Analysis

  • max time kernel
    151s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:28

General

  • Target

    40bbe3bb6a258ba756b84c2917d3dade4db75b6f8ae6c48ce9eda3d20ee7acb6.exe

  • Size

    603KB

  • MD5

    96a9835bbd3a5687c5561551891a061f

  • SHA1

    6e5d6109da6c688b2dba5afb7042a12d65f0d10b

  • SHA256

    40bbe3bb6a258ba756b84c2917d3dade4db75b6f8ae6c48ce9eda3d20ee7acb6

  • SHA512

    460454c53c74c1e2e8bab87f07d9d05a24ba38c67be01889d80def232cccf9e0b965c30c68a3088570d8cbfa1c2f05caec4dd8ddc178b5b397627e35e39f31af

  • SSDEEP

    12288:fSIny5DYTQIp1QoLus4+nyPfbfCO9GTAfL8OllDluu5dLmH:MUTQOPLuCm9GcAmF5

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40bbe3bb6a258ba756b84c2917d3dade4db75b6f8ae6c48ce9eda3d20ee7acb6.exe
    "C:\Users\Admin\AppData\Local\Temp\40bbe3bb6a258ba756b84c2917d3dade4db75b6f8ae6c48ce9eda3d20ee7acb6.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3812
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:4136
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:316
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:4876
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1492
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1020
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:2220
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2892
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:1896
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1340
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:64
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:2964
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:1892

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsb2FBD.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nsb2FBD.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsb2FBD.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsb2FBD.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsb2FBD.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsb2FBD.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsb2FBD.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsb2FBD.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsb2FBD.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            6b366fd5b31e8411e2c0cbc9454b275d

            SHA1

            55aee7b30f1993ec47784d6dd60b080593f14515

            SHA256

            352fc52e9801df372f59b98a33da9a1c700f2b0a70a97e0c805e45341591067d

            SHA512

            f65d3bef1e25c81e065735de2f1c922943b8710641ed821118dbea8c43794f6f86758566c5085b536d4d830787e6a5482e55bfe1293491d56a4460a57d08e6d2

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            6b366fd5b31e8411e2c0cbc9454b275d

            SHA1

            55aee7b30f1993ec47784d6dd60b080593f14515

            SHA256

            352fc52e9801df372f59b98a33da9a1c700f2b0a70a97e0c805e45341591067d

            SHA512

            f65d3bef1e25c81e065735de2f1c922943b8710641ed821118dbea8c43794f6f86758566c5085b536d4d830787e6a5482e55bfe1293491d56a4460a57d08e6d2

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            6b366fd5b31e8411e2c0cbc9454b275d

            SHA1

            55aee7b30f1993ec47784d6dd60b080593f14515

            SHA256

            352fc52e9801df372f59b98a33da9a1c700f2b0a70a97e0c805e45341591067d

            SHA512

            f65d3bef1e25c81e065735de2f1c922943b8710641ed821118dbea8c43794f6f86758566c5085b536d4d830787e6a5482e55bfe1293491d56a4460a57d08e6d2

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            6b366fd5b31e8411e2c0cbc9454b275d

            SHA1

            55aee7b30f1993ec47784d6dd60b080593f14515

            SHA256

            352fc52e9801df372f59b98a33da9a1c700f2b0a70a97e0c805e45341591067d

            SHA512

            f65d3bef1e25c81e065735de2f1c922943b8710641ed821118dbea8c43794f6f86758566c5085b536d4d830787e6a5482e55bfe1293491d56a4460a57d08e6d2

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            887e181ad7acff2d4886f5b2e3a3acd8

            SHA1

            c625ad677d8a3518fdd9886b9b70aaaaed5abdd1

            SHA256

            76d83749a2bbf0da6f73bf701db403b4437327799293f1b4ebda1a2b3397b940

            SHA512

            353dcc42a01320f4ec6da85b57e14dd999c17271b886d7da594499ab95b83476554803031d34aa095b1249e57b2c393b5874ed47f3bed84ba1961b590199474a

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            887e181ad7acff2d4886f5b2e3a3acd8

            SHA1

            c625ad677d8a3518fdd9886b9b70aaaaed5abdd1

            SHA256

            76d83749a2bbf0da6f73bf701db403b4437327799293f1b4ebda1a2b3397b940

            SHA512

            353dcc42a01320f4ec6da85b57e14dd999c17271b886d7da594499ab95b83476554803031d34aa095b1249e57b2c393b5874ed47f3bed84ba1961b590199474a

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            887e181ad7acff2d4886f5b2e3a3acd8

            SHA1

            c625ad677d8a3518fdd9886b9b70aaaaed5abdd1

            SHA256

            76d83749a2bbf0da6f73bf701db403b4437327799293f1b4ebda1a2b3397b940

            SHA512

            353dcc42a01320f4ec6da85b57e14dd999c17271b886d7da594499ab95b83476554803031d34aa095b1249e57b2c393b5874ed47f3bed84ba1961b590199474a

