Analysis

  • max time kernel
    91s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:16

General

  • Target

    a70e867a4687b024635da6c9987f142f70557ecd5a8cab8706dd634495dde5bc.exe

  • Size

    602KB

  • MD5

    34698b191d970e405bc256ddecb6e20d

  • SHA1

    dd0f2a39dbacd630269f2bf220618d435250d8b9

  • SHA256

    a70e867a4687b024635da6c9987f142f70557ecd5a8cab8706dd634495dde5bc

  • SHA512

    10b8aebea99faac8e435467c2c213f6a8ca2557823296010c56e930c458dd3f3b803dababb9cbfd6eb719676d33af76942bfae95b1b04f3c90bbfab4a9ad0935

  • SSDEEP

    12288:OIny5DYTkIkKLTjV7UZ7HRe7u9qDdQw+YVUdA79oafy+2MocYF:QUTknMFCYWEdNjVVVqF

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a70e867a4687b024635da6c9987f142f70557ecd5a8cab8706dd634495dde5bc.exe
    "C:\Users\Admin\AppData\Local\Temp\a70e867a4687b024635da6c9987f142f70557ecd5a8cab8706dd634495dde5bc.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3340
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4860
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:748
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1332
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:1140
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2816
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:896
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:4308
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3952
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:2380
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3420
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:3344
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:2364
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:2424

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsq9726.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nsq9726.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsq9726.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsq9726.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsq9726.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsq9726.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsq9726.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsq9726.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsq9726.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            be329287a4fb18d73c4b4940ed011075

            SHA1

            ba5d9851f75c18c50be4782562167251c8c09b32

            SHA256

            742f42c49689b7ee2bae146a070b5eda6f0041f2c4a2981241702f6ff4046031

            SHA512

            4fa1c391b2d4a853d740ac1a02cf816af2427c3840e90b6fb7f58eef8e4a6124e452fa5ad31eff38ee7dea333b2167a9862021f8cd87d6096f730c90b3211c7c

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            be329287a4fb18d73c4b4940ed011075

            SHA1

            ba5d9851f75c18c50be4782562167251c8c09b32

            SHA256

            742f42c49689b7ee2bae146a070b5eda6f0041f2c4a2981241702f6ff4046031

            SHA512

            4fa1c391b2d4a853d740ac1a02cf816af2427c3840e90b6fb7f58eef8e4a6124e452fa5ad31eff38ee7dea333b2167a9862021f8cd87d6096f730c90b3211c7c

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            be329287a4fb18d73c4b4940ed011075

            SHA1

            ba5d9851f75c18c50be4782562167251c8c09b32

            SHA256

            742f42c49689b7ee2bae146a070b5eda6f0041f2c4a2981241702f6ff4046031

            SHA512

            4fa1c391b2d4a853d740ac1a02cf816af2427c3840e90b6fb7f58eef8e4a6124e452fa5ad31eff38ee7dea333b2167a9862021f8cd87d6096f730c90b3211c7c

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            be329287a4fb18d73c4b4940ed011075

            SHA1

            ba5d9851f75c18c50be4782562167251c8c09b32

            SHA256

            742f42c49689b7ee2bae146a070b5eda6f0041f2c4a2981241702f6ff4046031

            SHA512

            4fa1c391b2d4a853d740ac1a02cf816af2427c3840e90b6fb7f58eef8e4a6124e452fa5ad31eff38ee7dea333b2167a9862021f8cd87d6096f730c90b3211c7c

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            d5784b63d3cdf5051a39af8de1870365

            SHA1

            1da9c7162c0e5e96b069b5ea62c05cf8c8016c64

            SHA256

            d5c57a15ce0bcbc5daf81dc0adc990eb06a66057d4a9fa0df23c75465c5d122d

            SHA512

            91ce6c28c4db31e2a74767f2b844a15f5ce7a6aa434992a67c821b71288bca2e41e00a92591b273a98be1306d0f71e171080a08be9ab2688ec2bf92fa4bfd5d9

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            d5784b63d3cdf5051a39af8de1870365

            SHA1

            1da9c7162c0e5e96b069b5ea62c05cf8c8016c64

            SHA256

            d5c57a15ce0bcbc5daf81dc0adc990eb06a66057d4a9fa0df23c75465c5d122d

            SHA512

            91ce6c28c4db31e2a74767f2b844a15f5ce7a6aa434992a67c821b71288bca2e41e00a92591b273a98be1306d0f71e171080a08be9ab2688ec2bf92fa4bfd5d9

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            d5784b63d3cdf5051a39af8de1870365

            SHA1

            1da9c7162c0e5e96b069b5ea62c05cf8c8016c64

            SHA256

            d5c57a15ce0bcbc5daf81dc0adc990eb06a66057d4a9fa0df23c75465c5d122d

            SHA512

            91ce6c28c4db31e2a74767f2b844a15f5ce7a6aa434992a67c821b71288bca2e41e00a92591b273a98be1306d0f71e171080a08be9ab2688ec2bf92fa4bfd5d9

