Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:57

General

  • Target

    44dfec965c65d69e57a3a159bd5cff976006af75704661aa5503aa1081f492dd.exe

  • Size

    447KB

  • MD5

    2e05e04e7b625bd0362cc31cc716d0c0

  • SHA1

    dbb547b9fcec9b3edaa0b422f9f78230531be997

  • SHA256

    44dfec965c65d69e57a3a159bd5cff976006af75704661aa5503aa1081f492dd

  • SHA512

    43fa46b400a3a9932159747cefbb087d113950b1a6d24342df0122003fd877277d4e36ab7f11587341e7a7bcfeb856581d7acefa18933ebfa9bfb99132b9452c

  • SSDEEP

    12288:Tdzjq8ltY/DIFPk0eyIu0alY2HZH8XX5E1eyopq:T9O87qSPk0SRanHZg5Vw

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44dfec965c65d69e57a3a159bd5cff976006af75704661aa5503aa1081f492dd.exe
    "C:\Users\Admin\AppData\Local\Temp\44dfec965c65d69e57a3a159bd5cff976006af75704661aa5503aa1081f492dd.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:5100
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2324
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:2604
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2840
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:4920
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4596
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3404
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:3376
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4944
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:4736
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3560
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:3548
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:384
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:4972

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nszC76D.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nszC76D.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nszC76D.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nszC76D.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nszC76D.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nszC76D.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nszC76D.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nszC76D.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nszC76D.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            4fd8017f276188477faa16d3a35b2977

            SHA1

            d73b3f8c068cfb05a317bcf60589e82b2d4f1bcd

            SHA256

            4a1c0b57e6ea2676c5cfcc3307a753504ec3867a0e7a39c9288f8061de0964c7

            SHA512

            53a42efd434ec4c7aa7113cf511c5be531cdadaa011f56879a3e0eff0dc04a5c47163c1e8726264f8de27a5112d5a48b39d47241bd8c8d46081aa8727b98b3f1

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            4fd8017f276188477faa16d3a35b2977

            SHA1

            d73b3f8c068cfb05a317bcf60589e82b2d4f1bcd

            SHA256

            4a1c0b57e6ea2676c5cfcc3307a753504ec3867a0e7a39c9288f8061de0964c7

            SHA512

            53a42efd434ec4c7aa7113cf511c5be531cdadaa011f56879a3e0eff0dc04a5c47163c1e8726264f8de27a5112d5a48b39d47241bd8c8d46081aa8727b98b3f1

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            4fd8017f276188477faa16d3a35b2977

            SHA1

            d73b3f8c068cfb05a317bcf60589e82b2d4f1bcd

            SHA256

            4a1c0b57e6ea2676c5cfcc3307a753504ec3867a0e7a39c9288f8061de0964c7

            SHA512

            53a42efd434ec4c7aa7113cf511c5be531cdadaa011f56879a3e0eff0dc04a5c47163c1e8726264f8de27a5112d5a48b39d47241bd8c8d46081aa8727b98b3f1

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            4fd8017f276188477faa16d3a35b2977

            SHA1

            d73b3f8c068cfb05a317bcf60589e82b2d4f1bcd

            SHA256

            4a1c0b57e6ea2676c5cfcc3307a753504ec3867a0e7a39c9288f8061de0964c7

            SHA512

            53a42efd434ec4c7aa7113cf511c5be531cdadaa011f56879a3e0eff0dc04a5c47163c1e8726264f8de27a5112d5a48b39d47241bd8c8d46081aa8727b98b3f1

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            ddb24f10178dc66e0ec3f25bd961187c

            SHA1

            e067b344ca820a80c44a81f4c9fa758fda16f9a4

            SHA256

            386ba68a3b4e50e90db86400d0a4b237991e2a4ca09efb4016fa6beb04f8bdf4

            SHA512

            ca41704566ec49345fc8bde7bb5ad4a235064e8c0b07c2695fd543f79f540269edb300afefc8bfce942730e2d515c72d2ffe6209e71ae2af958ba7779fedbc5f

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            ddb24f10178dc66e0ec3f25bd961187c

            SHA1

            e067b344ca820a80c44a81f4c9fa758fda16f9a4

            SHA256

            386ba68a3b4e50e90db86400d0a4b237991e2a4ca09efb4016fa6beb04f8bdf4

            SHA512

            ca41704566ec49345fc8bde7bb5ad4a235064e8c0b07c2695fd543f79f540269edb300afefc8bfce942730e2d515c72d2ffe6209e71ae2af958ba7779fedbc5f

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            ddb24f10178dc66e0ec3f25bd961187c

            SHA1

            e067b344ca820a80c44a81f4c9fa758fda16f9a4

            SHA256

            386ba68a3b4e50e90db86400d0a4b237991e2a4ca09efb4016fa6beb04f8bdf4

            SHA512

            ca41704566ec49345fc8bde7bb5ad4a235064e8c0b07c2695fd543f79f540269edb300afefc8bfce942730e2d515c72d2ffe6209e71ae2af958ba7779fedbc5f