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            52ad4b4203de2bd4c90f075280018035

            SHA1

            702dac38f630a4c8172722dd85719306c0de7ded

            SHA256

            1d883ab80d3fc2deed21338121075bfd174df1592d6a71f0c7badcf719d4c980

            SHA512

            94d95ac52445dd975388c7f7f1a3efb8b7caa5e64f818aa743e9900025c5fb37fc2c3e38cb7dc84be61bc0e4e48d6f12f087475d971f51f3304eebaeaf22afa3

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            52ad4b4203de2bd4c90f075280018035

            SHA1

            702dac38f630a4c8172722dd85719306c0de7ded

            SHA256

            1d883ab80d3fc2deed21338121075bfd174df1592d6a71f0c7badcf719d4c980

            SHA512

            94d95ac52445dd975388c7f7f1a3efb8b7caa5e64f818aa743e9900025c5fb37fc2c3e38cb7dc84be61bc0e4e48d6f12f087475d971f51f3304eebaeaf22afa3

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            502c70f928f7597fb407b34ad68dbe4c

            SHA1

            c2a4c4b192502b2facfde8994a3bef8cad923b82

            SHA256

            9815d1f33447cbe3e628a668d01e4af03462e2e0fdbc309d523515dd7b601e1c

            SHA512

            9c5a71003358eb6470ff207310d0e8fc27392179300da8ec3d022fbed9b0ea37fb742e787107f2c2003372e5557476bfdb18e0b76748c199ee8ee96cfcb92d08

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            502c70f928f7597fb407b34ad68dbe4c

            SHA1

            c2a4c4b192502b2facfde8994a3bef8cad923b82

            SHA256

            9815d1f33447cbe3e628a668d01e4af03462e2e0fdbc309d523515dd7b601e1c

            SHA512

            9c5a71003358eb6470ff207310d0e8fc27392179300da8ec3d022fbed9b0ea37fb742e787107f2c2003372e5557476bfdb18e0b76748c199ee8ee96cfcb92d08

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            502c70f928f7597fb407b34ad68dbe4c

            SHA1

            c2a4c4b192502b2facfde8994a3bef8cad923b82

            SHA256

            9815d1f33447cbe3e628a668d01e4af03462e2e0fdbc309d523515dd7b601e1c

            SHA512

            9c5a71003358eb6470ff207310d0e8fc27392179300da8ec3d022fbed9b0ea37fb742e787107f2c2003372e5557476bfdb18e0b76748c199ee8ee96cfcb92d08

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            28eb03d67ea7f37bd56777d3d4353833

            SHA1

            aec89b4223c1cc2516c589c3818760e25f6c0a15

            SHA256

            1fdb009f2c42ad076d12fb01003a72f0db5348b0a5414d6822bdb00fbb6163f3

            SHA512

            a09021c4605cdb850ee58e24091732899317157abe89a67807ad296aed0d16e27bddceb4ab7994759c16d996286851910a39a120a36a146544a2d3089410a6ae

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            28eb03d67ea7f37bd56777d3d4353833

            SHA1

            aec89b4223c1cc2516c589c3818760e25f6c0a15

            SHA256

            1fdb009f2c42ad076d12fb01003a72f0db5348b0a5414d6822bdb00fbb6163f3

            SHA512

            a09021c4605cdb850ee58e24091732899317157abe89a67807ad296aed0d16e27bddceb4ab7994759c16d996286851910a39a120a36a146544a2d3089410a6ae

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            28eb03d67ea7f37bd56777d3d4353833

            SHA1

            aec89b4223c1cc2516c589c3818760e25f6c0a15

            SHA256

            1fdb009f2c42ad076d12fb01003a72f0db5348b0a5414d6822bdb00fbb6163f3

            SHA512

            a09021c4605cdb850ee58e24091732899317157abe89a67807ad296aed0d16e27bddceb4ab7994759c16d996286851910a39a120a36a146544a2d3089410a6ae

          • memory/64-166-0x0000000000000000-mapping.dmp

          • memory/316-140-0x0000000000000000-mapping.dmp

          • memory/1020-147-0x0000000000000000-mapping.dmp

          • memory/1340-165-0x0000000000000000-mapping.dmp

          • memory/1492-142-0x0000000000000000-mapping.dmp

          • memory/1896-159-0x0000000000000000-mapping.dmp

          • memory/1928-136-0x0000000000000000-mapping.dmp

          • memory/2220-153-0x0000000000000000-mapping.dmp

          • memory/2892-158-0x0000000000000000-mapping.dmp

          • memory/3812-132-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/3812-168-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/4136-137-0x0000000000000000-mapping.dmp

          • memory/4876-141-0x0000000000000000-mapping.dmp