Analysis

  • max time kernel
    139s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:55

General

  • Target

    7a887c5b7d6b502dc97ec3f50139da91d12ec1021a257f55b2583b1037ef3068.exe

  • Size

    446KB

  • MD5

    1e229e634019b6cd13cae22a87db4347

  • SHA1

    2c4f82961a9a1adcea0a81cd81b293c6aee35c37

  • SHA256

    7a887c5b7d6b502dc97ec3f50139da91d12ec1021a257f55b2583b1037ef3068

  • SHA512

    c6bd7e92cc670fdd133dea827f71d30ab8f7414629b2d893c8ca06a1354da06ee7c4b51cc715c95ba7caeaca62efb9b4d33b68c36c9f0a7163b914f2ac823b05

  • SSDEEP

    6144:XzfbB2mddh3h3rIPVEAid/T4q/u/IBLjbowQa6pteJqeSAt+pPvAMTQHCvFe4WtY:PIQdh3h30PVEbVTb/uQjbaaS/3TQZdy

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a887c5b7d6b502dc97ec3f50139da91d12ec1021a257f55b2583b1037ef3068.exe
    "C:\Users\Admin\AppData\Local\Temp\7a887c5b7d6b502dc97ec3f50139da91d12ec1021a257f55b2583b1037ef3068.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3776
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:1820
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2112
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:4268
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4336
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3348
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:636
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4156
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:5016
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:224
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:4704
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:3372
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:4732

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsy9E4A.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nsy9E4A.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsy9E4A.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsy9E4A.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsy9E4A.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsy9E4A.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsy9E4A.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsy9E4A.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsy9E4A.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            e96330c3ae714440e8a6f9df61ec5047

            SHA1

            61b5050d758c1ca4549f5ed6b190bbdabbe922ab

            SHA256

            8667c0c9c74ff0d342047801fe7fbc351322c22a1bd05818ac4763d1f492cc27

            SHA512

            50513dd796f678217aeffdaa089bc4fd42a26c0799706e10f5e5e3e00ad130f806c8a5cd86826c721b7d298fd8647c0536f985f351cf1b9d6c0cc5ff7de61aa4

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            e96330c3ae714440e8a6f9df61ec5047

            SHA1

            61b5050d758c1ca4549f5ed6b190bbdabbe922ab

            SHA256

            8667c0c9c74ff0d342047801fe7fbc351322c22a1bd05818ac4763d1f492cc27

            SHA512

            50513dd796f678217aeffdaa089bc4fd42a26c0799706e10f5e5e3e00ad130f806c8a5cd86826c721b7d298fd8647c0536f985f351cf1b9d6c0cc5ff7de61aa4

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            e96330c3ae714440e8a6f9df61ec5047

            SHA1

            61b5050d758c1ca4549f5ed6b190bbdabbe922ab

            SHA256

            8667c0c9c74ff0d342047801fe7fbc351322c22a1bd05818ac4763d1f492cc27

            SHA512

            50513dd796f678217aeffdaa089bc4fd42a26c0799706e10f5e5e3e00ad130f806c8a5cd86826c721b7d298fd8647c0536f985f351cf1b9d6c0cc5ff7de61aa4

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            e96330c3ae714440e8a6f9df61ec5047

            SHA1

            61b5050d758c1ca4549f5ed6b190bbdabbe922ab

            SHA256

            8667c0c9c74ff0d342047801fe7fbc351322c22a1bd05818ac4763d1f492cc27

            SHA512

            50513dd796f678217aeffdaa089bc4fd42a26c0799706e10f5e5e3e00ad130f806c8a5cd86826c721b7d298fd8647c0536f985f351cf1b9d6c0cc5ff7de61aa4

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            158fd187c99ada8d7b59925594bbebc5

            SHA1

            bdabbbb84ee4043fe6f6f26507facb5b066839ff

            SHA256

            f0fe03ca06b71ea05fe8593d39735fb63b6526fa72149b93a40cd1d533cd5012

            SHA512

            8d520384197b64d992890a3994f275058fe8ef0acaea9ec5aa6f35448db76b0442c2d08f03f7bdaa2104acd7b1ac56eccee1fa9824371e40c04653a33368bad3

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            158fd187c99ada8d7b59925594bbebc5

            SHA1

            bdabbbb84ee4043fe6f6f26507facb5b066839ff

            SHA256

            f0fe03ca06b71ea05fe8593d39735fb63b6526fa72149b93a40cd1d533cd5012

            SHA512

            8d520384197b64d992890a3994f275058fe8ef0acaea9ec5aa6f35448db76b0442c2d08f03f7bdaa2104acd7b1ac56eccee1fa9824371e40c04653a33368bad3

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            158fd187c99ada8d7b59925594bbebc5

