Analysis

  • max time kernel
    150s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:24

General

  • Target

    6695952181046173f09f628819ee2d4571a08a1f46e2cad7ce8aa8f981ecc1b2.exe

  • Size

    602KB

  • MD5

    a616b4fdac57168c91c23e2ea4199e5b

  • SHA1

    48a49914b3c6f2a9cc56272f675beddf27729607

  • SHA256

    6695952181046173f09f628819ee2d4571a08a1f46e2cad7ce8aa8f981ecc1b2

  • SHA512

    b5084ed54f00ac786f2e78b9080ce8a789f5e66f2df8327d402a825cc6d1c93f2d8ae4db9d2271c6bd8dab62acfb549375f967112bf2f5b49925d82733e44be1

  • SSDEEP

    12288:gIny5DYTfIQ+vFgxcqGAPkrXL9GDUxAlKQPBuok8zD:eUTfXZxcGPkFGOceokk

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6695952181046173f09f628819ee2d4571a08a1f46e2cad7ce8aa8f981ecc1b2.exe
    "C:\Users\Admin\AppData\Local\Temp\6695952181046173f09f628819ee2d4571a08a1f46e2cad7ce8aa8f981ecc1b2.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3988
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1304
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:2444
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1916
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:1136
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4060
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4160
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:3640
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4184
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:1452
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3452
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:2192
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:1404
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:904

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Discovery

          Query Registry

          1
          T1012

          System Information Discovery

          1
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsb2FBD.tmp\System.dll
            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nsb2FBD.tmp\nsExec.dll
            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsb2FBD.tmp\nsExec.dll
            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsb2FBD.tmp\nsExec.dll
            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsb2FBD.tmp\nsExec.dll
            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsb2FBD.tmp\nsExec.dll
            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsb2FBD.tmp\nsExec.dll
            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsb2FBD.tmp\nsExec.dll
            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsb2FBD.tmp\nsExec.dll
            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Windows\SysWOW64\hfnapi.dll
            Filesize

            106KB

            MD5

            171d8eb441f5994692268d8e81cd5a27

            SHA1

            b419c32662d7ffd7fc5071df2cdab7a90e5f27a9

            SHA256

            66170d0ab3f8be2d977cdab3559ddfc40d1c048ae96383c2b4c64b8621d3a122

            SHA512

            f22f42c9d9afd02a8c2e124590640e4e09cd11f66f07eecaf96a6f3d8726217520a4878b1aed7435e580dbb28c8221eecf731e955b78c3f5051466ff85d2ff24

          • C:\Windows\SysWOW64\hfnapi.dll
            Filesize

            106KB

            MD5

            171d8eb441f5994692268d8e81cd5a27

            SHA1

            b419c32662d7ffd7fc5071df2cdab7a90e5f27a9

            SHA256

            66170d0ab3f8be2d977cdab3559ddfc40d1c048ae96383c2b4c64b8621d3a122

            SHA512

            f22f42c9d9afd02a8c2e124590640e4e09cd11f66f07eecaf96a6f3d8726217520a4878b1aed7435e580dbb28c8221eecf731e955b78c3f5051466ff85d2ff24

          • C:\Windows\SysWOW64\hfnapi.dll
            Filesize

            106KB

            MD5

            171d8eb441f5994692268d8e81cd5a27

            SHA1

            b419c32662d7ffd7fc5071df2cdab7a90e5f27a9

            SHA256

            66170d0ab3f8be2d977cdab3559ddfc40d1c048ae96383c2b4c64b8621d3a122

            SHA512

            f22f42c9d9afd02a8c2e124590640e4e09cd11f66f07eecaf96a6f3d8726217520a4878b1aed7435e580dbb28c8221eecf731e955b78c3f5051466ff85d2ff24

          • C:\Windows\SysWOW64\hfnapi.dll
            Filesize

            106KB

            MD5

            171d8eb441f5994692268d8e81cd5a27

            SHA1

            b419c32662d7ffd7fc5071df2cdab7a90e5f27a9

            SHA256

            66170d0ab3f8be2d977cdab3559ddfc40d1c048ae96383c2b4c64b8621d3a122

            SHA512

            f22f42c9d9afd02a8c2e124590640e4e09cd11f66f07eecaf96a6f3d8726217520a4878b1aed7435e580dbb28c8221eecf731e955b78c3f5051466ff85d2ff24

