Analysis

  • max time kernel
    60s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:31

General

  • Target

    24199b630c1dcd066708a88ec6ba03dcd613a745451d87a78a77dbe73c4faf75.exe

  • Size

    601KB

  • MD5

    b48caec0eefabb8d674226aa8070cd2e

  • SHA1

    8ed7f21502ec3aaf2b59a00d96b0921478047a97

  • SHA256

    24199b630c1dcd066708a88ec6ba03dcd613a745451d87a78a77dbe73c4faf75

  • SHA512

    d3589e71abdf23ef0f198766d75c8d08c53a44a38f0d27afed11791a5f706b4779d247ca427db53df948ff187e9b0f145e4d46032767f35bc1dfd071d21d00cb

  • SSDEEP

    12288:mIny5DYTIqXYPL9ijHVg9Z2/MgDMir9Kx1tEcfQOXkDjH50J:IUT3oRmm9Y/PnKvqcJXgG

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24199b630c1dcd066708a88ec6ba03dcd613a745451d87a78a77dbe73c4faf75.exe
    "C:\Users\Admin\AppData\Local\Temp\24199b630c1dcd066708a88ec6ba03dcd613a745451d87a78a77dbe73c4faf75.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:1028
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1344
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:268
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1652
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1572
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:1356
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:860
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:1796
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1708
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:1712
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:864
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:2016

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            37ce09516442fde43aaa23c0a124a6d0

            SHA1

            41b2cffccadf671c60308ab43179007f1eea6e1e

            SHA256

            62ed828948dce429ded2578bd7580cfe826b119ed8396f95e621ed0001d441c7

            SHA512

            c27a78789069eba594cffc97d03cb624fb6f1597659db58cf9d7abc688c13a3f07b65fa1eacb19b277c2e36242c55dec5c2285b32d50211185fb648f8ae6bbbb

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            0259c64e8c2f3a72833e762e87a845b4

            SHA1

            e1c993f1a8fd13fdbaea532735df0850eb30cc8d

            SHA256

            84beb96099262834debc96aeec558d6d1379149f45aff94e60a221c2975e72a2

            SHA512

            bde0af1086fd02b57b9c8919edac6c179b8859d74e1145c6fe1da3005218fcaf37f18715521f0a4c88d4c8de230b4918a5878f0ad8ab6de2605f56f057fb1d88

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            19a135a699c2ea2d9a0fbda6682bfbbb

            SHA1

            539678776d419b6dffbf9051ed5ba51936d27a17

            SHA256

            27b47b10b8448e1749237de5c8fd0fc25443191414108ec267c7bd6b40a2df12

            SHA512

            8330a81f25cd0906245363ab13dfbe6ff7e3ad8fad482f5ba9f4ff4a7a484a855bfd7017817a223a7de48e70fa94af8ba88831a95cb0c1baca1329a0821b7d06

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            5e3f8442158cb6084dbd21bd69656e93

            SHA1

            92ee6396cfdabab426d9978d9199efc5b8758758

            SHA256

            175372275ded2b3b4af1a31ea50a648f867f55ccc76237fd74d991616d29864e

            SHA512

            82dbdea9913dfb55e2041f3f828b88b63d4cf126375feb083a55db2d22557c8d94752c5b94ad3ca29effa74ee91c024f5de7f3448bfe629052df13fe6669860b

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            5e3f8442158cb6084dbd21bd69656e93

            SHA1

            92ee6396cfdabab426d9978d9199efc5b8758758

            SHA256

            175372275ded2b3b4af1a31ea50a648f867f55ccc76237fd74d991616d29864e

            SHA512

            82dbdea9913dfb55e2041f3f828b88b63d4cf126375feb083a55db2d22557c8d94752c5b94ad3ca29effa74ee91c024f5de7f3448bfe629052df13fe6669860b

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            0a7c893c52c4b5d9feaf51a07e692522

            SHA1

            9fbc48a199ef73c5236a8ac0e898b3069b12ac2f

            SHA256

            d3d02983896c6a07478632e5a1d430268a02820cc6c1e64fb93ba18a36a61f03

            SHA512

            9c294785be04190a670d789f47d9e8d8f069b2960d0922ddba42efe119963f98197653e4b3bf255e5fabd6f27a838d951db9ef7a49e0276e9c7b1aa007498fc2

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            0a7c893c52c4b5d9feaf51a07e692522

            SHA1

            9fbc48a199ef73c5236a8ac0e898b3069b12ac2f

            SHA256

            d3d02983896c6a07478632e5a1d430268a02820cc6c1e64fb93ba18a36a61f03

            SHA512

            9c294785be04190a670d789f47d9e8d8f069b2960d0922ddba42efe119963f98197653e4b3bf255e5fabd6f27a838d951db9ef7a49e0276e9c7b1aa007498fc2

          • \Users\Admin\AppData\Local\Temp\nst39B9.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • \Users\Admin\AppData\Local\Temp\nst39B9.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nst39B9.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nst39B9.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nst39B9.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            37ce09516442fde43aaa23c0a124a6d0

            SHA1

            41b2cffccadf671c60308ab43179007f1eea6e1e

            SHA256

            62ed828948dce429ded2578bd7580cfe826b119ed8396f95e621ed0001d441c7

            SHA512

            c27a78789069eba594cffc97d03cb624fb6f1597659db58cf9d7abc688c13a3f07b65fa1eacb19b277c2e36242c55dec5c2285b32d50211185fb648f8ae6bbbb

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            37ce09516442fde43aaa23c0a124a6d0

            SHA1

            41b2cffccadf671c60308ab43179007f1eea6e1e

            SHA256

            62ed828948dce429ded2578bd7580cfe826b119ed8396f95e621ed0001d441c7

            SHA512

            c27a78789069eba594cffc97d03cb624fb6f1597659db58cf9d7abc688c13a3f07b65fa1eacb19b277c2e36242c55dec5c2285b32d50211185fb648f8ae6bbbb

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            37ce09516442fde43aaa23c0a124a6d0

            SHA1

            41b2cffccadf671c60308ab43179007f1eea6e1e

            SHA256

            62ed828948dce429ded2578bd7580cfe826b119ed8396f95e621ed0001d441c7

            SHA512

            c27a78789069eba594cffc97d03cb624fb6f1597659db58cf9d7abc688c13a3f07b65fa1eacb19b277c2e36242c55dec5c2285b32d50211185fb648f8ae6bbbb

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            0259c64e8c2f3a72833e762e87a845b4

            SHA1

            e1c993f1a8fd13fdbaea532735df0850eb30cc8d

            SHA256

            84beb96099262834debc96aeec558d6d1379149f45aff94e60a221c2975e72a2

            SHA512

            bde0af1086fd02b57b9c8919edac6c179b8859d74e1145c6fe1da3005218fcaf37f18715521f0a4c88d4c8de230b4918a5878f0ad8ab6de2605f56f057fb1d88

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            0259c64e8c2f3a72833e762e87a845b4

            SHA1

            e1c993f1a8fd13fdbaea532735df0850eb30cc8d

            SHA256

            84beb96099262834debc96aeec558d6d1379149f45aff94e60a221c2975e72a2

            SHA512

            bde0af1086fd02b57b9c8919edac6c179b8859d74e1145c6fe1da3005218fcaf37f18715521f0a4c88d4c8de230b4918a5878f0ad8ab6de2605f56f057fb1d88

          • \Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            19a135a699c2ea2d9a0fbda6682bfbbb

            SHA1

            539678776d419b6dffbf9051ed5ba51936d27a17

            SHA256

            27b47b10b8448e1749237de5c8fd0fc25443191414108ec267c7bd6b40a2df12

            SHA512

            8330a81f25cd0906245363ab13dfbe6ff7e3ad8fad482f5ba9f4ff4a7a484a855bfd7017817a223a7de48e70fa94af8ba88831a95cb0c1baca1329a0821b7d06

          • \Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            5e3f8442158cb6084dbd21bd69656e93

            SHA1

            92ee6396cfdabab426d9978d9199efc5b8758758

            SHA256

            175372275ded2b3b4af1a31ea50a648f867f55ccc76237fd74d991616d29864e

            SHA512

            82dbdea9913dfb55e2041f3f828b88b63d4cf126375feb083a55db2d22557c8d94752c5b94ad3ca29effa74ee91c024f5de7f3448bfe629052df13fe6669860b

          • \Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            0a7c893c52c4b5d9feaf51a07e692522

            SHA1

            9fbc48a199ef73c5236a8ac0e898b3069b12ac2f

            SHA256

            d3d02983896c6a07478632e5a1d430268a02820cc6c1e64fb93ba18a36a61f03

            SHA512

            9c294785be04190a670d789f47d9e8d8f069b2960d0922ddba42efe119963f98197653e4b3bf255e5fabd6f27a838d951db9ef7a49e0276e9c7b1aa007498fc2

          • memory/268-62-0x0000000000000000-mapping.dmp

          • memory/860-81-0x0000000000000000-mapping.dmp

          • memory/1028-59-0x0000000000000000-mapping.dmp

          • memory/1136-57-0x0000000000000000-mapping.dmp

          • memory/1236-54-0x0000000075011000-0x0000000075013000-memory.dmp

            Filesize

            8KB

          • memory/1236-91-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1236-63-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1236-58-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1344-61-0x0000000000000000-mapping.dmp

          • memory/1356-77-0x0000000000000000-mapping.dmp

          • memory/1572-71-0x0000000000000000-mapping.dmp

          • memory/1652-65-0x0000000000000000-mapping.dmp

          • memory/1708-87-0x0000000000000000-mapping.dmp

          • memory/1712-88-0x0000000000000000-mapping.dmp

          • memory/1796-82-0x0000000000000000-mapping.dmp