Analysis

  • max time kernel
    158s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:55

General

  • Target

    7222b0b37313e9d88bf638cdcb597a5bcaca3ca18c939c53e338ba81ceba1845.exe

  • Size

    445KB

  • MD5

    ee6af5152480b42df491580fd96a9fbe

  • SHA1

    2a06c90d968a9125440e7f5fa7366cdb69abcdd6

  • SHA256

    7222b0b37313e9d88bf638cdcb597a5bcaca3ca18c939c53e338ba81ceba1845

  • SHA512

    daab8628cfa928b0f28c88e5c89a6e468f98e5bf5207e3e8e10224328107a562a2d270c69143b726fe8b6e69c8d8ebfa66a24efc7b7ef11302d776879590addb

  • SSDEEP

    12288:llMhLm5U1AyL1EO745YiV35wm1B9U3I8IZ3p:lEm5FyL1EeBiV3fn9Uq

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7222b0b37313e9d88bf638cdcb597a5bcaca3ca18c939c53e338ba81ceba1845.exe
    "C:\Users\Admin\AppData\Local\Temp\7222b0b37313e9d88bf638cdcb597a5bcaca3ca18c939c53e338ba81ceba1845.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:5084
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4832
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:4844
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4932
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:3524
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:696
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:5096
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:912
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3244
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:4596
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1848
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:4572
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:1356
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:116

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nstF66D.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nstF66D.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nstF66D.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nstF66D.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nstF66D.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nstF66D.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nstF66D.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nstF66D.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nstF66D.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            002068a6dacce7ebb525607091375bd6

            SHA1

            4de8912134897ed53cd6d2b035716138ed15e322

            SHA256

            4c63680c5bcb3db165289f2a88e9026537f6b620a6e7076036e8c13acea14281

            SHA512

            0aa45aef6990b4566e494281ff0b9c009118ec99690a2c5cac1c14f6432ca2ac1b6329476f4591de9445bbebf4de309772c4d16aceff018f0ab48191755ec384

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            002068a6dacce7ebb525607091375bd6

            SHA1

            4de8912134897ed53cd6d2b035716138ed15e322

            SHA256

            4c63680c5bcb3db165289f2a88e9026537f6b620a6e7076036e8c13acea14281

            SHA512

            0aa45aef6990b4566e494281ff0b9c009118ec99690a2c5cac1c14f6432ca2ac1b6329476f4591de9445bbebf4de309772c4d16aceff018f0ab48191755ec384

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            002068a6dacce7ebb525607091375bd6

            SHA1

            4de8912134897ed53cd6d2b035716138ed15e322

            SHA256

            4c63680c5bcb3db165289f2a88e9026537f6b620a6e7076036e8c13acea14281

            SHA512

            0aa45aef6990b4566e494281ff0b9c009118ec99690a2c5cac1c14f6432ca2ac1b6329476f4591de9445bbebf4de309772c4d16aceff018f0ab48191755ec384

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            002068a6dacce7ebb525607091375bd6

            SHA1

            4de8912134897ed53cd6d2b035716138ed15e322

            SHA256

            4c63680c5bcb3db165289f2a88e9026537f6b620a6e7076036e8c13acea14281

            SHA512

            0aa45aef6990b4566e494281ff0b9c009118ec99690a2c5cac1c14f6432ca2ac1b6329476f4591de9445bbebf4de309772c4d16aceff018f0ab48191755ec384

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            eff1c601ef0bce40cf678df0f9b7ab9e

            SHA1

            09509bc59e4e509a0afc34f45622a1adc480f13f

            SHA256

            d166c6c7c956b23bc6ecf850ee0efc128eb7eacd46650d0ca3c1a265c4b914fd

            SHA512

            2f6894cffeacd8e27bc066bd8efa56ff274e4bc1b4e93145fe8d4c2a3a80bfadaeef992e8216130e7ac18939d1ab0a04e3c69e4cab9dc496e6baf791368cccd6

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            eff1c601ef0bce40cf678df0f9b7ab9e

            SHA1

            09509bc59e4e509a0afc34f45622a1adc480f13f

            SHA256

            d166c6c7c956b23bc6ecf850ee0efc128eb7eacd46650d0ca3c1a265c4b914fd

            SHA512

            2f6894cffeacd8e27bc066bd8efa56ff274e4bc1b4e93145fe8d4c2a3a80bfadaeef992e8216130e7ac18939d1ab0a04e3c69e4cab9dc496e6baf791368cccd6

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            eff1c601ef0bce40cf678df0f9b7ab9e

            SHA1

            09509bc59e4e509a0afc34f45622a1adc480f13f

            SHA256

            d166c6c7c956b23bc6ecf850ee0efc128eb7eacd46650d0ca3c1a265c4b914fd

            SHA512

            2f6894cffeacd8e27bc066bd8efa56ff274e4bc1b4e93145fe8d4c2a3a80bfadaeef992e8216130e7ac18939d1ab0a04e3c69e4cab9dc496e6baf791368cccd6

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            cff87ac6e69609a96b906db6ecedc944

            SHA1

            931e40726a97d24d26c96f66d6d7a6b3cd98d2fb

            SHA256

            22953de4b7a3df4d96c90fba496d23a1959844ab2ebb9c3a5f9020a8ea30549e

            SHA512

            4fc992545b7c2f721cda08c928f7aefa718f34ffc0c3a53af7eb28cf4c808c70a3f43ae9bef23499d7bf154cd4f57d41ed46f272a1c0fcb88934e50655413c01

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            cff87ac6e69609a96b906db6ecedc944

            SHA1

            931e40726a97d24d26c96f66d6d7a6b3cd98d2fb

            SHA256

            22953de4b7a3df4d96c90fba496d23a1959844ab2ebb9c3a5f9020a8ea30549e

            SHA512

            4fc992545b7c2f721cda08c928f7aefa718f34ffc0c3a53af7eb28cf4c808c70a3f43ae9bef23499d7bf154cd4f57d41ed46f272a1c0fcb88934e50655413c01

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            cef91fe26d9da6a2be657af4c4db3946

            SHA1

            a4d6028897f55fcd8d4713c449b33d06a0fca684

            SHA256

            3475fdfe92578bf7745d8ae459187be6053e17a8a37b97a3d11859f051bbd725

            SHA512

            4f563f4960161e0076c914726246ec3478ce6974afad388fff356421b15a9b12596845a426f3f0584724864f8bedd57f5f3e81a5027830dcde2acce0fa7b73a6

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            cef91fe26d9da6a2be657af4c4db3946

            SHA1

            a4d6028897f55fcd8d4713c449b33d06a0fca684

            SHA256

            3475fdfe92578bf7745d8ae459187be6053e17a8a37b97a3d11859f051bbd725

            SHA512

            4f563f4960161e0076c914726246ec3478ce6974afad388fff356421b15a9b12596845a426f3f0584724864f8bedd57f5f3e81a5027830dcde2acce0fa7b73a6

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            cef91fe26d9da6a2be657af4c4db3946

            SHA1

            a4d6028897f55fcd8d4713c449b33d06a0fca684

            SHA256

            3475fdfe92578bf7745d8ae459187be6053e17a8a37b97a3d11859f051bbd725

            SHA512

            4f563f4960161e0076c914726246ec3478ce6974afad388fff356421b15a9b12596845a426f3f0584724864f8bedd57f5f3e81a5027830dcde2acce0fa7b73a6

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            73d9c5e7b81f3ce80950efdf0f7c7ebc

            SHA1

            17660e60f5bf9b6cacf786bd4404a00bc58df36e

            SHA256

            a01588496acec10417ea5af49448cebce092b83520ccde45ebe0522af397fa34

            SHA512

            804677aad9c76ad3b27e295c484e5e2c3711f81e1a041fc25134b7dffba5a99fd5e6a333009c88e74e81cc498a15b18fbdd27e073d2d5b8e2278c2e90426896c

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            73d9c5e7b81f3ce80950efdf0f7c7ebc

            SHA1

            17660e60f5bf9b6cacf786bd4404a00bc58df36e

            SHA256

            a01588496acec10417ea5af49448cebce092b83520ccde45ebe0522af397fa34

            SHA512

            804677aad9c76ad3b27e295c484e5e2c3711f81e1a041fc25134b7dffba5a99fd5e6a333009c88e74e81cc498a15b18fbdd27e073d2d5b8e2278c2e90426896c

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            73d9c5e7b81f3ce80950efdf0f7c7ebc

            SHA1

            17660e60f5bf9b6cacf786bd4404a00bc58df36e

            SHA256

            a01588496acec10417ea5af49448cebce092b83520ccde45ebe0522af397fa34

            SHA512

            804677aad9c76ad3b27e295c484e5e2c3711f81e1a041fc25134b7dffba5a99fd5e6a333009c88e74e81cc498a15b18fbdd27e073d2d5b8e2278c2e90426896c

          • memory/696-141-0x0000000000000000-mapping.dmp

          • memory/912-152-0x0000000000000000-mapping.dmp

          • memory/1848-164-0x0000000000000000-mapping.dmp

          • memory/3244-157-0x0000000000000000-mapping.dmp

          • memory/3524-140-0x0000000000000000-mapping.dmp

          • memory/4572-165-0x0000000000000000-mapping.dmp

          • memory/4596-158-0x0000000000000000-mapping.dmp

          • memory/4832-135-0x0000000000000000-mapping.dmp

          • memory/4844-136-0x0000000000000000-mapping.dmp

          • memory/4932-139-0x0000000000000000-mapping.dmp

          • memory/5096-146-0x0000000000000000-mapping.dmp