          • C:\Windows\SysWOW64\hfpapi.dll
            Filesize

            241KB

            MD5

            45cbc289c0f52d2d0ebcdcf746442564

            SHA1

            faef98f4d7a4a25d58f5d2f042e9d184443520ab

            SHA256

            b7df5a843638d4e61f9fbd40ad53ba97f47bdb79e39d6e0d80f99f6f04de3e5b

            SHA512

            54092fff3b0ce37784fee9aecf0acf8fafb6b4dec2adaf850a2b12b53287c0964a06e22ee23f40de4b36bea39b84175b56abd92f0068ee85cca6b2d018fa8493

          • C:\Windows\SysWOW64\hfpapi.dll
            Filesize

            241KB

            MD5

            45cbc289c0f52d2d0ebcdcf746442564

            SHA1

            faef98f4d7a4a25d58f5d2f042e9d184443520ab

            SHA256

            b7df5a843638d4e61f9fbd40ad53ba97f47bdb79e39d6e0d80f99f6f04de3e5b

            SHA512

            54092fff3b0ce37784fee9aecf0acf8fafb6b4dec2adaf850a2b12b53287c0964a06e22ee23f40de4b36bea39b84175b56abd92f0068ee85cca6b2d018fa8493

          • C:\Windows\SysWOW64\hfpapi.dll
            Filesize

            241KB

            MD5

            45cbc289c0f52d2d0ebcdcf746442564

            SHA1

            faef98f4d7a4a25d58f5d2f042e9d184443520ab

            SHA256

            b7df5a843638d4e61f9fbd40ad53ba97f47bdb79e39d6e0d80f99f6f04de3e5b

            SHA512

            54092fff3b0ce37784fee9aecf0acf8fafb6b4dec2adaf850a2b12b53287c0964a06e22ee23f40de4b36bea39b84175b56abd92f0068ee85cca6b2d018fa8493

          • C:\Windows\SysWOW64\installd.exe
            Filesize

            108KB

            MD5

            e0830a7df06deb73cd98fce82e5d1a57

            SHA1

            42df9b3c84affe8e07669203a4df65403e394179

            SHA256

            0756c3c91c23f9b2127e6351dc8f1dc06c81742986d6684ff3ae707993972381

            SHA512

            dd25fdaf18fe561ad74d9e6417b36363ab3d6d5bd13514e3a9d3b147c8d5feae671da515d30393d1209022a4929d5af00ac4bf5222a125321da8daf436838b7c

          • C:\Windows\SysWOW64\installd.exe
            Filesize

            108KB

            MD5

            e0830a7df06deb73cd98fce82e5d1a57

            SHA1

            42df9b3c84affe8e07669203a4df65403e394179

            SHA256

            0756c3c91c23f9b2127e6351dc8f1dc06c81742986d6684ff3ae707993972381

            SHA512

            dd25fdaf18fe561ad74d9e6417b36363ab3d6d5bd13514e3a9d3b147c8d5feae671da515d30393d1209022a4929d5af00ac4bf5222a125321da8daf436838b7c

          • C:\Windows\SysWOW64\nethtsrv.exe
            Filesize

            176KB

            MD5

            f35e2fd6d4a8458d9667c340d4c90ab4

            SHA1

            9d896e99633eb3d35c9b3eb5f426cb25fa9a4bea

            SHA256

            7a9ddf29fc8ee67cf25d2a90a03044900febbb6ba9dfd44d64a62e90c023e58d

            SHA512

            96c2a3c076ceb71536b83bc57aafc8d5d7e13fd851cffaa2bf723944e38dbe328093f0219f4ae5cdc0eb009157ba4604af9113723309e6b0e3d54241dcc65bcd

