Analysis

  • max time kernel
    62s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:25

General

  • Target

    606a898ee2571558ab58377c450602ff36c23b2e25e802c48f81c964ae5f4204.exe

  • Size

    603KB

  • MD5

    04d86bc4704975357c9ce4115ff9f3ea

  • SHA1

    25be22df1e3d068db5f455471dac167b886864d0

  • SHA256

    606a898ee2571558ab58377c450602ff36c23b2e25e802c48f81c964ae5f4204

  • SHA512

    f2170d06a466ce154be310750d6732a95fb93d957887f46b91565b09933344a0a2726f3d7b6bfc7ebda69cc94fb0d2c4b3e99e5f54abb7b2b694f41227ee1b22

  • SSDEEP

    12288:AIny5DYTfIE+kAcJY5un3buA19JLkQuicq19ksEwZSQGXCs:+UTfjruWnkq5+sxZSjys

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\606a898ee2571558ab58377c450602ff36c23b2e25e802c48f81c964ae5f4204.exe
    "C:\Users\Admin\AppData\Local\Temp\606a898ee2571558ab58377c450602ff36c23b2e25e802c48f81c964ae5f4204.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1056
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:904
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:552
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:336
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1508
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1040
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:1876
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:428
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:1268
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1828
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:1556
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1936
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:1680

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            2680c8ad38575a9c7b8c8c45b94d9d96

            SHA1

            3cce1cf54d8a7917f0c0b2e41cd73f9f69661c25

            SHA256

            aec96b3ca2693a631a4f80a268127182aeefd656e28983c6ab4f1c9f31f58b2d

            SHA512

            2cde452f945248a1306866cabf41c7209a967dac078217675c33b6e33ce81d4a01024a7fc4fa1a5b2dce79e7cba4f8d5b6bf9967d2db8cb823d8cf61ff8699d4

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            654d6f20f93e500ca38eaaffef65ccc3

            SHA1

            ebb416a608af7cd34080bb2b44e4f468e1884eb8

            SHA256

            279c360c1fc878c197a3bbe35bacd113bca0bf92631551d9c227737ccae8f43f

            SHA512

            9a740db234870521428a4dc914213d547301bcb5a2968ac541d12056e1c137b73472786566ae4890745116efd3f30ea257cf5bb08b43ad04026204e1cf445a84

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            35722da9ff5eb5b3a237f4cada1cbfaa

            SHA1

            aeb9408fcac5ea42d6e457856c39c640a61ff64d

            SHA256

            6cdbaa129029b747f78256a11bb8d51302a0ae616b2567dcdee11811e531c0fc

            SHA512

            d75fcd04169cf26aff1874c095463a385de78b52bae27f4cd22ee28d1ddfd98563a72bfd99da70c11a2bda447f1aacbc5e73529f1f94aba3e2fd0573e3b29d70

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            464ada332c9f65ec026e01f2b1696759

            SHA1

            34a0ff2a1286cfc9eaf19423a3a52955405c5986

            SHA256

            91650ac1f81d3b1d2741119f04a598dc176e4b253648c9cde7f78aaa3a256bfa

            SHA512

            61a1ab3cb7e251637b65820e2c08c0eb25583b57813afe19a2e40c6be23eed76c2c958a4b5824bd23b0248ef94e3f93d81a2d3ff4259641172a7f7f2ee7a29d8

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            464ada332c9f65ec026e01f2b1696759

            SHA1

            34a0ff2a1286cfc9eaf19423a3a52955405c5986

            SHA256

            91650ac1f81d3b1d2741119f04a598dc176e4b253648c9cde7f78aaa3a256bfa

            SHA512

            61a1ab3cb7e251637b65820e2c08c0eb25583b57813afe19a2e40c6be23eed76c2c958a4b5824bd23b0248ef94e3f93d81a2d3ff4259641172a7f7f2ee7a29d8

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            c8992a6e0db07a2b30b7ccf27d5dd856

            SHA1

            1f5a3a38b0441865ab39b8f120b60aaecb0d886a

            SHA256

            67013a440480b3a4917776202bdf3dc9e0b3c63196ff06319809b8bb0a32bea3

            SHA512

            a04763cd930f825af2cdbcab8717c071063327159800a07230f96a614dc906c3f78a9b7bc869769878004a9a58ca491ed4709a354702a9c547eaef83fdb641bd

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            c8992a6e0db07a2b30b7ccf27d5dd856

            SHA1

            1f5a3a38b0441865ab39b8f120b60aaecb0d886a

            SHA256

            67013a440480b3a4917776202bdf3dc9e0b3c63196ff06319809b8bb0a32bea3

            SHA512

            a04763cd930f825af2cdbcab8717c071063327159800a07230f96a614dc906c3f78a9b7bc869769878004a9a58ca491ed4709a354702a9c547eaef83fdb641bd

          • \Users\Admin\AppData\Local\Temp\nsj6201.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • \Users\Admin\AppData\Local\Temp\nsj6201.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsj6201.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsj6201.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsj6201.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            2680c8ad38575a9c7b8c8c45b94d9d96

