Analysis

  • max time kernel
    44s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:24

General

  • Target

    65f502717cf7bcdc14e3a282abed88efe871a4ecf0f0730e9ae036b500066403.exe

  • Size

    603KB

  • MD5

    9ddecb5aa28589fd32e4ec9d2558a914

  • SHA1

    42a6c9f8d2bbc573eac60e7d49858b920c4524b5

  • SHA256

    65f502717cf7bcdc14e3a282abed88efe871a4ecf0f0730e9ae036b500066403

  • SHA512

    ed88bb089dd3912ff8044b06be209570b3abaa17447b81ecd186c052c8dada19a1a1bb4202ca3f3898ddf7ea9bf60820240743e5aa36803c1987e8e7b7a01920

  • SSDEEP

    12288:hIny5DYT9TKJjThbrgk7WQuh6uZcvzfR0/UQUW45SNf0g9:dUTlaj9brgkSf8JwfZ4cNl

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65f502717cf7bcdc14e3a282abed88efe871a4ecf0f0730e9ae036b500066403.exe
    "C:\Users\Admin\AppData\Local\Temp\65f502717cf7bcdc14e3a282abed88efe871a4ecf0f0730e9ae036b500066403.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:240
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:2040
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1224
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:1256
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2032
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1540
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:296
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2000
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:108
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1676
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:1028
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1636
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:1356

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            4ae6522842225ddacfa11da23aa8e94d

            SHA1

            8fa1632c4d4296208085cb34c24135fbc0ed11bb

            SHA256

            97bc6579cad5e02976f725b267ed09e7d94f97197c4be52055e942b5d63c21a1

            SHA512

            8e108cd9cf50e1667a6756947a76afd34b35c2d5f69988cd95ecd02424ebfd3ee063e2d923729c79992ebc5c178cd6fd12f23b16de72370f47ec16f92eb7b85d

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            49bf1937be558cba4203ac6506bdcfd1

            SHA1

            dc77b5b8ed9e842e3d3aea7742fc84bb4ebea519

            SHA256

            2d7b26611f82e972c5db0c57b7c888571016ae521b6653bda9d707b7c02a8edd

            SHA512

            5a42fb90bc4b835b164c24527032185e8afe0cd6252d8511b48c582b38ad86c3788e63536b4dca894acaf78f72df284b7a8a752f4ff03b15f693ad27860eadaf

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            4ed462d736c3050c6dde1c611c391b25

            SHA1

            8679986c3c077cead80c057de6a6e31d54a4be7b

            SHA256

            22e2082ec543cbcacff23010e6226ab58902de9ab1c9159fa310d285a74ca055

            SHA512

            e8a2efa07d2b6d2ebbbaed40ed334b03bf646661cfe62e2973e531f62ba29f72abf877f6ab9e0aee045326f4a58e79a49870ccebef7b38743c858452885c35d2

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            df2850305e7c1c629a110f462e583ef2

            SHA1

            05721a8d59fc9c6353e8e32b6e32e4768349a672

            SHA256

            f5518327bfa0e7ffb3e72ed000884381236a2ff0dec356d946636d595cf19b6f

            SHA512

            a7b9a6a33d11263a5ad3cc34fb6bdd9c649760195be740996f44b71478103620c8ff9602df3e56b2ed0f53b8bd696866d8a12b48476ddaf32a75a30c355112ad

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            df2850305e7c1c629a110f462e583ef2

            SHA1

            05721a8d59fc9c6353e8e32b6e32e4768349a672

            SHA256

            f5518327bfa0e7ffb3e72ed000884381236a2ff0dec356d946636d595cf19b6f

            SHA512

            a7b9a6a33d11263a5ad3cc34fb6bdd9c649760195be740996f44b71478103620c8ff9602df3e56b2ed0f53b8bd696866d8a12b48476ddaf32a75a30c355112ad

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            d7e01e84678b203609ac022a9de09831

            SHA1

            eb9f32d3404a43e4a674fa402f67a490903483b9

            SHA256

            4c7a189c6d4a4e7cb19553cd8de483c9941f563df619366e38198a3eb4b1fc22

            SHA512

            f40cf3947eadefaa9fea7fc3b1e5823f26703b1165b5fd4e2ffa32b546bed4752570929f9f4cb8ba7bffa3209285c834f094f49290ae5e41efaf6c4ffcfa9d8f

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            d7e01e84678b203609ac022a9de09831

            SHA1

            eb9f32d3404a43e4a674fa402f67a490903483b9

            SHA256

            4c7a189c6d4a4e7cb19553cd8de483c9941f563df619366e38198a3eb4b1fc22

            SHA512

            f40cf3947eadefaa9fea7fc3b1e5823f26703b1165b5fd4e2ffa32b546bed4752570929f9f4cb8ba7bffa3209285c834f094f49290ae5e41efaf6c4ffcfa9d8f

          • \Users\Admin\AppData\Local\Temp\nsj824D.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • \Users\Admin\AppData\Local\Temp\nsj824D.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsj824D.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsj824D.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsj824D.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            4ae6522842225ddacfa11da23aa8e94d

            SHA1

            8fa1632c4d4296208085cb34c24135fbc0ed11bb

            SHA256

            97bc6579cad5e02976f725b267ed09e7d94f97197c4be52055e942b5d63c21a1

            SHA512

            8e108cd9cf50e1667a6756947a76afd34b35c2d5f69988cd95ecd02424ebfd3ee063e2d923729c79992ebc5c178cd6fd12f23b16de72370f47ec16f92eb7b85d

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            4ae6522842225ddacfa11da23aa8e94d

            SHA1

            8fa1632c4d4296208085cb34c24135fbc0ed11bb

            SHA256

            97bc6579cad5e02976f725b267ed09e7d94f97197c4be52055e942b5d63c21a1

            SHA512

            8e108cd9cf50e1667a6756947a76afd34b35c2d5f69988cd95ecd02424ebfd3ee063e2d923729c79992ebc5c178cd6fd12f23b16de72370f47ec16f92eb7b85d

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            4ae6522842225ddacfa11da23aa8e94d

            SHA1

            8fa1632c4d4296208085cb34c24135fbc0ed11bb

            SHA256

            97bc6579cad5e02976f725b267ed09e7d94f97197c4be52055e942b5d63c21a1

            SHA512

            8e108cd9cf50e1667a6756947a76afd34b35c2d5f69988cd95ecd02424ebfd3ee063e2d923729c79992ebc5c178cd6fd12f23b16de72370f47ec16f92eb7b85d

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            49bf1937be558cba4203ac6506bdcfd1

            SHA1

            dc77b5b8ed9e842e3d3aea7742fc84bb4ebea519

            SHA256

            2d7b26611f82e972c5db0c57b7c888571016ae521b6653bda9d707b7c02a8edd

            SHA512

            5a42fb90bc4b835b164c24527032185e8afe0cd6252d8511b48c582b38ad86c3788e63536b4dca894acaf78f72df284b7a8a752f4ff03b15f693ad27860eadaf

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            49bf1937be558cba4203ac6506bdcfd1

            SHA1

            dc77b5b8ed9e842e3d3aea7742fc84bb4ebea519

            SHA256

            2d7b26611f82e972c5db0c57b7c888571016ae521b6653bda9d707b7c02a8edd

            SHA512

            5a42fb90bc4b835b164c24527032185e8afe0cd6252d8511b48c582b38ad86c3788e63536b4dca894acaf78f72df284b7a8a752f4ff03b15f693ad27860eadaf

          • \Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            4ed462d736c3050c6dde1c611c391b25

            SHA1

            8679986c3c077cead80c057de6a6e31d54a4be7b

            SHA256

            22e2082ec543cbcacff23010e6226ab58902de9ab1c9159fa310d285a74ca055

            SHA512

            e8a2efa07d2b6d2ebbbaed40ed334b03bf646661cfe62e2973e531f62ba29f72abf877f6ab9e0aee045326f4a58e79a49870ccebef7b38743c858452885c35d2

          • \Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            df2850305e7c1c629a110f462e583ef2

            SHA1

            05721a8d59fc9c6353e8e32b6e32e4768349a672

            SHA256

            f5518327bfa0e7ffb3e72ed000884381236a2ff0dec356d946636d595cf19b6f

            SHA512

            a7b9a6a33d11263a5ad3cc34fb6bdd9c649760195be740996f44b71478103620c8ff9602df3e56b2ed0f53b8bd696866d8a12b48476ddaf32a75a30c355112ad

          • \Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            d7e01e84678b203609ac022a9de09831

            SHA1

            eb9f32d3404a43e4a674fa402f67a490903483b9

            SHA256

            4c7a189c6d4a4e7cb19553cd8de483c9941f563df619366e38198a3eb4b1fc22

            SHA512

            f40cf3947eadefaa9fea7fc3b1e5823f26703b1165b5fd4e2ffa32b546bed4752570929f9f4cb8ba7bffa3209285c834f094f49290ae5e41efaf6c4ffcfa9d8f

          • memory/108-81-0x0000000000000000-mapping.dmp

          • memory/240-54-0x0000000074AB1000-0x0000000074AB3000-memory.dmp

            Filesize

            8KB

          • memory/240-90-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/240-59-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/296-76-0x0000000000000000-mapping.dmp

          • memory/1028-87-0x0000000000000000-mapping.dmp

          • memory/1224-61-0x0000000000000000-mapping.dmp

          • memory/1256-62-0x0000000000000000-mapping.dmp

          • memory/1540-70-0x0000000000000000-mapping.dmp

          • memory/1676-86-0x0000000000000000-mapping.dmp

          • memory/1988-57-0x0000000000000000-mapping.dmp

          • memory/2000-80-0x0000000000000000-mapping.dmp

          • memory/2032-64-0x0000000000000000-mapping.dmp

          • memory/2040-58-0x0000000000000000-mapping.dmp