Analysis
-
max time kernel
152s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:25
Static task
static1
Behavioral task
behavioral1
Sample
57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe
Resource
win10v2004-20221111-en
General
-
Target
57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe
-
Size
603KB
-
MD5
3538821c87a8f074795bd4601b034c19
-
SHA1
57be99e465b406a7ff7ea14ba241cf12fc6cd4cf
-
SHA256
57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558
-
SHA512
7042b2714065d60215a968d15c5276715da01d7ebf701c701118f2f03a86035d072072d236d3ff7958b46674bf174f9e45d405dfb68a6e555636406b2ef055e1
-
SSDEEP
12288:tIny5DYT9Gz5oBzcPRWTDxMPx1krkbWzy7od4i:5UT9IaQZWHiqkd64
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exedescription ioc process File created C:\Windows\system32\drivers\nethfdrv.sys 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe -
Executes dropped EXE 5 IoCs
Processes:
installd.exenethtsrv.exenetupdsrv.exenethtsrv.exenetupdsrv.exepid process 3392 installd.exe 2096 nethtsrv.exe 4852 netupdsrv.exe 4276 nethtsrv.exe 2664 netupdsrv.exe -
Loads dropped DLL 14 IoCs
Processes:
57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exeinstalld.exenethtsrv.exenethtsrv.exepid process 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe 3392 installd.exe 2096 nethtsrv.exe 2096 nethtsrv.exe 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe 4276 nethtsrv.exe 4276 nethtsrv.exe 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
Processes:
57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exedescription ioc process File created C:\Windows\SysWOW64\hfnapi.dll 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe File created C:\Windows\SysWOW64\hfpapi.dll 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe File created C:\Windows\SysWOW64\installd.exe 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe File created C:\Windows\SysWOW64\nethtsrv.exe 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe File created C:\Windows\SysWOW64\netupdsrv.exe 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe -
Drops file in Program Files directory 3 IoCs
Processes:
57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exedescription ioc process File created C:\Program Files (x86)\Common Files\Config\data.xml 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
Processes:
nethtsrv.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 656 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nethtsrv.exedescription pid process Token: SeDebugPrivilege 4276 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exenet.exenet.exenet.exenet.exedescription pid process target process PID 4068 wrote to memory of 3456 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe net.exe PID 4068 wrote to memory of 3456 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe net.exe PID 4068 wrote to memory of 3456 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe net.exe PID 3456 wrote to memory of 816 3456 net.exe net1.exe PID 3456 wrote to memory of 816 3456 net.exe net1.exe PID 3456 wrote to memory of 816 3456 net.exe net1.exe PID 4068 wrote to memory of 204 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe net.exe PID 4068 wrote to memory of 204 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe net.exe PID 4068 wrote to memory of 204 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe net.exe PID 204 wrote to memory of 2840 204 net.exe net1.exe PID 204 wrote to memory of 2840 204 net.exe net1.exe PID 204 wrote to memory of 2840 