Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:59

General

  • Target

    2c3b16997a0ef28e07de396a5e77a105475a44fdf1cecf3568f9a3ee0e349249.exe

  • Size

    446KB

  • MD5

    2de038478498b86e0a6cdcf3250c2380

  • SHA1

    5e9b107463bb05215701c839390d5934f0929468

  • SHA256

    2c3b16997a0ef28e07de396a5e77a105475a44fdf1cecf3568f9a3ee0e349249

  • SHA512

    987e806ad7d5f5fd098463609746e25b8925a8db2e09a1b2bf58e9c2b51e1525f15fb0d192266bf4594c3fd674d2167e699ec238965f4bd4da7bc2ab47b8ba4a

  • SSDEEP

    12288:H0TvsWTTep3j3B9gADwLvjxguPyfW+hxInTGcez1rMy3Pvalk:H0DsWMBulrxguPmLzqGceSyH

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c3b16997a0ef28e07de396a5e77a105475a44fdf1cecf3568f9a3ee0e349249.exe
    "C:\Users\Admin\AppData\Local\Temp\2c3b16997a0ef28e07de396a5e77a105475a44fdf1cecf3568f9a3ee0e349249.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4252
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1428
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:4008
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4516
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:516
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4496
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3460
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:3264
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:972
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:908
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3848
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:2516
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:1344
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:2512

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsdC308.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nsdC308.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsdC308.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsdC308.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsdC308.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsdC308.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsdC308.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsdC308.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsdC308.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            ac197222b5d8f7760d0c951392bf7c21

            SHA1

            a62b844dfd3f4de7f56bf845a27197df858c2d7f

            SHA256

            573ce7651279acf0c148e2dd4299a49dc816e0a792d208ec644d469d240796dc

            SHA512

            814b3a3178b3dfb61e3dc1df1d03497c433a5afcc4b5b0f721a9418108a2dee0730470f529ffa58aa9ac49b323fd70260bab2c093e3bc54fa197338946c38cee

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            ac197222b5d8f7760d0c951392bf7c21

            SHA1

            a62b844dfd3f4de7f56bf845a27197df858c2d7f

            SHA256

            573ce7651279acf0c148e2dd4299a49dc816e0a792d208ec644d469d240796dc

            SHA512

            814b3a3178b3dfb61e3dc1df1d03497c433a5afcc4b5b0f721a9418108a2dee0730470f529ffa58aa9ac49b323fd70260bab2c093e3bc54fa197338946c38cee

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            ac197222b5d8f7760d0c951392bf7c21

            SHA1

            a62b844dfd3f4de7f56bf845a27197df858c2d7f

            SHA256

            573ce7651279acf0c148e2dd4299a49dc816e0a792d208ec644d469d240796dc

            SHA512

            814b3a3178b3dfb61e3dc1df1d03497c433a5afcc4b5b0f721a9418108a2dee0730470f529ffa58aa9ac49b323fd70260bab2c093e3bc54fa197338946c38cee

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            ac197222b5d8f7760d0c951392bf7c21

            SHA1

            a62b844dfd3f4de7f56bf845a27197df858c2d7f

            SHA256

            573ce7651279acf0c148e2dd4299a49dc816e0a792d208ec644d469d240796dc

            SHA512

            814b3a3178b3dfb61e3dc1df1d03497c433a5afcc4b5b0f721a9418108a2dee0730470f529ffa58aa9ac49b323fd70260bab2c093e3bc54fa197338946c38cee

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            65053a59ee61626813b1d64e3da8e095

            SHA1

            34245643ccd31ef9dbd4a36b5a65d5f2db472614

            SHA256

            e7d4929464a00bde2927fa2ab8edaa75c3f7e9cc64ee0bd6df5a36ab4eed4a0f

            SHA512

            64f9543feeae475e934cf6fc8baa1f122a632ca7c4f826ae2350028432178bd994a42c969359a5ea61dad3efe9e59b60b6027f2e48571d83b7046646aab1a051

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            65053a59ee61626813b1d64e3da8e095

            SHA1

            34245643ccd31ef9dbd4a36b5a65d5f2db472614

            SHA256

            e7d4929464a00bde2927fa2ab8edaa75c3f7e9cc64ee0bd6df5a36ab4eed4a0f

            SHA512

            64f9543feeae475e934cf6fc8baa1f122a632ca7c4f826ae2350028432178bd994a42c969359a5ea61dad3efe9e59b60b6027f2e48571d83b7046646aab1a051

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            65053a59ee61626813b1d64e3da8e095

            SHA1

            34245643ccd31ef9dbd4a36b5a65d5f2db472614

            SHA256

            e7d4929464a00bde2927fa2ab8edaa75c3f7e9cc64ee0bd6df5a36ab4eed4a0f

            SHA512

            64f9543feeae475e934cf6fc8baa1f122a632ca7c4f826ae2350028432178bd994a42c969359a5ea61dad3efe9e59b60b6027f2e48571d83b7046646aab1a051

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            c43cdcd58524a150acadf3afa4578db6

            SHA1

            771bdba5168335d19247f8c94e16ebd083a47ad7

            SHA256

            6bd351fa7958d9e8b51742b6c6cf509afb96bc6bbe1e93e1cddfe48c68ea10f7

            SHA512

            22bc3fd9fb0964670ba9a24c5a227a0a3e2a4697fb29886cc34b59aa48807daf9fe820863419a9048439aa1b297f908b97446c0a4089a907ec426e3dff735e04

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            c43cdcd58524a150acadf3afa4578db6

            SHA1

            771bdba5168335d19247f8c94e16ebd083a47ad7

            SHA256

            6bd351fa7958d9e8b51742b6c6cf509afb96bc6bbe1e93e1cddfe48c68ea10f7

            SHA512

            22bc3fd9fb0964670ba9a24c5a227a0a3e2a4697fb29886cc34b59aa48807daf9fe820863419a9048439aa1b297f908b97446c0a4089a907ec426e3dff735e04

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            5751bbb5db71a8224b3d40465d1e5fae

            SHA1

            8ce1e2cc4e05bca50eac06e2de3fc5a0e7ee5e24

            SHA256

            425efc690a3a213b295d1e768e93422881c240967f35ae1c0c5cb288b5ebceb7

            SHA512

            ae986fdf6579a751a125f391107d6d699c7afcaf02e3e6fc9c20b458afc413a3b04c7c917b27097f8cfe971819407bea65840ddd37119a3b07b85bcac772fbbb

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            5751bbb5db71a8224b3d40465d1e5fae

            SHA1

            8ce1e2cc4e05bca50eac06e2de3fc5a0e7ee5e24

            SHA256

            425efc690a3a213b295d1e768e93422881c240967f35ae1c0c5cb288b5ebceb7

            SHA512

            ae986fdf6579a751a125f391107d6d699c7afcaf02e3e6fc9c20b458afc413a3b04c7c917b27097f8cfe971819407bea65840ddd37119a3b07b85bcac772fbbb

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            5751bbb5db71a8224b3d40465d1e5fae

            SHA1

            8ce1e2cc4e05bca50eac06e2de3fc5a0e7ee5e24

            SHA256

            425efc690a3a213b295d1e768e93422881c240967f35ae1c0c5cb288b5ebceb7

            SHA512

            ae986fdf6579a751a125f391107d6d699c7afcaf02e3e6fc9c20b458afc413a3b04c7c917b27097f8cfe971819407bea65840ddd37119a3b07b85bcac772fbbb

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            aff086596a2e2cd0361a4fd1c11d1c2d

            SHA1

            117881d973bc9e34a1f10d31272af1db3a3da7c9

            SHA256

            46e7b64e11334f4cd8ecdd9b5cb47ea4d6e9bca46eec0e03cfe10b02775d9940

            SHA512

            cc381196600ba3bcc1c7eeda90d22dcf8730032c73a6934c475b97e35677e84d82b17e843e7536bd84816455681cbc8054f5c11ccbbfce8e85378bfe7b07298e

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            aff086596a2e2cd0361a4fd1c11d1c2d

            SHA1

            117881d973bc9e34a1f10d31272af1db3a3da7c9

            SHA256

            46e7b64e11334f4cd8ecdd9b5cb47ea4d6e9bca46eec0e03cfe10b02775d9940

            SHA512

            cc381196600ba3bcc1c7eeda90d22dcf8730032c73a6934c475b97e35677e84d82b17e843e7536bd84816455681cbc8054f5c11ccbbfce8e85378bfe7b07298e

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            aff086596a2e2cd0361a4fd1c11d1c2d

            SHA1

            117881d973bc9e34a1f10d31272af1db3a3da7c9

            SHA256

            46e7b64e11334f4cd8ecdd9b5cb47ea4d6e9bca46eec0e03cfe10b02775d9940

            SHA512

            cc381196600ba3bcc1c7eeda90d22dcf8730032c73a6934c475b97e35677e84d82b17e843e7536bd84816455681cbc8054f5c11ccbbfce8e85378bfe7b07298e

          • memory/516-140-0x0000000000000000-mapping.dmp

          • memory/908-158-0x0000000000000000-mapping.dmp

          • memory/972-157-0x0000000000000000-mapping.dmp

          • memory/1428-135-0x0000000000000000-mapping.dmp

          • memory/2516-165-0x0000000000000000-mapping.dmp

          • memory/3264-152-0x0000000000000000-mapping.dmp

          • memory/3460-146-0x0000000000000000-mapping.dmp

          • memory/3848-164-0x0000000000000000-mapping.dmp

          • memory/4008-136-0x0000000000000000-mapping.dmp

          • memory/4496-141-0x0000000000000000-mapping.dmp

          • memory/4516-139-0x0000000000000000-mapping.dmp