Analysis

  • max time kernel
    186s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:56

General

  • Target

    609511646cde264294f86aefcbdf8f154ab2dd7d205f21e4ada8738cddc215d2.exe

  • Size

    447KB

  • MD5

    63b1887e6ccbe9f311885fd8b37074e1

  • SHA1

    c339a935ec4f0da5772b26641e43ac69e9b2b173

  • SHA256

    609511646cde264294f86aefcbdf8f154ab2dd7d205f21e4ada8738cddc215d2

  • SHA512

    dc2f5599a86d0e49a93b3d3890d7de9708367a3e099e8f03e7e31e03beb4722623c4ec94839f3a4be57969bebaae2cfe216ad7581785a6c04532d59a2493b06a

  • SSDEEP

    12288:a3xI75QmBgvNVX1HAoGdTg2r0aybSxJ3e9he:ahIzBeX1RGe2rMQJ3e9E

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\609511646cde264294f86aefcbdf8f154ab2dd7d205f21e4ada8738cddc215d2.exe
    "C:\Users\Admin\AppData\Local\Temp\609511646cde264294f86aefcbdf8f154ab2dd7d205f21e4ada8738cddc215d2.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:480
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:4192
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3612
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:4168
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4372
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1176
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:2016
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4700
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:1492
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4956
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:3936
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:3812
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:4044

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsrFFD3.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nsrFFD3.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsrFFD3.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsrFFD3.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsrFFD3.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsrFFD3.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsrFFD3.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsrFFD3.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsrFFD3.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            08c8908203d8e215d1fde683c8d12e4f

            SHA1

            54fb29f67745f9ef11f0f8deedba7c36b8cb19cd

            SHA256

            5e8457dd403f707be93a25ff1b20aa92364db4f316ed02f27c5c7f3ec506fbb0

            SHA512

            9ebdfc5c71300feb0f2920dfec5f4d2f817ba8ba7a55f2b04606a922b12f2c3b82141bc02248466c13df97e6fa9713d3633a5f4c896fe3d1c4552d0f72e3ad5d

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            08c8908203d8e215d1fde683c8d12e4f

            SHA1

            54fb29f67745f9ef11f0f8deedba7c36b8cb19cd

            SHA256

            5e8457dd403f707be93a25ff1b20aa92364db4f316ed02f27c5c7f3ec506fbb0

            SHA512

            9ebdfc5c71300feb0f2920dfec5f4d2f817ba8ba7a55f2b04606a922b12f2c3b82141bc02248466c13df97e6fa9713d3633a5f4c896fe3d1c4552d0f72e3ad5d

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            08c8908203d8e215d1fde683c8d12e4f

            SHA1

            54fb29f67745f9ef11f0f8deedba7c36b8cb19cd

            SHA256

            5e8457dd403f707be93a25ff1b20aa92364db4f316ed02f27c5c7f3ec506fbb0

            SHA512

            9ebdfc5c71300feb0f2920dfec5f4d2f817ba8ba7a55f2b04606a922b12f2c3b82141bc02248466c13df97e6fa9713d3633a5f4c896fe3d1c4552d0f72e3ad5d

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            08c8908203d8e215d1fde683c8d12e4f

            SHA1

            54fb29f67745f9ef11f0f8deedba7c36b8cb19cd

            SHA256

            5e8457dd403f707be93a25ff1b20aa92364db4f316ed02f27c5c7f3ec506fbb0

            SHA512

            9ebdfc5c71300feb0f2920dfec5f4d2f817ba8ba7a55f2b04606a922b12f2c3b82141bc02248466c13df97e6fa9713d3633a5f4c896fe3d1c4552d0f72e3ad5d

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            6a2c307293cf0b77495b47ec0fb19220

            SHA1

            66bd53d75af180ea55b35d9645811c9b7352142f

            SHA256

            07b44b084427bb4ac0f2fbb48c9c3b9d80565f93425fa86e565f43b965167e53

            SHA512

            61efe3588c14b02655ff170548c5ceebd6ee3bc5b1ba12b584365222e5a9439f30f61851364b4ba188b2bbad6f05af464676f30dbd9d354574e781994402b91c

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            6a2c307293cf0b77495b47ec0fb19220

            SHA1

            66bd53d75af180ea55b35d9645811c9b7352142f

            SHA256

            07b44b084427bb4ac0f2fbb48c9c3b9d80565f93425fa86e565f43b965167e53

            SHA512

            61efe3588c14b02655ff170548c5ceebd6ee3bc5b1ba12b584365222e5a9439f30f61851364b4ba188b2bbad6f05af464676f30dbd9d354574e781994402b91c

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            6a2c307293cf0b77495b47ec0fb19220

            SHA1

            66bd53d75af180ea55b35d9645811c9b7352142f

            SHA256

            07b44b084427bb4ac0f2fbb48c9c3b9d80565f93425fa86e565f43b965167e53

            SHA512

            61efe3588c14b02655ff170548c5ceebd6ee3bc5b1ba12b584365222e5a9439f30f61851364b4ba188b2bbad6f05af464676f30dbd9d354574e781994402b91c

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            a1f542736e66f85d89b057bbdb46a981

            SHA1

            4928183bfcaae1af08c706b4a9feb1fad7a47f56

            SHA256

            83aff068f8c1b8c5341efe80e53f54de33a1547a28ff4c8a77f58ba269ba8401

            SHA512

            737c0aa12c4961c19f33c59de8dbfcb6bc45e2ae3b4d9a28ead54cd6f8d36b08c3ac5e52fc95774e43fb941276daa691ff67b72fab878a0311f4e09ae4024af5

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            a1f542736e66f85d89b057bbdb46a981

            SHA1

            4928183bfcaae1af08c706b4a9feb1fad7a47f56

            SHA256

            83aff068f8c1b8c5341efe80e53f54de33a1547a28ff4c8a77f58ba269ba8401

            SHA512

            737c0aa12c4961c19f33c59de8dbfcb6bc45e2ae3b4d9a28ead54cd6f8d36b08c3ac5e52fc95774e43fb941276daa691ff67b72fab878a0311f4e09ae4024af5

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            e6e615fd85f585d6b41acac947e8335e

            SHA1

            f69ee48211ec0d55f6a262dc2aff1c0b4d0b1e87

            SHA256

            5d36fbeef0e0daaeaa4f8e45b490f886d0e7433e65219893a060febc675cdd9b

            SHA512

            f47f29b55b8badcb7f8997cba3f024c82e5cfe2996726503451ae5340a3b215a1e1cc3f7a86495b46da0ecd6e4ab0760ba91fd043afe4c03ef0b61c7e8c50fd3

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            e6e615fd85f585d6b41acac947e8335e

            SHA1

            f69ee48211ec0d55f6a262dc2aff1c0b4d0b1e87

            SHA256

            5d36fbeef0e0daaeaa4f8e45b490f886d0e7433e65219893a060febc675cdd9b

            SHA512

            f47f29b55b8badcb7f8997cba3f024c82e5cfe2996726503451ae5340a3b215a1e1cc3f7a86495b46da0ecd6e4ab0760ba91fd043afe4c03ef0b61c7e8c50fd3

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            e6e615fd85f585d6b41acac947e8335e

            SHA1

            f69ee48211ec0d55f6a262dc2aff1c0b4d0b1e87

            SHA256

            5d36fbeef0e0daaeaa4f8e45b490f886d0e7433e65219893a060febc675cdd9b

            SHA512

            f47f29b55b8badcb7f8997cba3f024c82e5cfe2996726503451ae5340a3b215a1e1cc3f7a86495b46da0ecd6e4ab0760ba91fd043afe4c03ef0b61c7e8c50fd3

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            159KB

            MD5

            875310dfbde67d0a40b83b18b576b853

            SHA1

            8d529e3c1d9d9e5a9b64f6d71e9674d65c959aae

            SHA256

            b3ede7aaee88f63d5c4ebbcd297a40f71049fc090b776fdbfb2c3f5dce2b9157

            SHA512

            f5ab3175d400ebefd1ea2abc9f235e0b4326751dfe1dc7e290c55790c9d85e1adefddfc812034566bc733ebf22d47a7d4120afa0e4dddebde3c8b26b6cd241db

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            159KB

            MD5

            875310dfbde67d0a40b83b18b576b853

            SHA1

            8d529e3c1d9d9e5a9b64f6d71e9674d65c959aae

            SHA256

            b3ede7aaee88f63d5c4ebbcd297a40f71049fc090b776fdbfb2c3f5dce2b9157

            SHA512

            f5ab3175d400ebefd1ea2abc9f235e0b4326751dfe1dc7e290c55790c9d85e1adefddfc812034566bc733ebf22d47a7d4120afa0e4dddebde3c8b26b6cd241db

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            159KB

            MD5

            875310dfbde67d0a40b83b18b576b853

            SHA1

            8d529e3c1d9d9e5a9b64f6d71e9674d65c959aae

            SHA256

            b3ede7aaee88f63d5c4ebbcd297a40f71049fc090b776fdbfb2c3f5dce2b9157

            SHA512

            f5ab3175d400ebefd1ea2abc9f235e0b4326751dfe1dc7e290c55790c9d85e1adefddfc812034566bc733ebf22d47a7d4120afa0e4dddebde3c8b26b6cd241db

          • memory/480-135-0x0000000000000000-mapping.dmp

          • memory/1176-146-0x0000000000000000-mapping.dmp

          • memory/1492-158-0x0000000000000000-mapping.dmp

          • memory/2016-152-0x0000000000000000-mapping.dmp

          • memory/3612-139-0x0000000000000000-mapping.dmp

          • memory/3936-165-0x0000000000000000-mapping.dmp

          • memory/4168-140-0x0000000000000000-mapping.dmp

          • memory/4192-136-0x0000000000000000-mapping.dmp

          • memory/4372-141-0x0000000000000000-mapping.dmp

          • memory/4700-157-0x0000000000000000-mapping.dmp

          • memory/4956-164-0x0000000000000000-mapping.dmp