            SHA1

            3cce1cf54d8a7917f0c0b2e41cd73f9f69661c25

            SHA256

            aec96b3ca2693a631a4f80a268127182aeefd656e28983c6ab4f1c9f31f58b2d

            SHA512

            2cde452f945248a1306866cabf41c7209a967dac078217675c33b6e33ce81d4a01024a7fc4fa1a5b2dce79e7cba4f8d5b6bf9967d2db8cb823d8cf61ff8699d4

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            2680c8ad38575a9c7b8c8c45b94d9d96

            SHA1

            3cce1cf54d8a7917f0c0b2e41cd73f9f69661c25

            SHA256

            aec96b3ca2693a631a4f80a268127182aeefd656e28983c6ab4f1c9f31f58b2d

            SHA512

            2cde452f945248a1306866cabf41c7209a967dac078217675c33b6e33ce81d4a01024a7fc4fa1a5b2dce79e7cba4f8d5b6bf9967d2db8cb823d8cf61ff8699d4

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            2680c8ad38575a9c7b8c8c45b94d9d96

            SHA1

            3cce1cf54d8a7917f0c0b2e41cd73f9f69661c25

            SHA256

            aec96b3ca2693a631a4f80a268127182aeefd656e28983c6ab4f1c9f31f58b2d

            SHA512

            2cde452f945248a1306866cabf41c7209a967dac078217675c33b6e33ce81d4a01024a7fc4fa1a5b2dce79e7cba4f8d5b6bf9967d2db8cb823d8cf61ff8699d4

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            654d6f20f93e500ca38eaaffef65ccc3

            SHA1

            ebb416a608af7cd34080bb2b44e4f468e1884eb8

            SHA256

            279c360c1fc878c197a3bbe35bacd113bca0bf92631551d9c227737ccae8f43f

            SHA512

            9a740db234870521428a4dc914213d547301bcb5a2968ac541d12056e1c137b73472786566ae4890745116efd3f30ea257cf5bb08b43ad04026204e1cf445a84

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            654d6f20f93e500ca38eaaffef65ccc3

            SHA1

            ebb416a608af7cd34080bb2b44e4f468e1884eb8

            SHA256

            279c360c1fc878c197a3bbe35bacd113bca0bf92631551d9c227737ccae8f43f

            SHA512

            9a740db234870521428a4dc914213d547301bcb5a2968ac541d12056e1c137b73472786566ae4890745116efd3f30ea257cf5bb08b43ad04026204e1cf445a84

          • \Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            35722da9ff5eb5b3a237f4cada1cbfaa

            SHA1

            aeb9408fcac5ea42d6e457856c39c640a61ff64d

            SHA256

            6cdbaa129029b747f78256a11bb8d51302a0ae616b2567dcdee11811e531c0fc

            SHA512

            d75fcd04169cf26aff1874c095463a385de78b52bae27f4cd22ee28d1ddfd98563a72bfd99da70c11a2bda447f1aacbc5e73529f1f94aba3e2fd0573e3b29d70

          • \Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            464ada332c9f65ec026e01f2b1696759

            SHA1

            34a0ff2a1286cfc9eaf19423a3a52955405c5986

            SHA256

            91650ac1f81d3b1d2741119f04a598dc176e4b253648c9cde7f78aaa3a256bfa

            SHA512

            61a1ab3cb7e251637b65820e2c08c0eb25583b57813afe19a2e40c6be23eed76c2c958a4b5824bd23b0248ef94e3f93d81a2d3ff4259641172a7f7f2ee7a29d8

          • \Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            c8992a6e0db07a2b30b7ccf27d5dd856

            SHA1

            1f5a3a38b0441865ab39b8f120b60aaecb0d886a

            SHA256

            67013a440480b3a4917776202bdf3dc9e0b3c63196ff06319809b8bb0a32bea3

            SHA512

            a04763cd930f825af2cdbcab8717c071063327159800a07230f96a614dc906c3f78a9b7bc869769878004a9a58ca491ed4709a354702a9c547eaef83fdb641bd

          • memory/336-63-0x0000000000000000-mapping.dmp

          • memory/428-81-0x0000000000000000-mapping.dmp

          • memory/552-62-0x0000000000000000-mapping.dmp

          • memory/904-60-0x0000000000000000-mapping.dmp

          • memory/1040-71-0x0000000000000000-mapping.dmp

          • memory/1056-59-0x0000000000000000-mapping.dmp

          • memory/1268-82-0x0000000000000000-mapping.dmp

          • memory/1508-65-0x0000000000000000-mapping.dmp

          • memory/1556-88-0x0000000000000000-mapping.dmp

          • memory/1828-87-0x0000000000000000-mapping.dmp

          • memory/1876-77-0x0000000000000000-mapping.dmp

          • memory/2020-54-0x0000000075D61000-0x0000000075D63000-memory.dmp

            Filesize

            8KB

          • memory/2020-57-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/2020-55-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/2020-91-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB