Analysis

  • max time kernel
    70s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:26

General

  • Target

    4c0a71e2caca9075c02b5f16921ecdb589b85cdf0c41a4d9e879f13e60b7ce5f.exe

  • Size

    602KB

  • MD5

    db59f43b20a1c4c1328c1e9a06e968a2

  • SHA1

    040235be412f8e5c397b35ccf318e6364739ea48

  • SHA256

    4c0a71e2caca9075c02b5f16921ecdb589b85cdf0c41a4d9e879f13e60b7ce5f

  • SHA512

    08a96a0cac10a27b7c1c89b933ced2412271f5094a616c21b3f10dbea90c770aed6dc35328360a705ca40a0e9a397524579341d6a9d302d34581ef7d87342e56

  • SSDEEP

    12288:MIny5DYTW96p2d18Q1fvS9yjXQ2/u8ET6ig/Y95jXh:KUTW22o4fvSQTQ2/um/YT7

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c0a71e2caca9075c02b5f16921ecdb589b85cdf0c41a4d9e879f13e60b7ce5f.exe
    "C:\Users\Admin\AppData\Local\Temp\4c0a71e2caca9075c02b5f16921ecdb589b85cdf0c41a4d9e879f13e60b7ce5f.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3828
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4280
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:1516
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:828
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:1992
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3200
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2004
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:4988
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1680
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:732
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1580
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:3280
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:4656
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:1420

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nslF033.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nslF033.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nslF033.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nslF033.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nslF033.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nslF033.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nslF033.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nslF033.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nslF033.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            a6941b53ef6a75c6e2d57aa5a964147d

            SHA1

            28bf563203bb4a0b7c8ae0f31147cb585e500960

            SHA256

            e30cbb931978c2b9a80361810c25a3a1b621de33d8d5cf44cee579edfb9f6383

            SHA512

            3e3fbc3a16ed5541426136eae9d183ee79f68fc1841ae884fbea44f10921c22cf9e885dfe68329955a29d31af94a5aeddf55b2bb8f0f009e1df2a7c194d33aba

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            a6941b53ef6a75c6e2d57aa5a964147d

            SHA1

            28bf563203bb4a0b7c8ae0f31147cb585e500960

            SHA256

            e30cbb931978c2b9a80361810c25a3a1b621de33d8d5cf44cee579edfb9f6383

            SHA512

            3e3fbc3a16ed5541426136eae9d183ee79f68fc1841ae884fbea44f10921c22cf9e885dfe68329955a29d31af94a5aeddf55b2bb8f0f009e1df2a7c194d33aba

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            a6941b53ef6a75c6e2d57aa5a964147d

            SHA1

            28bf563203bb4a0b7c8ae0f31147cb585e500960

            SHA256

            e30cbb931978c2b9a80361810c25a3a1b621de33d8d5cf44cee579edfb9f6383

            SHA512

            3e3fbc3a16ed5541426136eae9d183ee79f68fc1841ae884fbea44f10921c22cf9e885dfe68329955a29d31af94a5aeddf55b2bb8f0f009e1df2a7c194d33aba

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            a6941b53ef6a75c6e2d57aa5a964147d

            SHA1

            28bf563203bb4a0b7c8ae0f31147cb585e500960

            SHA256

            e30cbb931978c2b9a80361810c25a3a1b621de33d8d5cf44cee579edfb9f6383

            SHA512

            3e3fbc3a16ed5541426136eae9d183ee79f68fc1841ae884fbea44f10921c22cf9e885dfe68329955a29d31af94a5aeddf55b2bb8f0f009e1df2a7c194d33aba

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            c801f816db254d78b0ea7a437d1459da

            SHA1

            6c2ab18fee9bde07055b0df50c23be8372bab0f6

            SHA256

            a3f8e104517cc6fed625a633c6c6ee3844d1331c56191a7f472aca8cfcbfcff6

            SHA512

            5d4c384236e7062cb103a55136cb6e71796358a44879a2d65a622242554504299c85a03e7b5e11c0d9a671348d87efe96484de954bb63c155163b1a257213e13

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            c801f816db254d78b0ea7a437d1459da

            SHA1

            6c2ab18fee9bde07055b0df50c23be8372bab0f6

            SHA256

            a3f8e104517cc6fed625a633c6c6ee3844d1331c56191a7f472aca8cfcbfcff6

            SHA512

            5d4c384236e7062cb103a55136cb6e71796358a44879a2d65a622242554504299c85a03e7b5e11c0d9a671348d87efe96484de954bb63c155163b1a257213e13

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            c801f816db254d78b0ea7a437d1459da

            SHA1

            6c2ab18fee9bde07055b0df50c23be8372bab0f6

            SHA256

            a3f8e104517cc6fed625a633c6c6ee3844d1331c56191a7f472aca8cfcbfcff6

            SHA512

            5d4c384236e7062cb103a55136cb6e71796358a44879a2d65a622242554504299c85a03e7b5e11c0d9a671348d87efe96484de954bb63c155163b1a257213e13

