Analysis

  • max time kernel
    149s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:00

General

  • Target

    09536cb73bbc1c6ce834e77519024d5705ac22ddb858033d32384a324d3a2e2d.exe

  • Size

    446KB

  • MD5

    4b7affd48cd63f13dbbadcfa2afe42fa

  • SHA1

    b8b0fd7b044071ff6d9a430834cbff4082477fb8

  • SHA256

    09536cb73bbc1c6ce834e77519024d5705ac22ddb858033d32384a324d3a2e2d

  • SHA512

    948b2471303fa245cb52d2ae884d6c08356b7e0d2b441c88a55d714c1e69af33e821642eb580c829a08c506dc6c1dab3815e6cd3678732bff1bcc2c3b7c954db

  • SSDEEP

    12288:Xer3G9XPPkn5oidPK4uhpQluN7K85i+5lJEv6tdaSX:Xty5TdP1uhpQlEIU1/X

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09536cb73bbc1c6ce834e77519024d5705ac22ddb858033d32384a324d3a2e2d.exe
    "C:\Users\Admin\AppData\Local\Temp\09536cb73bbc1c6ce834e77519024d5705ac22ddb858033d32384a324d3a2e2d.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4392
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4072
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:1976
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4544
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:4980
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4796
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2388
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:1468
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:3516
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2244
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:4412
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:5072
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:680

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsv1639.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nsv1639.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsv1639.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsv1639.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsv1639.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsv1639.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsv1639.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsv1639.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsv1639.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            765b6abf163e34e0b2b784f2d6f767d4

            SHA1

            887c86e92378eaef0a4b94e2160c8bbb2bae2dd2

            SHA256

            9bcec67a60a56aa9a6bbf111be4bf98aa11484fe367be2b6529d328bdfe5c3e6

            SHA512

            5f8c1cfe938e2054af609210492320a9a5b78e347e633fffd9e3a5298d3151bf5e7ee013c34cb6441bec40374ec314c10812a767cf69f0e23910b04d1e4f8b7c

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            765b6abf163e34e0b2b784f2d6f767d4

            SHA1

            887c86e92378eaef0a4b94e2160c8bbb2bae2dd2

            SHA256

            9bcec67a60a56aa9a6bbf111be4bf98aa11484fe367be2b6529d328bdfe5c3e6

            SHA512

            5f8c1cfe938e2054af609210492320a9a5b78e347e633fffd9e3a5298d3151bf5e7ee013c34cb6441bec40374ec314c10812a767cf69f0e23910b04d1e4f8b7c

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            765b6abf163e34e0b2b784f2d6f767d4

            SHA1

            887c86e92378eaef0a4b94e2160c8bbb2bae2dd2

            SHA256

            9bcec67a60a56aa9a6bbf111be4bf98aa11484fe367be2b6529d328bdfe5c3e6

            SHA512

            5f8c1cfe938e2054af609210492320a9a5b78e347e633fffd9e3a5298d3151bf5e7ee013c34cb6441bec40374ec314c10812a767cf69f0e23910b04d1e4f8b7c

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            765b6abf163e34e0b2b784f2d6f767d4

            SHA1

            887c86e92378eaef0a4b94e2160c8bbb2bae2dd2

            SHA256

            9bcec67a60a56aa9a6bbf111be4bf98aa11484fe367be2b6529d328bdfe5c3e6

            SHA512

            5f8c1cfe938e2054af609210492320a9a5b78e347e633fffd9e3a5298d3151bf5e7ee013c34cb6441bec40374ec314c10812a767cf69f0e23910b04d1e4f8b7c

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            f216c3a564610b2ca682ddc8b786fd96

            SHA1

            8ccff957af2e8870edbdff759a61e6085f2007cb

            SHA256

            fec9b495ea91b72cbeb28d8e0e8a31552b953822909bf7d4835829dd7f7f908d

            SHA512

            1905eb947e77dfa51a867c8a4a199f6487b57bdf97e06a21e434ec0b013bdf71fc0a1a6bee05cf33527029b98631d246ef0a68319051e60e8f972ec462a8079f

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            f216c3a564610b2ca682ddc8b786fd96

            SHA1

            8ccff957af2e8870edbdff759a61e6085f2007cb

            SHA256

            fec9b495ea91b72cbeb28d8e0e8a31552b953822909bf7d4835829dd7f7f908d

            SHA512

            1905eb947e77dfa51a867c8a4a199f6487b57bdf97e06a21e434ec0b013bdf71fc0a1a6bee05cf33527029b98631d246ef0a68319051e60e8f972ec462a8079f

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            f216c3a564610b2ca682ddc8b786fd96

            SHA1

            8ccff957af2e8870edbdff759a61e6085f2007cb

            SHA256

            fec9b495ea91b72cbeb28d8e0e8a31552b953822909bf7d4835829dd7f7f908d

            SHA512

            1905eb947e77dfa51a867c8a4a199f6487b57bdf97e06a21e434ec0b013bdf71fc0a1a6bee05cf33527029b98631d246ef0a68319051e60e8f972ec462a8079f

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            6f6c9b0181384f8cd543e22dfd58054a

            SHA1

            ead2ef91b50535a6c97d1fd317b2c33a16c0843d

            SHA256

            e19ee00f225c345176082fc352e1e2d75ce30023402f6ce606103a48b23de789

            SHA512

            9bbd00d1d4298cd9b945ad42e795c0d1172039257ccb16b0245afef9e36894735eea402879bd7bcca242a97aba7a4817b0e893c9b2d64ecc3550d5f3a301a82c

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            6f6c9b0181384f8cd543e22dfd58054a

            SHA1

            ead2ef91b50535a6c97d1fd317b2c33a16c0843d

            SHA256

            e19ee00f225c345176082fc352e1e2d75ce30023402f6ce606103a48b23de789

            SHA512

            9bbd00d1d4298cd9b945ad42e795c0d1172039257ccb16b0245afef9e36894735eea402879bd7bcca242a97aba7a4817b0e893c9b2d64ecc3550d5f3a301a82c

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            2a9b1c6905d43460e32cc720a4f58491

            SHA1

            68f726934b469d500d0aa1777679cdbe4f466f0e

            SHA256

            8c6a9c8b4a6b50e6f37db69f927f52aa3347aa4480adda0d852cb9c46f72531f

            SHA512

            eec05fa136e05e24a6bb8a0b2dee186520a6d189b97e2acf104dfb56769609f296b5f7c1877e78437191231500957d2855416ec262a2b748403d2cfd7438aad9

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            2a9b1c6905d43460e32cc720a4f58491

            SHA1

            68f726934b469d500d0aa1777679cdbe4f466f0e

            SHA256

            8c6a9c8b4a6b50e6f37db69f927f52aa3347aa4480adda0d852cb9c46f72531f

            SHA512

            eec05fa136e05e24a6bb8a0b2dee186520a6d189b97e2acf104dfb56769609f296b5f7c1877e78437191231500957d2855416ec262a2b748403d2cfd7438aad9

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            2a9b1c6905d43460e32cc720a4f58491

            SHA1

            68f726934b469d500d0aa1777679cdbe4f466f0e

            SHA256

            8c6a9c8b4a6b50e6f37db69f927f52aa3347aa4480adda0d852cb9c46f72531f

            SHA512

            eec05fa136e05e24a6bb8a0b2dee186520a6d189b97e2acf104dfb56769609f296b5f7c1877e78437191231500957d2855416ec262a2b748403d2cfd7438aad9

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            65e4c38c2e67c64d3c743b5675dc1fe4

            SHA1

            e37b05f22e01d8951e2a3fb9831698d7646abbe3

            SHA256

            1b0056dd54ad377a23dc8a3f6e7991c3350950cbdf7b16b1729b6a13fb9934d2

            SHA512

            a357d184399f9094bb76a2172b9d612e5c9db47c638c84900d657057cf86c74d34ac7256f48bb5f86fb5f4eea10c6e533cf0944488abae6ee7a38b1e60a0b639

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            65e4c38c2e67c64d3c743b5675dc1fe4

            SHA1

            e37b05f22e01d8951e2a3fb9831698d7646abbe3

            SHA256

            1b0056dd54ad377a23dc8a3f6e7991c3350950cbdf7b16b1729b6a13fb9934d2

            SHA512

            a357d184399f9094bb76a2172b9d612e5c9db47c638c84900d657057cf86c74d34ac7256f48bb5f86fb5f4eea10c6e533cf0944488abae6ee7a38b1e60a0b639

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            65e4c38c2e67c64d3c743b5675dc1fe4

            SHA1

            e37b05f22e01d8951e2a3fb9831698d7646abbe3

            SHA256

            1b0056dd54ad377a23dc8a3f6e7991c3350950cbdf7b16b1729b6a13fb9934d2

            SHA512

            a357d184399f9094bb76a2172b9d612e5c9db47c638c84900d657057cf86c74d34ac7256f48bb5f86fb5f4eea10c6e533cf0944488abae6ee7a38b1e60a0b639

          • memory/1468-152-0x0000000000000000-mapping.dmp

          • memory/1976-136-0x0000000000000000-mapping.dmp

          • memory/2244-164-0x0000000000000000-mapping.dmp

          • memory/2388-146-0x0000000000000000-mapping.dmp

          • memory/2636-157-0x0000000000000000-mapping.dmp

          • memory/3516-158-0x0000000000000000-mapping.dmp

          • memory/4072-135-0x0000000000000000-mapping.dmp

          • memory/4412-165-0x0000000000000000-mapping.dmp

          • memory/4544-139-0x0000000000000000-mapping.dmp

          • memory/4796-141-0x0000000000000000-mapping.dmp

          • memory/4980-140-0x0000000000000000-mapping.dmp