            SHA1

            bdabbbb84ee4043fe6f6f26507facb5b066839ff

            SHA256

            f0fe03ca06b71ea05fe8593d39735fb63b6526fa72149b93a40cd1d533cd5012

            SHA512

            8d520384197b64d992890a3994f275058fe8ef0acaea9ec5aa6f35448db76b0442c2d08f03f7bdaa2104acd7b1ac56eccee1fa9824371e40c04653a33368bad3

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            f27a4d4eab95a753b506fe67fc59a831

            SHA1

            ee0f0742d6d7f5a2daba901bb75704ff893c89f8

            SHA256

            442299b08870d2bc7268369474f147f72ba4d42d1e56a85e877eac436f8cef39

            SHA512

            4f00cb57f8674fb55fa458e0af7c4999711df87852c8b7a2239f01cb758dde4e2782e940ccba3593826c024b103bc55aba10246c562deb11b27f70c4615c5594

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            f27a4d4eab95a753b506fe67fc59a831

            SHA1

            ee0f0742d6d7f5a2daba901bb75704ff893c89f8

            SHA256

            442299b08870d2bc7268369474f147f72ba4d42d1e56a85e877eac436f8cef39

            SHA512

            4f00cb57f8674fb55fa458e0af7c4999711df87852c8b7a2239f01cb758dde4e2782e940ccba3593826c024b103bc55aba10246c562deb11b27f70c4615c5594

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            064e9fc716f149fac5aa0ef5ccbb88e2

            SHA1

            9d5e2fb073401e4bd455c12bd9e64a96bb9582c1

            SHA256

            77b764cdfc2f7b008cfa94bfe709b1ac24022681deda0b345daeb498c2dd24e1

            SHA512

            517a3e0e50f8967f70418b444f09ecd97a3de5f2878fcba2e4193b4cc475a0c912ff97a9af03334599d9965a09d8c104bb3b0b8d61718ee67d21b53f6152f304

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            064e9fc716f149fac5aa0ef5ccbb88e2

            SHA1

            9d5e2fb073401e4bd455c12bd9e64a96bb9582c1

            SHA256

            77b764cdfc2f7b008cfa94bfe709b1ac24022681deda0b345daeb498c2dd24e1

            SHA512

            517a3e0e50f8967f70418b444f09ecd97a3de5f2878fcba2e4193b4cc475a0c912ff97a9af03334599d9965a09d8c104bb3b0b8d61718ee67d21b53f6152f304

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            064e9fc716f149fac5aa0ef5ccbb88e2

            SHA1

            9d5e2fb073401e4bd455c12bd9e64a96bb9582c1

            SHA256

            77b764cdfc2f7b008cfa94bfe709b1ac24022681deda0b345daeb498c2dd24e1

            SHA512

            517a3e0e50f8967f70418b444f09ecd97a3de5f2878fcba2e4193b4cc475a0c912ff97a9af03334599d9965a09d8c104bb3b0b8d61718ee67d21b53f6152f304

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            dd38fd552dbe975963b2dca7e1017f5c

            SHA1

            0dc4def62c5a1fda7798660fdf4964d20e47bb4a

            SHA256

            3686ea22e8d2636876ba8b3cabdb933743a5a855b51d7105476a31486ed29eb7

            SHA512

            1a65317c71af87c153065ef567f10a51069da16ae1208fb1c8040946cd912a4130931792fdf593c9efa170b6dcaf64f44a170f82c4125860bffd1069cc71e897

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            dd38fd552dbe975963b2dca7e1017f5c

            SHA1

            0dc4def62c5a1fda7798660fdf4964d20e47bb4a

            SHA256

            3686ea22e8d2636876ba8b3cabdb933743a5a855b51d7105476a31486ed29eb7

            SHA512

            1a65317c71af87c153065ef567f10a51069da16ae1208fb1c8040946cd912a4130931792fdf593c9efa170b6dcaf64f44a170f82c4125860bffd1069cc71e897

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            dd38fd552dbe975963b2dca7e1017f5c

            SHA1

            0dc4def62c5a1fda7798660fdf4964d20e47bb4a

            SHA256

            3686ea22e8d2636876ba8b3cabdb933743a5a855b51d7105476a31486ed29eb7

            SHA512

            1a65317c71af87c153065ef567f10a51069da16ae1208fb1c8040946cd912a4130931792fdf593c9efa170b6dcaf64f44a170f82c4125860bffd1069cc71e897

          • memory/224-164-0x0000000000000000-mapping.dmp

          • memory/636-152-0x0000000000000000-mapping.dmp

          • memory/1820-136-0x0000000000000000-mapping.dmp

          • memory/2112-139-0x0000000000000000-mapping.dmp

          • memory/3348-146-0x0000000000000000-mapping.dmp

          • memory/3776-135-0x0000000000000000-mapping.dmp

          • memory/4156-157-0x0000000000000000-mapping.dmp

          • memory/4268-140-0x0000000000000000-mapping.dmp

          • memory/4336-141-0x0000000000000000-mapping.dmp

          • memory/4704-165-0x0000000000000000-mapping.dmp

          • memory/5016-158-0x0000000000000000-mapping.dmp