204 net.exe net1.exe PID 4068 wrote to memory of 3392 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe installd.exe PID 4068 wrote to memory of 3392 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe installd.exe PID 4068 wrote to memory of 3392 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe installd.exe PID 4068 wrote to memory of 2096 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe nethtsrv.exe PID 4068 wrote to memory of 2096 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe nethtsrv.exe PID 4068 wrote to memory of 2096 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe nethtsrv.exe PID 4068 wrote to memory of 4852 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe netupdsrv.exe PID 4068 wrote to memory of 4852 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe netupdsrv.exe PID 4068 wrote to memory of 4852 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe netupdsrv.exe PID 4068 wrote to memory of 2304 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe net.exe PID 4068 wrote to memory of 2304 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe net.exe PID 4068 wrote to memory of 2304 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe net.exe PID 2304 wrote to memory of 1348 2304 net.exe net1.exe PID 2304 wrote to memory of 1348 2304 net.exe net1.exe PID 2304 wrote to memory of 1348 2304 net.exe net1.exe PID 4068 wrote to memory of 1440 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe net.exe PID 4068 wrote to memory of 1440 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe net.exe PID 4068 wrote to memory of 1440 4068 57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe net.exe PID 1440 wrote to memory of 2232 1440 net.exe net1.exe PID 1440 wrote to memory of 2232 1440 net.exe net1.exe PID 1440 wrote to memory of 2232 1440 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe"C:\Users\Admin\AppData\Local\Temp\57827e497f9b390c49a1925385e36097e8e5818aa46676c064befd8375e6b558.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:816
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:2840
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3392 -
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2096 -
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:4852 -
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1348
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:2232
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:2664
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD52600354fc9d40b662615abe65a3b4235
SHA12421c7131c0efaa230571bd8e6e8204c0ababaae
SHA25641f20de86fe6873d35619d17f478fdabc0390c03600b2f5ed5fdd5b50a94168a
SHA512c3e35fb311d4861fac15fd57e975ed7a0d6afb6232b3310b3f945dbc0701b885847b668e6b827bf494c9f25464a6caac9e56f8f8147add394c4f2ef9dd6e03ac
-
Filesize
106KB
MD52600354fc9d40b662615abe65a3b4235
SHA12421c7131c0efaa230571bd8e6e8204c0ababaae
SHA25641f20de86fe6873d35619d17f478fdabc0390c03600b2f5ed5fdd5b50a94168a
SHA512c3e35fb311d4861fac15fd57e975ed7a0d6afb6232b3310b3f945dbc0701b885847b668e6b827bf494c9f25464a6caac9e56f8f8147add394c4f2ef9dd6e03ac
-
Filesize
106KB
MD52600354fc9d40b662615abe65a3b4235
SHA12421c7131c0efaa230571bd8e6e8204c0ababaae
SHA25641f20de86fe6873d35619d17f478fdabc0390c03600b2f5ed5fdd5b50a94168a
SHA512c3e35fb311d4861fac15fd57e975ed7a0d6afb6232b3310b3f945dbc0701b885847b668e6b827bf494c9f25464a6caac9e56f8f8147add394c4f2ef9dd6e03ac
-
Filesize
106KB
MD52600354fc9d40b662615abe65a3b4235
SHA12421c7131c0efaa230571bd8e6e8204c0ababaae
