Analysis

  • max time kernel
    64s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:16

General

  • Target

    a6a181b7b11e8294b1c18f0796783f3bbc345eb35826f9789af7bcae3e228fc1.exe

  • Size

    599KB

  • MD5

    f1a2a81bfd12b281217e36ae40cf3576

  • SHA1

    794048a8e65a31f64391a9ffa1430b29977d14b9

  • SHA256

    a6a181b7b11e8294b1c18f0796783f3bbc345eb35826f9789af7bcae3e228fc1

  • SHA512

    14a28ac2b4736264def23772d273d622ae2a642f8e6eaddd1dbce094da7397e333d6edefadde5e5d9632067be8e42b7cbfbe2e3db01f3ddf1c1887991c964e6f

  • SSDEEP

    12288:UIny5DYTYIKukfUQEnK1q57jSqDmE7haFib9DyN:SUTYVukfUQEK47jS2m8haUb9e

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6a181b7b11e8294b1c18f0796783f3bbc345eb35826f9789af7bcae3e228fc1.exe
    "C:\Users\Admin\AppData\Local\Temp\a6a181b7b11e8294b1c18f0796783f3bbc345eb35826f9789af7bcae3e228fc1.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:592
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:328
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1504
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:1060
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1128
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:964
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:1960
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1412
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:1692
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1600
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:2008
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:272
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:1176

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            5e8d86fca5533cb74c42961cdad6528c

            SHA1

            aa39e56f8eb11bdef62bb68957186ad327d67d2c

            SHA256

            2db094e509e6bcb41ed8a2bffc826f181a45075672e7848ccc2cb35702980afe

            SHA512

            2d2c04d0e05e317d4a4e3bcf71d623840ad6d4bcab124c886e52ec74bbaa2381660b4eaa3975ed39fbc38a4656592e356da83b7b73a61a9044c4167ee2c5dd2f

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            027044730c091e06c7e3758a77a4c43c

            SHA1

            e3651e2c4241dea739339235e42f71954dd81cd1

            SHA256

            75a222e524612e668e94fca1e1ac79acd715ff9126813cc97575541b4f885987

            SHA512

            3f905c389da939101492822c70c33ca985efe72661e667974951030191a73404da7541b67e27abaad9888f68551b606c659af5c5577576050ca69256a0c76151

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            fd7b555a7fa88de718d2b8d911564c67

            SHA1

            0d9a47ffb640306d857f7b335f751c82f746c500

            SHA256

            522854e23c57a5c129bb99c8045a8812570ea34f0aceafe86307511b0af4300f

            SHA512

            c23ba0f5e083c8a6ab32511845078ec4be88c317d9eef1b613dd6674d89b6affb108e4a20b27f3dcd2dfc406476acce03643c8898de9f2dca01f72b6715c8024

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            629d8b54639dd0717c82aae65ee300a5

            SHA1

            9f96e9ba988d3400d0e1d567a2448d3f460eac4e

            SHA256

            919590da6b097fe36105e02d271e0281f04b2094ca9002e4e9d499bbb2d15944

            SHA512

            9558748c470a7836c69ace0f8c93d7b8d9f60f5e388bc74aa550be385712f7a1e543a35e59139d1ea046b31bfee66b5e48e25c517b85e718f5581de46aeac8b8

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            629d8b54639dd0717c82aae65ee300a5

            SHA1

            9f96e9ba988d3400d0e1d567a2448d3f460eac4e

            SHA256

            919590da6b097fe36105e02d271e0281f04b2094ca9002e4e9d499bbb2d15944

            SHA512

            9558748c470a7836c69ace0f8c93d7b8d9f60f5e388bc74aa550be385712f7a1e543a35e59139d1ea046b31bfee66b5e48e25c517b85e718f5581de46aeac8b8

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            159KB

            MD5

            f74103fd4967df12f004c58a2c538128

            SHA1

            a3bc5b8a3017db6b3c60cf060d79988cbd85d97e

            SHA256

            2dd235bf767d5df1379ad3a10beb8bd46973221da6c4b88caa3ca5ae5f3f6eb8

            SHA512

            cb928257b5e53b498ddbec9783ddd06a69a6c4f6e0c200c7951c6e5b82e3fccd8255cd52e13d3cd2f890538a6afe2a82d2af55081644531a15780eb76e45c946

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            159KB

            MD5

            f74103fd4967df12f004c58a2c538128

            SHA1

            a3bc5b8a3017db6b3c60cf060d79988cbd85d97e

            SHA256

            2dd235bf767d5df1379ad3a10beb8bd46973221da6c4b88caa3ca5ae5f3f6eb8

            SHA512

            cb928257b5e53b498ddbec9783ddd06a69a6c4f6e0c200c7951c6e5b82e3fccd8255cd52e13d3cd2f890538a6afe2a82d2af55081644531a15780eb76e45c946

          • \Users\Admin\AppData\Local\Temp\nsj7C83.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • \Users\Admin\AppData\Local\Temp\nsj7C83.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsj7C83.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsj7C83.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsj7C83.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            5e8d86fca5533cb74c42961cdad6528c

            SHA1

            aa39e56f8eb11bdef62bb68957186ad327d67d2c

            SHA256

            2db094e509e6bcb41ed8a2bffc826f181a45075672e7848ccc2cb35702980afe

            SHA512

            2d2c04d0e05e317d4a4e3bcf71d623840ad6d4bcab124c886e52ec74bbaa2381660b4eaa3975ed39fbc38a4656592e356da83b7b73a61a9044c4167ee2c5dd2f

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            5e8d86fca5533cb74c42961cdad6528c

            SHA1

            aa39e56f8eb11bdef62bb68957186ad327d67d2c

            SHA256

            2db094e509e6bcb41ed8a2bffc826f181a45075672e7848ccc2cb35702980afe

            SHA512

            2d2c04d0e05e317d4a4e3bcf71d623840ad6d4bcab124c886e52ec74bbaa2381660b4eaa3975ed39fbc38a4656592e356da83b7b73a61a9044c4167ee2c5dd2f

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            5e8d86fca5533cb74c42961cdad6528c

            SHA1

            aa39e56f8eb11bdef62bb68957186ad327d67d2c

            SHA256

            2db094e509e6bcb41ed8a2bffc826f181a45075672e7848ccc2cb35702980afe

            SHA512

            2d2c04d0e05e317d4a4e3bcf71d623840ad6d4bcab124c886e52ec74bbaa2381660b4eaa3975ed39fbc38a4656592e356da83b7b73a61a9044c4167ee2c5dd2f

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            027044730c091e06c7e3758a77a4c43c

            SHA1

            e3651e2c4241dea739339235e42f71954dd81cd1

            SHA256

            75a222e524612e668e94fca1e1ac79acd715ff9126813cc97575541b4f885987

            SHA512

            3f905c389da939101492822c70c33ca985efe72661e667974951030191a73404da7541b67e27abaad9888f68551b606c659af5c5577576050ca69256a0c76151

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            027044730c091e06c7e3758a77a4c43c

            SHA1

            e3651e2c4241dea739339235e42f71954dd81cd1

            SHA256

            75a222e524612e668e94fca1e1ac79acd715ff9126813cc97575541b4f885987

            SHA512

            3f905c389da939101492822c70c33ca985efe72661e667974951030191a73404da7541b67e27abaad9888f68551b606c659af5c5577576050ca69256a0c76151

          • \Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            fd7b555a7fa88de718d2b8d911564c67

            SHA1

            0d9a47ffb640306d857f7b335f751c82f746c500

            SHA256

            522854e23c57a5c129bb99c8045a8812570ea34f0aceafe86307511b0af4300f

            SHA512

            c23ba0f5e083c8a6ab32511845078ec4be88c317d9eef1b613dd6674d89b6affb108e4a20b27f3dcd2dfc406476acce03643c8898de9f2dca01f72b6715c8024

          • \Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            629d8b54639dd0717c82aae65ee300a5

            SHA1

            9f96e9ba988d3400d0e1d567a2448d3f460eac4e

            SHA256

            919590da6b097fe36105e02d271e0281f04b2094ca9002e4e9d499bbb2d15944

            SHA512

            9558748c470a7836c69ace0f8c93d7b8d9f60f5e388bc74aa550be385712f7a1e543a35e59139d1ea046b31bfee66b5e48e25c517b85e718f5581de46aeac8b8

          • \Windows\SysWOW64\netupdsrv.exe

            Filesize

            159KB

            MD5

            f74103fd4967df12f004c58a2c538128

            SHA1

            a3bc5b8a3017db6b3c60cf060d79988cbd85d97e

            SHA256

            2dd235bf767d5df1379ad3a10beb8bd46973221da6c4b88caa3ca5ae5f3f6eb8

            SHA512

            cb928257b5e53b498ddbec9783ddd06a69a6c4f6e0c200c7951c6e5b82e3fccd8255cd52e13d3cd2f890538a6afe2a82d2af55081644531a15780eb76e45c946

          • memory/328-58-0x0000000000000000-mapping.dmp

          • memory/592-57-0x0000000000000000-mapping.dmp

          • memory/964-71-0x0000000000000000-mapping.dmp

          • memory/1060-62-0x0000000000000000-mapping.dmp

          • memory/1128-64-0x0000000000000000-mapping.dmp

          • memory/1412-81-0x0000000000000000-mapping.dmp

          • memory/1504-61-0x0000000000000000-mapping.dmp

          • memory/1600-87-0x0000000000000000-mapping.dmp

          • memory/1692-82-0x0000000000000000-mapping.dmp

          • memory/1960-77-0x0000000000000000-mapping.dmp

          • memory/1984-54-0x0000000075761000-0x0000000075763000-memory.dmp

            Filesize

            8KB

          • memory/1984-69-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1984-59-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1984-91-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/2008-88-0x0000000000000000-mapping.dmp