Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:25

General

  • Target

    5bb30554449d7b9e5b1c48ae51e25c16e3511fd24d38cc4dd167ef4aaba76a0e.exe

  • Size

    602KB

  • MD5

    94445bef7d14dcca8dec31c02387d47e

  • SHA1

    de87df782255eda5a5fa4226c9b508b262fa3238

  • SHA256

    5bb30554449d7b9e5b1c48ae51e25c16e3511fd24d38cc4dd167ef4aaba76a0e

  • SHA512

    b00f927b27d1e781ad52fd0e8c52dd7e72e3fccda334b2a9e3085208e13d8d7ca6922b54d15dc4f779ecaf074381eadb21f59584917592a5ef317946e6d121c0

  • SSDEEP

    12288:tIny5DYTj5IGOTJxOHcIilDdWf0BCn7DE3BKijK6:5UTjmnTJsHc1iCjjK6

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5bb30554449d7b9e5b1c48ae51e25c16e3511fd24d38cc4dd167ef4aaba76a0e.exe
    "C:\Users\Admin\AppData\Local\Temp\5bb30554449d7b9e5b1c48ae51e25c16e3511fd24d38cc4dd167ef4aaba76a0e.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1556
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:1380
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1316
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:1312
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1744
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:524
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:1544
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1492
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:1440
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1192
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:1892
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:864
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:1912

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            377b2ed583ad9e0f413d85cd9bf09697

            SHA1

            43e4c920a6dcbae56939089028afd15a9b01e90a

            SHA256

            f80b068d2482d1572ccf03d142953e7cae72a7feb844e96ba1e9dbe61496dcf2

            SHA512

            18841a867b5eb76644975bf5c0c74586bcfe3d99b4ce2e7ae6ad5c05838d41c2929883e4b5777d1bb5fe77ecc9a704df26a4bcefd8d9586822b3250c16b82d6b

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            a0def15f692ec35898034cf91ad05d8c

            SHA1

            60654bc39c12113f1074b41c8245aa4dd9accedf

            SHA256

            c035e9778bf9372943dc35369d991cf6eba069b40640c421d487babfe10997b2

            SHA512

            5a67a02141746293a46bf7e5ffd9a385efd5273ac8e8984836f0d9c9a418a73eec782402bd282361fb25adb9f9c76c11b361ee589203c5009f28a728e92f6ebf

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            ede98b680454dbf27337880dfba8da7e

            SHA1

            1691a8687a8b7c8bf84b8e1dfd96c8820e7dcac9

            SHA256

            1a685b4c235795851f432fa9c62d2243fbabda8e9ec46b15521f7907aa5da19d

            SHA512

            c7762df732c09a4156b6b4cad504715ad761eeb0c0d313bff0d932371be24928efa52c9d118b2ba47abf354a8cf9dabf7aadccad7aecbd486c0792885004c7d1

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            e38eeec216af65fa4057f30690c59ee4

            SHA1

            c79cf4c5f49aec53bc482da6a5da4eb2189c5b00

            SHA256

            039c4a4ce307fdb17f54cd0afde5acc78eb2d833ca78b20ccaf421348d1fad59

            SHA512

            df7a5b015091fb8932b3025411d2bdc559cd9be5ab60f0b8bf9c8c738a15fb95b73c947cfa414d83cde7c881995de48c1c2e915fb0e76c2250e8dab171986b1b

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            e38eeec216af65fa4057f30690c59ee4

            SHA1

            c79cf4c5f49aec53bc482da6a5da4eb2189c5b00

            SHA256

            039c4a4ce307fdb17f54cd0afde5acc78eb2d833ca78b20ccaf421348d1fad59

            SHA512

            df7a5b015091fb8932b3025411d2bdc559cd9be5ab60f0b8bf9c8c738a15fb95b73c947cfa414d83cde7c881995de48c1c2e915fb0e76c2250e8dab171986b1b

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            fc83351f3711bdc28ed1528caa5a6e2d

            SHA1

            e9ce1caa3c04ced82c363a7d248fa5b142e97f14

            SHA256

            f8ae6550860d888141304ce05bf7f2603655a93a6614f5ebce9da0a214e8eeed

            SHA512

            ff317f2864e10254297030c0d9708371788d303cc93c301ff56e346ad8263982ba1eec8b30e8d369ce0486291569fcf94843c09b7231c692797e85cd9b7aa0ab

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            fc83351f3711bdc28ed1528caa5a6e2d

            SHA1

            e9ce1caa3c04ced82c363a7d248fa5b142e97f14

            SHA256

            f8ae6550860d888141304ce05bf7f2603655a93a6614f5ebce9da0a214e8eeed

            SHA512

            ff317f2864e10254297030c0d9708371788d303cc93c301ff56e346ad8263982ba1eec8b30e8d369ce0486291569fcf94843c09b7231c692797e85cd9b7aa0ab

          • \Users\Admin\AppData\Local\Temp\nstFEEB.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • \Users\Admin\AppData\Local\Temp\nstFEEB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nstFEEB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nstFEEB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nstFEEB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            377b2ed583ad9e0f413d85cd9bf09697