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            fb9dd3fe43db91b5c9de82551ec1557e

            SHA1

            081d1391c3b1fac70d5c91bdbb44da041b58cb8b

            SHA256

            0a69d1c04433c231a12e04902c4dee0f06975efdc4a314d1e897bcd3927b076e

            SHA512

            30d86016e7a84f1111ee5c48df05bd940e8383477094b08d064e1b64d7ea6fe5b1016c97d905a12a4d4198e4134444555a343872f673a9d20757e77d13665fda

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            fb9dd3fe43db91b5c9de82551ec1557e

            SHA1

            081d1391c3b1fac70d5c91bdbb44da041b58cb8b

            SHA256

            0a69d1c04433c231a12e04902c4dee0f06975efdc4a314d1e897bcd3927b076e

            SHA512

            30d86016e7a84f1111ee5c48df05bd940e8383477094b08d064e1b64d7ea6fe5b1016c97d905a12a4d4198e4134444555a343872f673a9d20757e77d13665fda

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            cd4fb60b245429f2e8c397d5f6fdc734

            SHA1

            d0f6ca8962f3825fec7d9ed138ee4e17cdedf999

            SHA256

            eec75988930fde694a616b31479014fda14ea0d0588420a8505bb5e23f47e191

            SHA512

            5aedd2fcb290963f530d9f749f03464b97fe891b0a80b69379ee330d8724b3e2f275eda03581f15a1601d04088439909b05357d5ce9864e801b2a763414b86a8

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            cd4fb60b245429f2e8c397d5f6fdc734

            SHA1

            d0f6ca8962f3825fec7d9ed138ee4e17cdedf999

            SHA256

            eec75988930fde694a616b31479014fda14ea0d0588420a8505bb5e23f47e191

            SHA512

            5aedd2fcb290963f530d9f749f03464b97fe891b0a80b69379ee330d8724b3e2f275eda03581f15a1601d04088439909b05357d5ce9864e801b2a763414b86a8

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            cd4fb60b245429f2e8c397d5f6fdc734

            SHA1

            d0f6ca8962f3825fec7d9ed138ee4e17cdedf999

            SHA256

            eec75988930fde694a616b31479014fda14ea0d0588420a8505bb5e23f47e191

            SHA512

            5aedd2fcb290963f530d9f749f03464b97fe891b0a80b69379ee330d8724b3e2f275eda03581f15a1601d04088439909b05357d5ce9864e801b2a763414b86a8

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            49209f1d3ccfe87e57c9a0937df9f2f3

            SHA1

            23503a39fa3c3efc13ac5a865e5121398b1516ac

            SHA256

            3f059015c59f617f2bf780812b0dd6b00c01f3c99621abf4c9c1d01111f87688

            SHA512

            bca502d79328913f9c4a17f50e438a2eff095180f852272a1ce7163e61f23b4b2e776aaed4da06947bebb8dc1ea8de921f353b02aaf0b370cdf149fd7c73f907

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            49209f1d3ccfe87e57c9a0937df9f2f3

            SHA1

            23503a39fa3c3efc13ac5a865e5121398b1516ac

            SHA256

            3f059015c59f617f2bf780812b0dd6b00c01f3c99621abf4c9c1d01111f87688

            SHA512

            bca502d79328913f9c4a17f50e438a2eff095180f852272a1ce7163e61f23b4b2e776aaed4da06947bebb8dc1ea8de921f353b02aaf0b370cdf149fd7c73f907

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            49209f1d3ccfe87e57c9a0937df9f2f3

            SHA1

            23503a39fa3c3efc13ac5a865e5121398b1516ac

            SHA256

            3f059015c59f617f2bf780812b0dd6b00c01f3c99621abf4c9c1d01111f87688

            SHA512

            bca502d79328913f9c4a17f50e438a2eff095180f852272a1ce7163e61f23b4b2e776aaed4da06947bebb8dc1ea8de921f353b02aaf0b370cdf149fd7c73f907

          • memory/732-159-0x0000000000000000-mapping.dmp

          • memory/828-140-0x0000000000000000-mapping.dmp

          • memory/1516-136-0x0000000000000000-mapping.dmp

          • memory/1580-165-0x0000000000000000-mapping.dmp

          • memory/1680-158-0x0000000000000000-mapping.dmp

          • memory/1992-141-0x0000000000000000-mapping.dmp

          • memory/2004-147-0x0000000000000000-mapping.dmp

          • memory/3200-142-0x0000000000000000-mapping.dmp

          • memory/3280-166-0x0000000000000000-mapping.dmp

          • memory/3828-137-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/3828-168-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/4280-135-0x0000000000000000-mapping.dmp

          • memory/4988-153-0x0000000000000000-mapping.dmp