          • C:\Windows\SysWOW64\nethtsrv.exe
            Filesize

            176KB

            MD5

            f35e2fd6d4a8458d9667c340d4c90ab4

            SHA1

            9d896e99633eb3d35c9b3eb5f426cb25fa9a4bea

            SHA256

            7a9ddf29fc8ee67cf25d2a90a03044900febbb6ba9dfd44d64a62e90c023e58d

            SHA512

            96c2a3c076ceb71536b83bc57aafc8d5d7e13fd851cffaa2bf723944e38dbe328093f0219f4ae5cdc0eb009157ba4604af9113723309e6b0e3d54241dcc65bcd

          • C:\Windows\SysWOW64\nethtsrv.exe
            Filesize

            176KB

            MD5

            f35e2fd6d4a8458d9667c340d4c90ab4

            SHA1

            9d896e99633eb3d35c9b3eb5f426cb25fa9a4bea

            SHA256

            7a9ddf29fc8ee67cf25d2a90a03044900febbb6ba9dfd44d64a62e90c023e58d

            SHA512

            96c2a3c076ceb71536b83bc57aafc8d5d7e13fd851cffaa2bf723944e38dbe328093f0219f4ae5cdc0eb009157ba4604af9113723309e6b0e3d54241dcc65bcd

          • C:\Windows\SysWOW64\netupdsrv.exe
            Filesize

            158KB

            MD5

            f01243f8670af32506badd5cec942066

            SHA1

            311c00d7b90a0ec8a0293bb53fe2a384b3623eca

            SHA256

            fb15b6bee587398326a6b93a07329394dead4fa0afd51ee4d7871491a167fc4f

            SHA512

            89c1214a5e8dd90e525a53fe732ccade86456604fe818eb2b504c6e2fe08e44a8ca01c78f78f29271975fd05f98a0549dbb90752b7d249082bc9cf80fc026fe7

          • C:\Windows\SysWOW64\netupdsrv.exe
            Filesize

            158KB

            MD5

            f01243f8670af32506badd5cec942066

            SHA1

            311c00d7b90a0ec8a0293bb53fe2a384b3623eca

            SHA256

            fb15b6bee587398326a6b93a07329394dead4fa0afd51ee4d7871491a167fc4f

            SHA512

            89c1214a5e8dd90e525a53fe732ccade86456604fe818eb2b504c6e2fe08e44a8ca01c78f78f29271975fd05f98a0549dbb90752b7d249082bc9cf80fc026fe7

          • C:\Windows\SysWOW64\netupdsrv.exe
            Filesize

            158KB

            MD5

            f01243f8670af32506badd5cec942066

            SHA1

            311c00d7b90a0ec8a0293bb53fe2a384b3623eca

            SHA256

            fb15b6bee587398326a6b93a07329394dead4fa0afd51ee4d7871491a167fc4f

            SHA512

            89c1214a5e8dd90e525a53fe732ccade86456604fe818eb2b504c6e2fe08e44a8ca01c78f78f29271975fd05f98a0549dbb90752b7d249082bc9cf80fc026fe7

          • memory/1136-141-0x0000000000000000-mapping.dmp
          • memory/1304-135-0x0000000000000000-mapping.dmp
          • memory/1452-160-0x0000000000000000-mapping.dmp
          • memory/1916-140-0x0000000000000000-mapping.dmp
          • memory/2192-167-0x0000000000000000-mapping.dmp
          • memory/2444-137-0x0000000000000000-mapping.dmp
          • memory/3452-166-0x0000000000000000-mapping.dmp
          • memory/3640-154-0x0000000000000000-mapping.dmp
          • memory/3988-142-0x0000000000360000-0x00000000007BE000-memory.dmp
            Filesize

            4.4MB

          • memory/3988-136-0x0000000000360000-0x00000000007BE000-memory.dmp
            Filesize

            4.4MB

          • memory/3988-169-0x0000000000360000-0x00000000007BE000-memory.dmp
            Filesize

            4.4MB

          • memory/4060-143-0x0000000000000000-mapping.dmp
          • memory/4160-148-0x0000000000000000-mapping.dmp
          • memory/4184-159-0x0000000000000000-mapping.dmp