Analysis

  • max time kernel
    45s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:56

General

  • Target

    6343c91712316fbd10174fc8c418b1d79d45f379ba51693941354483dcb5fa72.exe

  • Size

    339KB

  • MD5

    0c6d12b19e587eb111575424b0eb08e0

  • SHA1

    eae55c9a2d65c5cf9c0f91ba11c7092c2a4ba2be

  • SHA256

    6343c91712316fbd10174fc8c418b1d79d45f379ba51693941354483dcb5fa72

  • SHA512

    3f93554d48711ecb10ead9b558f3cfd98fa54e32a1edca2ee9b5cf998bed1f72c15e383292c580320fa7eb7a58ff5802e90eb354abf20ccf8f8572516d9f327c

  • SSDEEP

    6144:IDSoIVXkvzkbFKdCblxWkZI6rjxEchFHyRBh7A53yaoGjW7PbPZJFMVCnGR6jf:NjKCblHIWSeSdGiWaPbFMEnGIjf

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6343c91712316fbd10174fc8c418b1d79d45f379ba51693941354483dcb5fa72.exe
    "C:\Users\Admin\AppData\Local\Temp\6343c91712316fbd10174fc8c418b1d79d45f379ba51693941354483dcb5fa72.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:872
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:1460
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1232
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:864
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1344
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:684
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:1660
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1680
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:1100
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1572
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:1948
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1748
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:1480

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            6118d8c6a476edbf6656c2236840f385

            SHA1

            4937e560bf5c10a32386fa0bdd3a86cccc13bed9

            SHA256

            8184459e5e1c20dd38798bb0bdc2a24849d9cbc4b155c2b99f391cee40d9aed6

            SHA512

            464733cc6702b186a6c540a6de4c7cd3dfd3ebd2803a057207621d7be5d955f9c6301dae0a26ca8e084ce20e966f28d3f3ae5c204d36f79cf04984d5942f1f60

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            4e41c8307a795427faa47d7f851d0d7f

            SHA1

            10a90a0ef01a47edd662ecc63bb95af4592c9109

            SHA256

            6043ce02ce32de9376137a9edafffa9d0b1fba7a7a4df586032f71b2783a86c4

            SHA512

            dd86e70ec1df1f24a8e8691637cfc0d61cf6fafb8dd21c76e1fcf43e837e502e53a2638eb039a9bd43ffa18b5c7659740322d2210c2829abf5f4d6b3833e623d

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            106KB

            MD5

            ff0d3a301c9a2df2ea0f320b8bc8be56

            SHA1

            1d78fd0bf1151fab67ed1a8b7fb4685507c346a4

            SHA256

            d28c00fcb251a2adf187c07608159611821e29005817d7ac724cba3c1bafddd6

            SHA512

            52fa4739425d65ade8fa3c595417c8ea7f7842f943d7a9050fb3c355775a4e69cf1da277a94cbb045dd937864da0c978cdee751f7f72dcceafced4036cb2a51c

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            9a1ebcfe1d75fbd6c0f029e40b3a3174

            SHA1

            901913c686698f4c5f2340915d76da6eee637e6e

            SHA256

            e2482d9e2f7b6bac4b347353702fc9bf5f8095d50aa0405cc2a8e751d3f6ae3c

            SHA512

            131412d09b5580743ef2ca3565927baa865cf1b96addc15aefd702e9a0d136e182bec30cef8f186241d58a2ff901f1aa505f849515f3c9e03156777f200b4829

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            9a1ebcfe1d75fbd6c0f029e40b3a3174

            SHA1

            901913c686698f4c5f2340915d76da6eee637e6e

            SHA256

            e2482d9e2f7b6bac4b347353702fc9bf5f8095d50aa0405cc2a8e751d3f6ae3c

            SHA512

            131412d09b5580743ef2ca3565927baa865cf1b96addc15aefd702e9a0d136e182bec30cef8f186241d58a2ff901f1aa505f849515f3c9e03156777f200b4829

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            92a0e0e9ace99f93c20689a365413a4a

            SHA1

            dfec8f3e448e1f50e71787ec891cc14c5e6a9d73

            SHA256

            de3778db1385ae3376021aa57d36595b58ce1d29e955d9da516c65c4f223205b

            SHA512

            44efde53f5863c80e29de7a57f40e97a48f68537f865e84881d8336644c736db73df9e9c399923bd351203009eb5115cc438f44769db0ab08d026540e1e309d6