            SHA1

            43e4c920a6dcbae56939089028afd15a9b01e90a

            SHA256

            f80b068d2482d1572ccf03d142953e7cae72a7feb844e96ba1e9dbe61496dcf2

            SHA512

            18841a867b5eb76644975bf5c0c74586bcfe3d99b4ce2e7ae6ad5c05838d41c2929883e4b5777d1bb5fe77ecc9a704df26a4bcefd8d9586822b3250c16b82d6b

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            377b2ed583ad9e0f413d85cd9bf09697

            SHA1

            43e4c920a6dcbae56939089028afd15a9b01e90a

            SHA256

            f80b068d2482d1572ccf03d142953e7cae72a7feb844e96ba1e9dbe61496dcf2

            SHA512

            18841a867b5eb76644975bf5c0c74586bcfe3d99b4ce2e7ae6ad5c05838d41c2929883e4b5777d1bb5fe77ecc9a704df26a4bcefd8d9586822b3250c16b82d6b

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            377b2ed583ad9e0f413d85cd9bf09697

            SHA1

            43e4c920a6dcbae56939089028afd15a9b01e90a

            SHA256

            f80b068d2482d1572ccf03d142953e7cae72a7feb844e96ba1e9dbe61496dcf2

            SHA512

            18841a867b5eb76644975bf5c0c74586bcfe3d99b4ce2e7ae6ad5c05838d41c2929883e4b5777d1bb5fe77ecc9a704df26a4bcefd8d9586822b3250c16b82d6b

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            a0def15f692ec35898034cf91ad05d8c

            SHA1

            60654bc39c12113f1074b41c8245aa4dd9accedf

            SHA256

            c035e9778bf9372943dc35369d991cf6eba069b40640c421d487babfe10997b2

            SHA512

            5a67a02141746293a46bf7e5ffd9a385efd5273ac8e8984836f0d9c9a418a73eec782402bd282361fb25adb9f9c76c11b361ee589203c5009f28a728e92f6ebf

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            a0def15f692ec35898034cf91ad05d8c

            SHA1

            60654bc39c12113f1074b41c8245aa4dd9accedf

            SHA256

            c035e9778bf9372943dc35369d991cf6eba069b40640c421d487babfe10997b2

            SHA512

            5a67a02141746293a46bf7e5ffd9a385efd5273ac8e8984836f0d9c9a418a73eec782402bd282361fb25adb9f9c76c11b361ee589203c5009f28a728e92f6ebf

          • \Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            ede98b680454dbf27337880dfba8da7e

            SHA1

            1691a8687a8b7c8bf84b8e1dfd96c8820e7dcac9

            SHA256

            1a685b4c235795851f432fa9c62d2243fbabda8e9ec46b15521f7907aa5da19d

            SHA512

            c7762df732c09a4156b6b4cad504715ad761eeb0c0d313bff0d932371be24928efa52c9d118b2ba47abf354a8cf9dabf7aadccad7aecbd486c0792885004c7d1

          • \Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            e38eeec216af65fa4057f30690c59ee4

            SHA1

            c79cf4c5f49aec53bc482da6a5da4eb2189c5b00

            SHA256

            039c4a4ce307fdb17f54cd0afde5acc78eb2d833ca78b20ccaf421348d1fad59

            SHA512

            df7a5b015091fb8932b3025411d2bdc559cd9be5ab60f0b8bf9c8c738a15fb95b73c947cfa414d83cde7c881995de48c1c2e915fb0e76c2250e8dab171986b1b

          • \Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            fc83351f3711bdc28ed1528caa5a6e2d

            SHA1

            e9ce1caa3c04ced82c363a7d248fa5b142e97f14

            SHA256

            f8ae6550860d888141304ce05bf7f2603655a93a6614f5ebce9da0a214e8eeed

            SHA512

            ff317f2864e10254297030c0d9708371788d303cc93c301ff56e346ad8263982ba1eec8b30e8d369ce0486291569fcf94843c09b7231c692797e85cd9b7aa0ab

          • memory/524-71-0x0000000000000000-mapping.dmp

          • memory/1192-87-0x0000000000000000-mapping.dmp

          • memory/1312-61-0x0000000000000000-mapping.dmp

          • memory/1316-60-0x0000000000000000-mapping.dmp

          • memory/1380-58-0x0000000000000000-mapping.dmp

          • memory/1440-82-0x0000000000000000-mapping.dmp

          • memory/1492-81-0x0000000000000000-mapping.dmp

          • memory/1544-77-0x0000000000000000-mapping.dmp

          • memory/1556-57-0x0000000000000000-mapping.dmp

          • memory/1744-64-0x0000000000000000-mapping.dmp

          • memory/1892-88-0x0000000000000000-mapping.dmp

          • memory/1944-62-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1944-54-0x0000000075CF1000-0x0000000075CF3000-memory.dmp

            Filesize

            8KB

          • memory/1944-69-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1944-91-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB