a94df0754b35509dfc753e312430693c9b2233d66975b83effdb5b5

          • \Users\Admin\AppData\Local\Temp\nsyD932.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • \Users\Admin\AppData\Local\Temp\nsyD932.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsyD932.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsyD932.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsyD932.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            532ec58a0001b14e4d4b27658dd0a1aa

            SHA1

            b33302306ed15f4b60b2891f970a5bea59577e23

            SHA256

            d54657ece473f42c455e11a46a9fe79a78d9ff821bea5ddfe9d8b7b0f7d3a9c6

            SHA512

            72434523aa84e7162b975a17d3e893d75a58765efc0d3ebbdd190d052bb8b2d3bc0cb384f686b7071a676ccf9d10a918de88f703edc34c4e1a3260d56e126513

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            532ec58a0001b14e4d4b27658dd0a1aa

            SHA1

            b33302306ed15f4b60b2891f970a5bea59577e23

            SHA256

            d54657ece473f42c455e11a46a9fe79a78d9ff821bea5ddfe9d8b7b0f7d3a9c6

            SHA512

            72434523aa84e7162b975a17d3e893d75a58765efc0d3ebbdd190d052bb8b2d3bc0cb384f686b7071a676ccf9d10a918de88f703edc34c4e1a3260d56e126513

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            532ec58a0001b14e4d4b27658dd0a1aa

            SHA1

            b33302306ed15f4b60b2891f970a5bea59577e23

            SHA256

            d54657ece473f42c455e11a46a9fe79a78d9ff821bea5ddfe9d8b7b0f7d3a9c6

            SHA512

            72434523aa84e7162b975a17d3e893d75a58765efc0d3ebbdd190d052bb8b2d3bc0cb384f686b7071a676ccf9d10a918de88f703edc34c4e1a3260d56e126513

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            87af4833882a51419b463ff6d7cfd153

            SHA1

            c68164201072ed46c126408e062321a21331eabc

            SHA256

            c29c55ac82e0b25996d902b94cd92685767e0f7473f0e8c12172d90ec18a7361

            SHA512

            7c2f167ac36b702e45f06c8047a748dae602065425eed824ea615f1f93f16d2f54a6374aa37096c425a9a4cc2d39caba40c3f32b97f97faa7b0d4f78346872a2

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            87af4833882a51419b463ff6d7cfd153

            SHA1

            c68164201072ed46c126408e062321a21331eabc

            SHA256

            c29c55ac82e0b25996d902b94cd92685767e0f7473f0e8c12172d90ec18a7361

            SHA512

            7c2f167ac36b702e45f06c8047a748dae602065425eed824ea615f1f93f16d2f54a6374aa37096c425a9a4cc2d39caba40c3f32b97f97faa7b0d4f78346872a2

          • \Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            febc14919e4466474d33593040e41c0f

            SHA1

            a0a7517e1a232df360664bcc6aff7b773dd2fe57

            SHA256

            602db2ad0eacb250af0d91bb5c55e9ab7fb54853bfe140007e34216ccfd1d16b

            SHA512

            a3d3aceee96f0761fc64991cd414eb681389c91369eee113a7bf80993eaaf59f97471e75c4680c2d04dbfe57599879cca945e57e6142df3d178078687d096f17

          • \Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            3d3bd714fad6ab4d4918fc09efadee45

            SHA1

            03c9be3641527c37e37a518ae4ae8421bc927177

            SHA256

            e31ca92f0490b6c563a7f8398f4f05fa4af2d32229509041e849fa15ac3fccb9

            SHA512

            9303fc0479e6a9ef4d03e463b0fe1f541991517fbe611b7c23525c362d6a63915218891cebe4899c972557cdf0d74ff8f3145c4253fa7bf1c8e165e26ecfceee

          • \Windows\SysWOW64\netupdsrv.exe

            Filesize

            159KB

            MD5

            b9d70b66f407c64adad2210aacf78e17

            SHA1

            bbeeafe3c88c574b0433a25054c1e9ba0046168b

            SHA256

            4cefea1f0627f20c3f1bdf6dcc2b5152ad462bf4d32d929b68a787a648122b79

            SHA512

            cdecab3fd5a36a0ea43da5ddafe8e10da7202905ed1cb1404ec0b8a08000d6b8748305ad6a94df0754b35509dfc753e312430693c9b2233d66975b83effdb5b5

          • memory/680-54-0x00000000767D1000-0x00000000767D3000-memory.dmp

            Filesize

            8KB

          • memory/888-86-0x0000000000000000-mapping.dmp

          • memory/1032-75-0x0000000000000000-mapping.dmp

          • memory/1140-80-0x0000000000000000-mapping.dmp

          • memory/1228-85-0x0000000000000000-mapping.dmp

          • memory/1340-57-0x0000000000000000-mapping.dmp

          • memory/1484-69-0x0000000000000000-mapping.dmp

          • memory/1560-63-0x0000000000000000-mapping.dmp

          • memory/1644-58-0x0000000000000000-mapping.dmp

          • memory/1752-61-0x0000000000000000-mapping.dmp

          • memory/1788-79-0x0000000000000000-mapping.dmp

          • memory/2020-60-0x0000000000000000-mapping.dmp