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            92a0e0e9ace99f93c20689a365413a4a

            SHA1

            dfec8f3e448e1f50e71787ec891cc14c5e6a9d73

            SHA256

            de3778db1385ae3376021aa57d36595b58ce1d29e955d9da516c65c4f223205b

            SHA512

            44efde53f5863c80e29de7a57f40e97a48f68537f865e84881d8336644c736db73df9e9c399923bd351203009eb5115cc438f44769db0ab08d026540e1e309d6

          • \Users\Admin\AppData\Local\Temp\nsj3759.tmp\System.dll

            Filesize

            11KB

            MD5

            960a5c48e25cf2bca332e74e11d825c9

            SHA1

            da35c6816ace5daf4c6c1d57b93b09a82ecdc876

            SHA256

            484f8e9f194ed9016274ef3672b2c52ed5f574fb71d3884edf3c222b758a75a2

            SHA512

            cc450179e2d0d56aee2ccf8163d3882978c4e9c1aa3d3a95875fe9ba9831e07ddfd377111dc67f801fa53b6f468a418f086f1de7c71e0a5b634e1ae2a67cd3da

          • \Users\Admin\AppData\Local\Temp\nsj3759.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            51e63a9c5d6d230ef1c421b2eccd45dc

            SHA1

            c499cdad5c613d71ed3f7e93360f1bbc5748c45d

            SHA256

            cd8496a3802378391ec425dec424a14f5d30e242f192ec4eb022d767f9a2480f

            SHA512

            c23d713c3c834b3397c2a199490aed28f28d21f5781205c24df5e1e32365985c8a55be58f06979df09222740ffa51f4da764ebc3d912cd0c9d56ab6a33cab522

          • \Users\Admin\AppData\Local\Temp\nsj3759.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            51e63a9c5d6d230ef1c421b2eccd45dc

            SHA1

            c499cdad5c613d71ed3f7e93360f1bbc5748c45d

            SHA256

            cd8496a3802378391ec425dec424a14f5d30e242f192ec4eb022d767f9a2480f

            SHA512

            c23d713c3c834b3397c2a199490aed28f28d21f5781205c24df5e1e32365985c8a55be58f06979df09222740ffa51f4da764ebc3d912cd0c9d56ab6a33cab522

          • \Users\Admin\AppData\Local\Temp\nsj3759.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            51e63a9c5d6d230ef1c421b2eccd45dc

            SHA1

            c499cdad5c613d71ed3f7e93360f1bbc5748c45d

            SHA256

            cd8496a3802378391ec425dec424a14f5d30e242f192ec4eb022d767f9a2480f

            SHA512

            c23d713c3c834b3397c2a199490aed28f28d21f5781205c24df5e1e32365985c8a55be58f06979df09222740ffa51f4da764ebc3d912cd0c9d56ab6a33cab522

          • \Users\Admin\AppData\Local\Temp\nsj3759.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            51e63a9c5d6d230ef1c421b2eccd45dc

            SHA1

            c499cdad5c613d71ed3f7e93360f1bbc5748c45d

            SHA256

            cd8496a3802378391ec425dec424a14f5d30e242f192ec4eb022d767f9a2480f

            SHA512

            c23d713c3c834b3397c2a199490aed28f28d21f5781205c24df5e1e32365985c8a55be58f06979df09222740ffa51f4da764ebc3d912cd0c9d56ab6a33cab522

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            6118d8c6a476edbf6656c2236840f385

            SHA1

            4937e560bf5c10a32386fa0bdd3a86cccc13bed9

            SHA256

            8184459e5e1c20dd38798bb0bdc2a24849d9cbc4b155c2b99f391cee40d9aed6

            SHA512

            464733cc6702b186a6c540a6de4c7cd3dfd3ebd2803a057207621d7be5d955f9c6301dae0a26ca8e084ce20e966f28d3f3ae5c204d36f79cf04984d5942f1f60

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            6118d8c6a476edbf6656c2236840f385

            SHA1

            4937e560bf5c10a32386fa0bdd3a86cccc13bed9

            SHA256

            8184459e5e1c20dd38798bb0bdc2a24849d9cbc4b155c2b99f391cee40d9aed6

            SHA512

            464733cc6702b186a6c540a6de4c7cd3dfd3ebd2803a057207621d7be5d955f9c6301dae0a26ca8e084ce20e966f28d3f3ae5c204d36f79cf04984d5942f1f60

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            6118d8c6a476edbf6656c2236840f385

            SHA1

            4937e560bf5c10a32386fa0bdd3a86cccc13bed9

            SHA256

            8184459e5e1c20dd38798bb0bdc2a24849d9cbc4b155c2b99f391cee40d9aed6

            SHA512

            464733cc6702b186a6c540a6de4c7cd3dfd3ebd2803a057207621d7be5d955f9c6301dae0a26ca8e084ce20e966f28d3f3ae5c204d36f79cf04984d5942f1f60

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            4e41c8307a795427faa47d7f851d0d7f

            SHA1

            10a90a0ef01a47edd662ecc63bb95af4592c9109

            SHA256

            6043ce02ce32de9376137a9edafffa9d0b1fba7a7a4df586032f71b2783a86c4

            SHA512

            dd86e70ec1df1f24a8e8691637cfc0d61cf6fafb8dd21c76e1fcf43e837e502e53a2638eb039a9bd43ffa18b5c7659740322d2210c2829abf5f4d6b3833e623d

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            4e41c8307a795427faa47d7f851d0d7f

            SHA1

            10a90a0ef01a47edd662ecc63bb95af4592c9109

            SHA256

            6043ce02ce32de9376137a9edafffa9d0b1fba7a7a4df586032f71b2783a86c4

            SHA512

            dd86e70ec1df1f24a8e8691637cfc0d61cf6fafb8dd21c76e1fcf43e837e502e53a2638eb039a9bd43ffa18b5c7659740322d2210c2829abf5f4d6b3833e623d

          • \Windows\SysWOW64\installd.exe

            Filesize

            106KB

            MD5

            ff0d3a301c9a2df2ea0f320b8bc8be56

            SHA1

            1d78fd0bf1151fab67ed1a8b7fb4685507c346a4

            SHA256

            d28c00fcb251a2adf187c07608159611821e29005817d7ac724cba3c1bafddd6

            SHA512

            52fa4739425d65ade8fa3c595417c8ea7f7842f943d7a9050fb3c355775a4e69cf1da277a94cbb045dd937864da0c978cdee751f7f72dcceafced4036cb2a51c

          • \Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            9a1ebcfe1d75fbd6c0f029e40b3a3174

            SHA1

            901913c686698f4c5f2340915d76da6eee637e6e

            SHA256

            e2482d9e2f7b6bac4b347353702fc9bf5f8095d50aa0405cc2a8e751d3f6ae3c

            SHA512

            131412d09b5580743ef2ca3565927baa865cf1b96addc15aefd702e9a0d136e182bec30cef8f186241d58a2ff901f1aa505f849515f3c9e03156777f200b4829

          • \Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            92a0e0e9ace99f93c20689a365413a4a

            SHA1

            dfec8f3e448e1f50e71787ec891cc14c5e6a9d73

            SHA256

            de3778db1385ae3376021aa57d36595b58ce1d29e955d9da516c65c4f223205b

            SHA512

            44efde53f5863c80e29de7a57f40e97a48f68537f865e84881d8336644c736db73df9e9c399923bd351203009eb5115cc438f44769db0ab08d026540e1e309d6

          • memory/684-69-0x0000000000000000-mapping.dmp

          • memory/864-61-0x0000000000000000-mapping.dmp

          • memory/872-54-0x0000000076181000-0x0000000076183000-memory.dmp

            Filesize

            8KB

          • memory/1100-80-0x0000000000000000-mapping.dmp

          • memory/1232-60-0x0000000000000000-mapping.dmp

          • memory/1344-63-0x0000000000000000-mapping.dmp

          • memory/1460-58-0x0000000000000000-mapping.dmp

          • memory/1572-85-0x0000000000000000-mapping.dmp

          • memory/1660-75-0x0000000000000000-mapping.dmp

          • memory/1680-79-0x0000000000000000-mapping.dmp

          • memory/1948-86-0x0000000000000000-mapping.dmp

          • memory/1976-57-0x0000000000000000-mapping.dmp