Analysis

  • max time kernel
    163s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:19

General

  • Target

    9188e4d7bc9ad9a14b28424e113ada03dfbfecc6cbaeb98c9fb9cc2ed56142fa.exe

  • Size

    602KB

  • MD5

    2ebebfd0e9ac8d85c181734a86d2d0a8

  • SHA1

    9814fdd2c7bd41809d94046fffb2c39e48223e8f

  • SHA256

    9188e4d7bc9ad9a14b28424e113ada03dfbfecc6cbaeb98c9fb9cc2ed56142fa

  • SHA512

    6360b2aa2e13e79e5ad890845e4cf51e2b5d18ee7e095e83a7a8e22a3aa3528274cb3af967023172e109c9ff6295c7160b9d751f6cbcee41ebf15ae795c02afd

  • SSDEEP

    12288:EIny5DYTkI6A22d6LhnuRzt8bx4TlAEbZuDvjIAUeOp2e:iUTkFG4+zSfEgDvkAvOse

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9188e4d7bc9ad9a14b28424e113ada03dfbfecc6cbaeb98c9fb9cc2ed56142fa.exe
    "C:\Users\Admin\AppData\Local\Temp\9188e4d7bc9ad9a14b28424e113ada03dfbfecc6cbaeb98c9fb9cc2ed56142fa.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3156
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:1248
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4944
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:116
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4132
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4056
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:3284
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3512
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:4240
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1252
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:1884
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:2944
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:2676

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsq3BE2.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nsq3BE2.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsq3BE2.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsq3BE2.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsq3BE2.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsq3BE2.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsq3BE2.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsq3BE2.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsq3BE2.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            4c837241aef72f1108ed6b32b8e1f1dc

            SHA1

            beefbd6a3c840a4beb1983b17de36b17a6f62775

            SHA256

            22331ea521b737f5ed7fcdfc191437a48c34e776843b205c47648868e2539012

            SHA512

            2b205aba0f7afa84f01fe19f3f2b7da10194e238bab7fa7d293f4db144679710e5be87c179a8a9f65f347fd9d8bc9e7c0b99f3c1bbe105e7cc48144e790245a3

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            4c837241aef72f1108ed6b32b8e1f1dc

            SHA1

            beefbd6a3c840a4beb1983b17de36b17a6f62775

            SHA256

            22331ea521b737f5ed7fcdfc191437a48c34e776843b205c47648868e2539012

            SHA512

            2b205aba0f7afa84f01fe19f3f2b7da10194e238bab7fa7d293f4db144679710e5be87c179a8a9f65f347fd9d8bc9e7c0b99f3c1bbe105e7cc48144e790245a3

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            4c837241aef72f1108ed6b32b8e1f1dc

            SHA1

            beefbd6a3c840a4beb1983b17de36b17a6f62775

            SHA256

            22331ea521b737f5ed7fcdfc191437a48c34e776843b205c47648868e2539012

            SHA512

            2b205aba0f7afa84f01fe19f3f2b7da10194e238bab7fa7d293f4db144679710e5be87c179a8a9f65f347fd9d8bc9e7c0b99f3c1bbe105e7cc48144e790245a3

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            4c837241aef72f1108ed6b32b8e1f1dc

            SHA1

            beefbd6a3c840a4beb1983b17de36b17a6f62775

            SHA256

            22331ea521b737f5ed7fcdfc191437a48c34e776843b205c47648868e2539012

            SHA512

            2b205aba0f7afa84f01fe19f3f2b7da10194e238bab7fa7d293f4db144679710e5be87c179a8a9f65f347fd9d8bc9e7c0b99f3c1bbe105e7cc48144e790245a3

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            6ab4a1a2389ac5b42b90455359595521

            SHA1

            f323b1a1ed175130d179bda37ef716e365abc4be

            SHA256

            76e4d230ca9810924ed7b361ae6d2f35e16faa2f6cb8304d765d8e0659884a7c

            SHA512

            eee7c0191178bf49f16dd98f90e83d3ed450b2fc6dc8e241892cb5b067e01deeebd09bb2080ef37b7e6b0e9f008be150bfb0dc495391cd6f79d81e112d6a491a

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            6ab4a1a2389ac5b42b90455359595521

            SHA1

            f323b1a1ed175130d179bda37ef716e365abc4be

            SHA256

            76e4d230ca9810924ed7b361ae6d2f35e16faa2f6cb8304d765d8e0659884a7c

            SHA512

            eee7c0191178bf49f16dd98f90e83d3ed450b2fc6dc8e241892cb5b067e01deeebd09bb2080ef37b7e6b0e9f008be150bfb0dc495391cd6f79d81e112d6a491a

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            6ab4a1a2389ac5b42b90455359595521

            SHA1

            f323b1a1ed175130d179bda37ef716e365abc4be

            SHA256

            76e4d230ca9810924ed7b361ae6d2f35e16faa2f6cb8304d765d8e0659884a7c

            SHA512

            eee7c0191178bf49f16dd98f90e83d3ed450b2fc6dc8e241892cb5b067e01deeebd09bb2080ef37b7e6b0e9f008be150bfb0dc495391cd6f79d81e112d6a491a