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            d8a2e0f8ec5ecde6c80a361bd984eaef

            SHA1

            652876ebd4caefd0a3c0266bbad3885587142956

            SHA256

            5ddb602910f602b720e153c7ceade8fd9b8e7569c0a7dc279f7534c77bb3d51e

            SHA512

            5e721b6714165b19276db99de73e994056462eb2ac814b293f4198dda73dfa0fab766142301448c27170f27ee1acc8948c9a1ad578dfe04d65000a96619c5d17

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            d8a2e0f8ec5ecde6c80a361bd984eaef

            SHA1

            652876ebd4caefd0a3c0266bbad3885587142956

            SHA256

            5ddb602910f602b720e153c7ceade8fd9b8e7569c0a7dc279f7534c77bb3d51e

            SHA512

            5e721b6714165b19276db99de73e994056462eb2ac814b293f4198dda73dfa0fab766142301448c27170f27ee1acc8948c9a1ad578dfe04d65000a96619c5d17

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            fba97b43a743d0513d06ea8f2d2891e8

            SHA1

            1b1cadf60ea43e658b091dfd48a1a0865c0b8ea6

            SHA256

            7f208f4792f86f912c1b0eb46bb3e087156a2a99e109480af73e6e4d4ec706d4

            SHA512

            0c15852bb1c2f14d64f1c9c8da63e028f154786ea2e571983d88e4f651ceaf17d690ffc54ccc2d89c01811bf2934cbe14eb1730e208b8abe0cf48090c50feb70

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            fba97b43a743d0513d06ea8f2d2891e8

            SHA1

            1b1cadf60ea43e658b091dfd48a1a0865c0b8ea6

            SHA256

            7f208f4792f86f912c1b0eb46bb3e087156a2a99e109480af73e6e4d4ec706d4

            SHA512

            0c15852bb1c2f14d64f1c9c8da63e028f154786ea2e571983d88e4f651ceaf17d690ffc54ccc2d89c01811bf2934cbe14eb1730e208b8abe0cf48090c50feb70

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            fba97b43a743d0513d06ea8f2d2891e8

            SHA1

            1b1cadf60ea43e658b091dfd48a1a0865c0b8ea6

            SHA256

            7f208f4792f86f912c1b0eb46bb3e087156a2a99e109480af73e6e4d4ec706d4

            SHA512

            0c15852bb1c2f14d64f1c9c8da63e028f154786ea2e571983d88e4f651ceaf17d690ffc54ccc2d89c01811bf2934cbe14eb1730e208b8abe0cf48090c50feb70

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            159KB

            MD5

            ecae65c75b918c83e158cd97ba807371

            SHA1

            805c0c65ef174c7b0a07d49611d59c5cd281cc8c

            SHA256

            d475b065f95eb8bc6c4b3b8c986f3cea1b36ad0304113b1f7417aca9d156f216

            SHA512

            b3d9d43d039fb2d655fac5401d440e44b6221b089b28b74fc578f7092805f6a38d64b9a771ec13ae26ca7e85d86a8a0f9a98de2ccce0421e5edcbe17d7fd9e49

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            159KB

            MD5

            ecae65c75b918c83e158cd97ba807371

            SHA1

            805c0c65ef174c7b0a07d49611d59c5cd281cc8c

            SHA256

            d475b065f95eb8bc6c4b3b8c986f3cea1b36ad0304113b1f7417aca9d156f216

            SHA512

            b3d9d43d039fb2d655fac5401d440e44b6221b089b28b74fc578f7092805f6a38d64b9a771ec13ae26ca7e85d86a8a0f9a98de2ccce0421e5edcbe17d7fd9e49

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            159KB

            MD5

            ecae65c75b918c83e158cd97ba807371

            SHA1

            805c0c65ef174c7b0a07d49611d59c5cd281cc8c

            SHA256

            d475b065f95eb8bc6c4b3b8c986f3cea1b36ad0304113b1f7417aca9d156f216

            SHA512

            b3d9d43d039fb2d655fac5401d440e44b6221b089b28b74fc578f7092805f6a38d64b9a771ec13ae26ca7e85d86a8a0f9a98de2ccce0421e5edcbe17d7fd9e49

          • memory/2324-135-0x0000000000000000-mapping.dmp

          • memory/2604-136-0x0000000000000000-mapping.dmp

          • memory/2840-139-0x0000000000000000-mapping.dmp

          • memory/3376-152-0x0000000000000000-mapping.dmp

          • memory/3404-146-0x0000000000000000-mapping.dmp

          • memory/3548-165-0x0000000000000000-mapping.dmp

          • memory/3560-164-0x0000000000000000-mapping.dmp

          • memory/4596-141-0x0000000000000000-mapping.dmp

          • memory/4736-158-0x0000000000000000-mapping.dmp

          • memory/4920-140-0x0000000000000000-mapping.dmp

          • memory/4944-157-0x0000000000000000-mapping.dmp