Analysis

  • max time kernel
    33s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:30

General

  • Target

    2a3573c87fb619c432eb87cf0cf8f3cdb0406a9a07ee39d04c299d848728035d.exe

  • Size

    602KB

  • MD5

    360c6b8a155d1944265377947d60d67c

  • SHA1

    331eb382101c8d1084bf67ad42fde38ee97a1a20

  • SHA256

    2a3573c87fb619c432eb87cf0cf8f3cdb0406a9a07ee39d04c299d848728035d

  • SHA512

    649d45d03555c985f042f93c522982f30b3c9bf87ce01bce1b88de70dae0d772c66874e08a8b8be2bfe04f9360549754bd14fc17f1bba0f5dcf0ac652870444b

  • SSDEEP

    12288:oIny5DYTjw3OexNzeGFuVSqq+SjeIKYzt5IYzeMlonpTFBq:mUTjyOerCiL+SjEIt5PiMKpT

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a3573c87fb619c432eb87cf0cf8f3cdb0406a9a07ee39d04c299d848728035d.exe
    "C:\Users\Admin\AppData\Local\Temp\2a3573c87fb619c432eb87cf0cf8f3cdb0406a9a07ee39d04c299d848728035d.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1496
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:888
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:1272
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1552
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:1304
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1064
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1276
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:1672
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:568
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:428
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1012
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:1212
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:652
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:1840

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Discovery

          Query Registry

          1
          T1012

          System Information Discovery

          1
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\hfnapi.dll
            Filesize

            106KB

            MD5

            66c3d7dfd86d838880f301a1304ba228

            SHA1

            bdb0d08ef6f2d7cebc98d74e9d94551f47a47f5d

            SHA256

            ba4a63a57a874d2b164a4179d7a18a45d461cd55d2582b60473e6d57fd629c48

            SHA512

            f0efb715b619b783ef5c4f03cb6345c5a91b9040cb041a071d3dd79be167ac16fcccdaaf3afc3f0ef2882ad45d26f1d4adba5eb4979794d0a1ebd84d981de486

          • C:\Windows\SysWOW64\hfpapi.dll
            Filesize

            241KB

            MD5

            db09025d13b7487ba51b154cd90a42eb

            SHA1

            e686cfa4d7ef2d160c7485b819ab3859a27fc6e2

            SHA256

            0bf805ff907485cdba5cf964f14d445fe55a2cfb51d298c0e8d1118cfb3c4ffd

            SHA512

            f91a1ba2ea58acc73acc46e53b770fdbfcfea5434fb9d725b7ecdf93db10ec45ad5399b3c3137ea0dcfc6c9c22e4ffb8910f556164365ab060cd512efadd0e87

          • C:\Windows\SysWOW64\installd.exe
            Filesize

            108KB

            MD5

            c8bb9b68aa8903ee2f2eeb55f139cb8b

            SHA1

            fae2cd0ceb5d9181103309fae54827e38cf6b657

            SHA256

            ef14a524398e6bcb4d2c317047886ebd56d40c5e9880bcd8ea483b5199bd26d2

            SHA512

            7b399cc3e727bf2571ba130c0d9ca2ec6145c07dc9df253aaae87e243285057aa357967f93219aa9414b08732ab1417f6ac89967608a309c7e542a179dd996c9

          • C:\Windows\SysWOW64\nethtsrv.exe
            Filesize

            176KB

            MD5

            ccefe2efb38832d5dda56167b454ad28

            SHA1

            88c975a225bb24c8009307c610e932fe7411b77e

            SHA256

            c755cd3750cd212f328e4332b2df6bc3497c685656009c1c8fcc9e531c3850f6

            SHA512

            8079835b2b3f7fa1a30449a35abd73120b416560111837bbf4dfa7339f49df2d1bef45723490a7867b6edeff8f1bfd03be0a682e8a891ed14750fd375729f5ec

          • C:\Windows\SysWOW64\nethtsrv.exe
            Filesize

            176KB

            MD5

            ccefe2efb38832d5dda56167b454ad28

            SHA1

            88c975a225bb24c8009307c610e932fe7411b77e

            SHA256

            c755cd3750cd212f328e4332b2df6bc3497c685656009c1c8fcc9e531c3850f6

            SHA512

            8079835b2b3f7fa1a30449a35abd73120b416560111837bbf4dfa7339f49df2d1bef45723490a7867b6edeff8f1bfd03be0a682e8a891ed14750fd375729f5ec

          • C:\Windows\SysWOW64\netupdsrv.exe
            Filesize

            159KB

            MD5

            58220e993b255a8ec171b0cf4e74101a

            SHA1

            3583e19cfd7ca9e1c0f56180dbfb1724bd3598bd

            SHA256

            3b9d0231619fd6c2e4e53ec73275e0db9dad58f1764c4de13c1fb82a8e5bee24

            SHA512

            057a1f2d1f0e0fb22b7c68e4dd42d0e2ef526172fa137012d788c8ccc2a21bb32e5656d32c85380623359bf98f46166c6baa77f8992ab6f1b2c54739fec62491

          • C:\Windows\SysWOW64\netupdsrv.exe
            Filesize

            159KB

            MD5

            58220e993b255a8ec171b0cf4e74101a

            SHA1

            3583e19cfd7ca9e1c0f56180dbfb1724bd3598bd

            SHA256

            3b9d0231619fd6c2e4e53ec73275e0db9dad58f1764c4de13c1fb82a8e5bee24

            SHA512

            057a1f2d1f0e0fb22b7c68e4dd42d0e2ef526172fa137012d788c8ccc2a21bb32e5656d32c85380623359bf98f46166c6baa77f8992ab6f1b2c54739fec62491

          • \Users\Admin\AppData\Local\Temp\nsiE84.tmp\System.dll
            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • \Users\Admin\AppData\Local\Temp\nsiE84.tmp\nsExec.dll
            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsiE84.tmp\nsExec.dll
            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsiE84.tmp\nsExec.dll
            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsiE84.tmp\nsExec.dll
            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Windows\SysWOW64\hfnapi.dll
            Filesize

            106KB

            MD5

            66c3d7dfd86d838880f301a1304ba228

            SHA1

            bdb0d08ef6f2d7cebc98d74e9d94551f47a47f5d

            SHA256

            ba4a63a57a874d2b164a4179d7a18a45d461cd55d2582b60473e6d57fd629c48

            SHA512

            f0efb715b619b783ef5c4f03cb6345c5a91b9040cb041a071d3dd79be167ac16fcccdaaf3afc3f0ef2882ad45d26f1d4adba5eb4979794d0a1ebd84d981de486

          • \Windows\SysWOW64\hfnapi.dll
            Filesize

            106KB

            MD5

            66c3d7dfd86d838880f301a1304ba228

            SHA1

            bdb0d08ef6f2d7cebc98d74e9d94551f47a47f5d

            SHA256

            ba4a63a57a874d2b164a4179d7a18a45d461cd55d2582b60473e6d57fd629c48

            SHA512

            f0efb715b619b783ef5c4f03cb6345c5a91b9040cb041a071d3dd79be167ac16fcccdaaf3afc3f0ef2882ad45d26f1d4adba5eb4979794d0a1ebd84d981de486

          • \Windows\SysWOW64\hfnapi.dll
            Filesize

            106KB

            MD5

            66c3d7dfd86d838880f301a1304ba228

            SHA1

            bdb0d08ef6f2d7cebc98d74e9d94551f47a47f5d

            SHA256

            ba4a63a57a874d2b164a4179d7a18a45d461cd55d2582b60473e6d57fd629c48

            SHA512

            f0efb715b619b783ef5c4f03cb6345c5a91b9040cb041a071d3dd79be167ac16fcccdaaf3afc3f0ef2882ad45d26f1d4adba5eb4979794d0a1ebd84d981de486

          • \Windows\SysWOW64\hfpapi.dll
            Filesize

            241KB

            MD5

            db09025d13b7487ba51b154cd90a42eb

            SHA1

            e686cfa4d7ef2d160c7485b819ab3859a27fc6e2

            SHA256

            0bf805ff907485cdba5cf964f14d445fe55a2cfb51d298c0e8d1118cfb3c4ffd

            SHA512

            f91a1ba2ea58acc73acc46e53b770fdbfcfea5434fb9d725b7ecdf93db10ec45ad5399b3c3137ea0dcfc6c9c22e4ffb8910f556164365ab060cd512efadd0e87

          • \Windows\SysWOW64\hfpapi.dll
            Filesize

            241KB

            MD5

            db09025d13b7487ba51b154cd90a42eb

            SHA1

            e686cfa4d7ef2d160c7485b819ab3859a27fc6e2

            SHA256

            0bf805ff907485cdba5cf964f14d445fe55a2cfb51d298c0e8d1118cfb3c4ffd

            SHA512

            f91a1ba2ea58acc73acc46e53b770fdbfcfea5434fb9d725b7ecdf93db10ec45ad5399b3c3137ea0dcfc6c9c22e4ffb8910f556164365ab060cd512efadd0e87

          • \Windows\SysWOW64\installd.exe
            Filesize

            108KB

            MD5

            c8bb9b68aa8903ee2f2eeb55f139cb8b

            SHA1

            fae2cd0ceb5d9181103309fae54827e38cf6b657

            SHA256

            ef14a524398e6bcb4d2c317047886ebd56d40c5e9880bcd8ea483b5199bd26d2

            SHA512

            7b399cc3e727bf2571ba130c0d9ca2ec6145c07dc9df253aaae87e243285057aa357967f93219aa9414b08732ab1417f6ac89967608a309c7e542a179dd996c9

          • \Windows\SysWOW64\nethtsrv.exe
            Filesize

            176KB

            MD5

            ccefe2efb38832d5dda56167b454ad28

            SHA1

            88c975a225bb24c8009307c610e932fe7411b77e

            SHA256

            c755cd3750cd212f328e4332b2df6bc3497c685656009c1c8fcc9e531c3850f6

            SHA512

            8079835b2b3f7fa1a30449a35abd73120b416560111837bbf4dfa7339f49df2d1bef45723490a7867b6edeff8f1bfd03be0a682e8a891ed14750fd375729f5ec

          • \Windows\SysWOW64\netupdsrv.exe
            Filesize

            159KB

            MD5

            58220e993b255a8ec171b0cf4e74101a

            SHA1

            3583e19cfd7ca9e1c0f56180dbfb1724bd3598bd

            SHA256

            3b9d0231619fd6c2e4e53ec73275e0db9dad58f1764c4de13c1fb82a8e5bee24

            SHA512

            057a1f2d1f0e0fb22b7c68e4dd42d0e2ef526172fa137012d788c8ccc2a21bb32e5656d32c85380623359bf98f46166c6baa77f8992ab6f1b2c54739fec62491

          • memory/428-81-0x0000000000000000-mapping.dmp
          • memory/568-80-0x0000000000000000-mapping.dmp
          • memory/888-57-0x0000000000000000-mapping.dmp
          • memory/1012-86-0x0000000000000000-mapping.dmp
          • memory/1064-64-0x0000000000000000-mapping.dmp
          • memory/1212-87-0x0000000000000000-mapping.dmp
          • memory/1272-59-0x0000000000000000-mapping.dmp
          • memory/1276-70-0x0000000000000000-mapping.dmp
          • memory/1304-62-0x0000000000000000-mapping.dmp
          • memory/1496-54-0x00000000761F1000-0x00000000761F3000-memory.dmp
            Filesize

            8KB

          • memory/1496-58-0x0000000000360000-0x00000000007BE000-memory.dmp
            Filesize

            4.4MB

          • memory/1496-90-0x0000000000360000-0x00000000007BE000-memory.dmp
            Filesize

            4.4MB

          • memory/1552-61-0x0000000000000000-mapping.dmp
          • memory/1672-76-0x0000000000000000-mapping.dmp