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            bbcc4f535938370cb57dd7a75e058950

            SHA1

            9026470e78596cbabccc5f14b612768ddf1c2b85

            SHA256

            2be20a7fe5b0a28cff12d263f59722f153fe20ff4c4786ccdd69b5e3d09fd5de

            SHA512

            4a5351f90bfd88dccdd2ce3188204d026d3b93bc1b588642f41dd95a61f00a28243235d1daee30a4e134d710b970543f5d59c21f6de31c32615494897d7d4774

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            bbcc4f535938370cb57dd7a75e058950

            SHA1

            9026470e78596cbabccc5f14b612768ddf1c2b85

            SHA256

            2be20a7fe5b0a28cff12d263f59722f153fe20ff4c4786ccdd69b5e3d09fd5de

            SHA512

            4a5351f90bfd88dccdd2ce3188204d026d3b93bc1b588642f41dd95a61f00a28243235d1daee30a4e134d710b970543f5d59c21f6de31c32615494897d7d4774

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            48bec045a53d37993588b72aab5c120f

            SHA1

            8a76370319327d08ed4a3b2c6cf85eb6e5f5fc5f

            SHA256

            d20b237a2c214e6a9042635c34d4a4ee4b69145be684c0090e0654fbeb546c47

            SHA512

            052a7f7521e822dfbc6d4f18fbdea8a2dd40d0cb5bbc6666f8e9970f2ed47926b961890fe4434dab9b0366dc43064c738747cdce5972932c0e73082d1f89b2b8

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            48bec045a53d37993588b72aab5c120f

            SHA1

            8a76370319327d08ed4a3b2c6cf85eb6e5f5fc5f

            SHA256

            d20b237a2c214e6a9042635c34d4a4ee4b69145be684c0090e0654fbeb546c47

            SHA512

            052a7f7521e822dfbc6d4f18fbdea8a2dd40d0cb5bbc6666f8e9970f2ed47926b961890fe4434dab9b0366dc43064c738747cdce5972932c0e73082d1f89b2b8

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            48bec045a53d37993588b72aab5c120f

            SHA1

            8a76370319327d08ed4a3b2c6cf85eb6e5f5fc5f

            SHA256

            d20b237a2c214e6a9042635c34d4a4ee4b69145be684c0090e0654fbeb546c47

            SHA512

            052a7f7521e822dfbc6d4f18fbdea8a2dd40d0cb5bbc6666f8e9970f2ed47926b961890fe4434dab9b0366dc43064c738747cdce5972932c0e73082d1f89b2b8

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            159KB

            MD5

            4058726d3dcc09e9be6f64d3922cd778

            SHA1

            d01477afb9c7e1fcd110334c8f2b19efb4974434

            SHA256

            05c7c4f70dac00d0ae6a413f1ed97c3d59d77d6c42ceb2c1bb93f61f95467942

            SHA512

            b181fc0351312fe46731e44d6155389166e5c29ca421fce9df52590e0404cf4c8f8175b93a476df12e726afec230dfbbc08c6a2914d08832ee724023f01facc4

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            159KB

            MD5

            4058726d3dcc09e9be6f64d3922cd778

            SHA1

            d01477afb9c7e1fcd110334c8f2b19efb4974434

            SHA256

            05c7c4f70dac00d0ae6a413f1ed97c3d59d77d6c42ceb2c1bb93f61f95467942

            SHA512

            b181fc0351312fe46731e44d6155389166e5c29ca421fce9df52590e0404cf4c8f8175b93a476df12e726afec230dfbbc08c6a2914d08832ee724023f01facc4

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            159KB

            MD5

            4058726d3dcc09e9be6f64d3922cd778

            SHA1

            d01477afb9c7e1fcd110334c8f2b19efb4974434

            SHA256

            05c7c4f70dac00d0ae6a413f1ed97c3d59d77d6c42ceb2c1bb93f61f95467942

            SHA512

            b181fc0351312fe46731e44d6155389166e5c29ca421fce9df52590e0404cf4c8f8175b93a476df12e726afec230dfbbc08c6a2914d08832ee724023f01facc4

          • memory/116-141-0x0000000000000000-mapping.dmp

          • memory/1244-142-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1244-169-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1244-132-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1248-137-0x0000000000000000-mapping.dmp

          • memory/1252-166-0x0000000000000000-mapping.dmp

          • memory/1884-167-0x0000000000000000-mapping.dmp

          • memory/3156-136-0x0000000000000000-mapping.dmp

          • memory/3284-154-0x0000000000000000-mapping.dmp

          • memory/3512-159-0x0000000000000000-mapping.dmp

          • memory/4056-148-0x0000000000000000-mapping.dmp

          • memory/4132-143-0x0000000000000000-mapping.dmp

          • memory/4240-160-0x0000000000000000-mapping.dmp

          • memory/4944-140-0x0000000000000000-mapping.dmp