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            6b48fcb21534802b3f0d5646c4ddef30

            SHA1

            81b490cbfbbb24af128c7bb57668a61fe542aa95

            SHA256

            4c709a50fa6eab061bf992bbfacacc396103f2d4d3c0b9615deb1c8972e2cc95

            SHA512

            0292df748ab53e0463657501d1db17e1a7aff33873b9d0f6e26edfb390ca23470c07a96dd764ef55bc950a309a5f92f7ac3c4dfaf073130b5373fb14521a00cd

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            6b48fcb21534802b3f0d5646c4ddef30

            SHA1

            81b490cbfbbb24af128c7bb57668a61fe542aa95

            SHA256

            4c709a50fa6eab061bf992bbfacacc396103f2d4d3c0b9615deb1c8972e2cc95

            SHA512

            0292df748ab53e0463657501d1db17e1a7aff33873b9d0f6e26edfb390ca23470c07a96dd764ef55bc950a309a5f92f7ac3c4dfaf073130b5373fb14521a00cd

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            29a1c601cd059c624876429203038c46

            SHA1

            7a811155fa9ea65f5c4e8a85f9511127b78524a9

            SHA256

            6619fc2e92c122dd5e0ab8c4ebd05bc3a68c22135a66fb2f14230eb7e3136fdb

            SHA512

            c0e81c51a52bd4cfd9f512b35ca1efe846c222e60b69c368aede55ad3e6d6a575aa79486d6fde9ca616ace85a8ed5704b284c30a70beb2bd9ad3606bb485bf30

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            29a1c601cd059c624876429203038c46

            SHA1

            7a811155fa9ea65f5c4e8a85f9511127b78524a9

            SHA256

            6619fc2e92c122dd5e0ab8c4ebd05bc3a68c22135a66fb2f14230eb7e3136fdb

            SHA512

            c0e81c51a52bd4cfd9f512b35ca1efe846c222e60b69c368aede55ad3e6d6a575aa79486d6fde9ca616ace85a8ed5704b284c30a70beb2bd9ad3606bb485bf30

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            29a1c601cd059c624876429203038c46

            SHA1

            7a811155fa9ea65f5c4e8a85f9511127b78524a9

            SHA256

            6619fc2e92c122dd5e0ab8c4ebd05bc3a68c22135a66fb2f14230eb7e3136fdb

            SHA512

            c0e81c51a52bd4cfd9f512b35ca1efe846c222e60b69c368aede55ad3e6d6a575aa79486d6fde9ca616ace85a8ed5704b284c30a70beb2bd9ad3606bb485bf30

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            0b41fdb642346c2a1edb969118b00c37

            SHA1

            8b88c2628f117724dec2dd9239187214eea7f6c2

            SHA256

            b18e83a48b2f678aee79ba809fed892c09735345ff74154f26446dce77548d41

            SHA512

            517c739b28143b70e8557a8c9186178193234440048df5c5c980b9c7c35f2b55dd7b3a6c260b88a06af571690f916b1da5baca0270ee663a42e6541c0b9e4455

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            0b41fdb642346c2a1edb969118b00c37

            SHA1

            8b88c2628f117724dec2dd9239187214eea7f6c2

            SHA256

            b18e83a48b2f678aee79ba809fed892c09735345ff74154f26446dce77548d41

            SHA512

            517c739b28143b70e8557a8c9186178193234440048df5c5c980b9c7c35f2b55dd7b3a6c260b88a06af571690f916b1da5baca0270ee663a42e6541c0b9e4455

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            0b41fdb642346c2a1edb969118b00c37

            SHA1

            8b88c2628f117724dec2dd9239187214eea7f6c2

            SHA256

            b18e83a48b2f678aee79ba809fed892c09735345ff74154f26446dce77548d41

            SHA512

            517c739b28143b70e8557a8c9186178193234440048df5c5c980b9c7c35f2b55dd7b3a6c260b88a06af571690f916b1da5baca0270ee663a42e6541c0b9e4455

          • memory/748-137-0x0000000000000000-mapping.dmp

          • memory/896-147-0x0000000000000000-mapping.dmp

          • memory/1140-141-0x0000000000000000-mapping.dmp

          • memory/1332-140-0x0000000000000000-mapping.dmp

          • memory/2380-159-0x0000000000000000-mapping.dmp

          • memory/2816-142-0x0000000000000000-mapping.dmp

          • memory/3340-132-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/3340-168-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/3344-166-0x0000000000000000-mapping.dmp

          • memory/3420-165-0x0000000000000000-mapping.dmp

          • memory/3952-158-0x0000000000000000-mapping.dmp

          • memory/4308-153-0x0000000000000000-mapping.dmp

          • memory/4860-136-0x0000000000000000-mapping.dmp