Analysis

  • max time kernel
    43s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:21

General

  • Target

    7c1f54e19e7ab36964ec76637d60fe825970dd4c22e261a3a42fc4c94086d95a.exe

  • Size

    602KB

  • MD5

    6f122457b806072107747d18aec14d60

  • SHA1

    34c9d6e4e21d9d81cd805df246cfee2431cec7d9

  • SHA256

    7c1f54e19e7ab36964ec76637d60fe825970dd4c22e261a3a42fc4c94086d95a

  • SHA512

    ca8821d23747f23872dcb403393fc9d04a4b2871d3d7667fa168208e97f1b29ded9423b5f049471884100acf576c3e7c2f0c2ae218e7a4bc7184e93bab7053d1

  • SSDEEP

    12288:mIny5DYTkImIL7HFMmgzHWsASuhkOnmZ9Ei:IUTkZI3Sm8ASGoy

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c1f54e19e7ab36964ec76637d60fe825970dd4c22e261a3a42fc4c94086d95a.exe
    "C:\Users\Admin\AppData\Local\Temp\7c1f54e19e7ab36964ec76637d60fe825970dd4c22e261a3a42fc4c94086d95a.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1620
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:1712
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1340
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:1492
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:968
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1172
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:1284
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2036
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:1512
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1864
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:1784
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:300
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:1704

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            7248c555c43273dddf6382c1fddf525a

            SHA1

            7e45b401a84ac06d2fd2c1d51f3673f4c11fc9b7

            SHA256

            bc3febb92c710767da9d0757f4f14c78a26c8e7733b6fe1d4d4654bd169d1bff

            SHA512

            ad69be6d39443ebeeb9ff4f974eef021210809dac7a1cbf720f7c0bf9c7a4fd66b72df8e21462fcaded2878750ce13d1fda719abd62c4d50fa6dbc9c4f6df9d5

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            a882732f524a3fc305624264570bab3e

            SHA1

            4656ffd1b9ad839ad62285c975375a450573eac4

            SHA256

            d9382f450c29ad37c2714130c93659564131dac860501b335b0703d64eaeb20c

            SHA512

            0dff24b5a9a8c371937128eeb7e44733a294a2faaa5a7ccb9a54f27d2a40ebdd0fcc1dffc948b8bb9798e968b5ea46dd0a7db37dc227d88ea4557f3f1ff45f99

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            224a65478754dc70c7d5faff347a05ed

            SHA1

            c55f2db5117b1866800e2d200593d9b462348b7f

            SHA256

            b8551210664d56b864b1e338f5624ac8ae22b1a6a69a1227c3ef555a560d0c1f

            SHA512

            43ff0b0a79f0ddb4afb56a7866b23e14fe541136ac4a535de8124003f4f7a854ba1bb44b8cf1be39a6f06080f74192b0cfc3c83450e91c52df912df674fc7c2e

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            696e202eacf7d65c5c9b447884f19dc1

            SHA1

            1895deea4bb5c0479dc98de54b6dce3943a3eaf4

            SHA256

            abaa2621b7cd04715424e7b64c0d96a7d673d3d279dad4f5bc4dc97987228e14

            SHA512

            cb5758d2d60e3aa0eeeeb8e4f78962c25501cfe53722d61ec34c616874e9d6fb464f48681c4719381edd33cf4595f88fed1988bef87fe52e09b155b9fa785451

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            696e202eacf7d65c5c9b447884f19dc1

            SHA1

            1895deea4bb5c0479dc98de54b6dce3943a3eaf4

            SHA256

            abaa2621b7cd04715424e7b64c0d96a7d673d3d279dad4f5bc4dc97987228e14

            SHA512

            cb5758d2d60e3aa0eeeeb8e4f78962c25501cfe53722d61ec34c616874e9d6fb464f48681c4719381edd33cf4595f88fed1988bef87fe52e09b155b9fa785451

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            fb5876de1c37cb0d1672653712326732

            SHA1

            feec39e5de9efbb1d7c4553e9297dbb94bc7ef11

            SHA256

            0bb2796ccca423f1a5dd90f899fc5a08f9045362d83d167df4b7a2ff9b97fe47

            SHA512

            12de72a73d2602ede36a28cfd45827cdb489d4494a09ec80c57ddbff1ead8a2b15b83590c768379f37e3c438c51b05f3d91dda3928c2bd6c4d545f4b774e8d4a

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            fb5876de1c37cb0d1672653712326732

            SHA1

            feec39e5de9efbb1d7c4553e9297dbb94bc7ef11

            SHA256

            0bb2796ccca423f1a5dd90f899fc5a08f9045362d83d167df4b7a2ff9b97fe47

            SHA512

            12de72a73d2602ede36a28cfd45827cdb489d4494a09ec80c57ddbff1ead8a2b15b83590c768379f37e3c438c51b05f3d91dda3928c2bd6c4d545f4b774e8d4a

          • \Users\Admin\AppData\Local\Temp\nstED3F.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • \Users\Admin\AppData\Local\Temp\nstED3F.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nstED3F.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nstED3F.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nstED3F.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            7248c555c43273dddf6382c1fddf525a

            SHA1

            7e45b401a84ac06d2fd2c1d51f3673f4c11fc9b7

            SHA256

            bc3febb92c710767da9d0757f4f14c78a26c8e7733b6fe1d4d4654bd169d1bff

            SHA512

            ad69be6d39443ebeeb9ff4f974eef021210809dac7a1cbf720f7c0bf9c7a4fd66b72df8e21462fcaded2878750ce13d1fda719abd62c4d50fa6dbc9c4f6df9d5

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            7248c555c43273dddf6382c1fddf525a

            SHA1

            7e45b401a84ac06d2fd2c1d51f3673f4c11fc9b7

            SHA256

            bc3febb92c710767da9d0757f4f14c78a26c8e7733b6fe1d4d4654bd169d1bff

            SHA512

            ad69be6d39443ebeeb9ff4f974eef021210809dac7a1cbf720f7c0bf9c7a4fd66b72df8e21462fcaded2878750ce13d1fda719abd62c4d50fa6dbc9c4f6df9d5

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            7248c555c43273dddf6382c1fddf525a

            SHA1

            7e45b401a84ac06d2fd2c1d51f3673f4c11fc9b7

            SHA256

            bc3febb92c710767da9d0757f4f14c78a26c8e7733b6fe1d4d4654bd169d1bff

            SHA512

            ad69be6d39443ebeeb9ff4f974eef021210809dac7a1cbf720f7c0bf9c7a4fd66b72df8e21462fcaded2878750ce13d1fda719abd62c4d50fa6dbc9c4f6df9d5

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            a882732f524a3fc305624264570bab3e

            SHA1

            4656ffd1b9ad839ad62285c975375a450573eac4

            SHA256

            d9382f450c29ad37c2714130c93659564131dac860501b335b0703d64eaeb20c

            SHA512

            0dff24b5a9a8c371937128eeb7e44733a294a2faaa5a7ccb9a54f27d2a40ebdd0fcc1dffc948b8bb9798e968b5ea46dd0a7db37dc227d88ea4557f3f1ff45f99

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            a882732f524a3fc305624264570bab3e

            SHA1

            4656ffd1b9ad839ad62285c975375a450573eac4

            SHA256

            d9382f450c29ad37c2714130c93659564131dac860501b335b0703d64eaeb20c

            SHA512

            0dff24b5a9a8c371937128eeb7e44733a294a2faaa5a7ccb9a54f27d2a40ebdd0fcc1dffc948b8bb9798e968b5ea46dd0a7db37dc227d88ea4557f3f1ff45f99

          • \Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            224a65478754dc70c7d5faff347a05ed

            SHA1

            c55f2db5117b1866800e2d200593d9b462348b7f

            SHA256

            b8551210664d56b864b1e338f5624ac8ae22b1a6a69a1227c3ef555a560d0c1f

            SHA512

            43ff0b0a79f0ddb4afb56a7866b23e14fe541136ac4a535de8124003f4f7a854ba1bb44b8cf1be39a6f06080f74192b0cfc3c83450e91c52df912df674fc7c2e

          • \Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            696e202eacf7d65c5c9b447884f19dc1

            SHA1

            1895deea4bb5c0479dc98de54b6dce3943a3eaf4

            SHA256

            abaa2621b7cd04715424e7b64c0d96a7d673d3d279dad4f5bc4dc97987228e14

            SHA512

            cb5758d2d60e3aa0eeeeb8e4f78962c25501cfe53722d61ec34c616874e9d6fb464f48681c4719381edd33cf4595f88fed1988bef87fe52e09b155b9fa785451

          • \Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            fb5876de1c37cb0d1672653712326732

            SHA1

            feec39e5de9efbb1d7c4553e9297dbb94bc7ef11

            SHA256

            0bb2796ccca423f1a5dd90f899fc5a08f9045362d83d167df4b7a2ff9b97fe47

            SHA512

            12de72a73d2602ede36a28cfd45827cdb489d4494a09ec80c57ddbff1ead8a2b15b83590c768379f37e3c438c51b05f3d91dda3928c2bd6c4d545f4b774e8d4a

          • memory/968-64-0x0000000000000000-mapping.dmp

          • memory/1172-71-0x0000000000000000-mapping.dmp

          • memory/1284-77-0x0000000000000000-mapping.dmp

          • memory/1340-61-0x0000000000000000-mapping.dmp

          • memory/1492-62-0x0000000000000000-mapping.dmp

          • memory/1512-82-0x0000000000000000-mapping.dmp

          • memory/1620-57-0x0000000000000000-mapping.dmp

          • memory/1712-59-0x0000000000000000-mapping.dmp

          • memory/1784-88-0x0000000000000000-mapping.dmp

          • memory/1864-87-0x0000000000000000-mapping.dmp

          • memory/2000-69-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/2000-58-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/2000-54-0x0000000074F01000-0x0000000074F03000-memory.dmp

            Filesize

            8KB

          • memory/2000-91-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/2036-81-0x0000000000000000-mapping.dmp