SHA25641f20de86fe6873d35619d17f478fdabc0390c03600b2f5ed5fdd5b50a94168a
SHA512c3e35fb311d4861fac15fd57e975ed7a0d6afb6232b3310b3f945dbc0701b885847b668e6b827bf494c9f25464a6caac9e56f8f8147add394c4f2ef9dd6e03ac
-
Filesize
241KB
MD549116d30416d6e4e03a241e1268df60e
SHA1d414538c467ca61679ad0c3a0d3ad2967a1d9464
SHA256120168ad301cc81ab751488b38458f1e194a57cd7eac499fd2afa62d02d2764e
SHA512414f2755f2999f8313d5b7386d6a67b7a98930cd4a0763b5d57f7c54a9fb9c51a323f9a2916aadfb42be120a6f1d83541a262a9d8ee0a389d0af70c9e3eac42b
-
Filesize
241KB
MD549116d30416d6e4e03a241e1268df60e
SHA1d414538c467ca61679ad0c3a0d3ad2967a1d9464
SHA256120168ad301cc81ab751488b38458f1e194a57cd7eac499fd2afa62d02d2764e
SHA512414f2755f2999f8313d5b7386d6a67b7a98930cd4a0763b5d57f7c54a9fb9c51a323f9a2916aadfb42be120a6f1d83541a262a9d8ee0a389d0af70c9e3eac42b
-
Filesize
241KB
MD549116d30416d6e4e03a241e1268df60e
SHA1d414538c467ca61679ad0c3a0d3ad2967a1d9464
SHA256120168ad301cc81ab751488b38458f1e194a57cd7eac499fd2afa62d02d2764e
SHA512414f2755f2999f8313d5b7386d6a67b7a98930cd4a0763b5d57f7c54a9fb9c51a323f9a2916aadfb42be120a6f1d83541a262a9d8ee0a389d0af70c9e3eac42b
-
Filesize
108KB
MD5065457158fabf42e92a758f238e716e8
SHA1b45921cdbdc29064fa6a7daa7f619b4be233764f
SHA25671e86777789ebcd391f702107b567b696da5564924c49e25554b6f763ccefb89
SHA5125bad6205959c161a328966084c6cd5490292cbe00768c059801625d8157c17d194950e105fd73c8d7edcec5ccaa683f72c13502e76843337f08f96158e95c340
-
Filesize
108KB
MD5065457158fabf42e92a758f238e716e8
SHA1b45921cdbdc29064fa6a7daa7f619b4be233764f
SHA25671e86777789ebcd391f702107b567b696da5564924c49e25554b6f763ccefb89
SHA5125bad6205959c161a328966084c6cd5490292cbe00768c059801625d8157c17d194950e105fd73c8d7edcec5ccaa683f72c13502e76843337f08f96158e95c340
-
Filesize
176KB
MD5e720b742121a4209fff9e2486ed8f369
SHA10cf39f7c5323b89c8c32d7beae2ee4001fc51e8b
SHA2568a0d184b1bb62459495644b2815df6c2ef981e04cb3099ced8ecc6b35372a33a
SHA512a6f3dac321191471ff9d70e262789ee975f23c7fa63e738e029b85feff3d350d4ac64eeefcdb6f416c74f30598caecf3d221de7c30e7a4a20ee8118eae602640
-
Filesize
176KB
MD5e720b742121a4209fff9e2486ed8f369
SHA10cf39f7c5323b89c8c32d7beae2ee4001fc51e8b
SHA2568a0d184b1bb62459495644b2815df6c2ef981e04cb3099ced8ecc6b35372a33a
SHA512a6f3dac321191471ff9d70e262789ee975f23c7fa63e738e029b85feff3d350d4ac64eeefcdb6f416c74f30598caecf3d221de7c30e7a4a20ee8118eae602640
-
Filesize
176KB
MD5e720b742121a4209fff9e2486ed8f369
SHA10cf39f7c5323b89c8c32d7beae2ee4001fc51e8b
SHA2568a0d184b1bb62459495644b2815df6c2ef981e04cb3099ced8ecc6b35372a33a
SHA512a6f3dac321191471ff9d70e262789ee975f23c7fa63e738e029b85feff3d350d4ac64eeefcdb6f416c74f30598caecf3d221de7c30e7a4a20ee8118eae602640
-
Filesize
158KB
MD5bb23dccacd4c46fb1ed3e85f24d7809f
SHA11b80b3aa8305c494b900a7854f73805dcc1a3c46
SHA2562b00231910cd82e2c24c2bba594b198fb5c83370743cb6536cb50d69a484d828
SHA512fca0cc941647f8e72f9c2af7cd3ee3e65f2a8f73ac8dd61ebf1c4e80c60a7d4284e9e95ff0ed42f1a266ece516b2120ec3cc07ed750ebb1833418223acbd1f01
-
Filesize
158KB
MD5bb23dccacd4c46fb1ed3e85f24d7809f
SHA11b80b3aa8305c494b900a7854f73805dcc1a3c46
SHA2562b00231910cd82e2c24c2bba594b198fb5c83370743cb6536cb50d69a484d828
SHA512fca0cc941647f8e72f9c2af7cd3ee3e65f2a8f73ac8dd61ebf1c4e80c60a7d4284e9e95ff0ed42f1a266ece516b2120ec3cc07ed750ebb1833418223acbd1f01
-
Filesize
158KB
MD5bb23dccacd4c46fb1ed3e85f24d7809f
SHA11b80b3aa8305c494b900a7854f73805dcc1a3c46
SHA2562b00231910cd82e2c24c2bba594b198fb5c83370743cb6536cb50d69a484d828
SHA512fca0cc941647f8e72f9c2af7cd3ee3e65f2a8f73ac8dd61ebf1c4e80c60a7d4284e9e95ff0ed42f1a266ece516b2120ec3cc07ed750ebb1833418223acbd1f01