Analysis

  • max time kernel
    96s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:33

General

  • Target

    0df9df38ea032b19ad0867f3509b02ceb8795836f03cce8df197d2b146f839b3.exe

  • Size

    601KB

  • MD5

    f0c378664f2789292a0bea401985541e

  • SHA1

    a22766bed9333ac5a1b0c075aafbcdcf93c11ed4

  • SHA256

    0df9df38ea032b19ad0867f3509b02ceb8795836f03cce8df197d2b146f839b3

  • SHA512

    05720a56530bb91f5cfbbd850fb1f52f4cfb05e456c0b28afefc1d267a0abfa1d353d4829dbd46eb3ffc417c0ce22bdb4e2482052ccf4ce951c3d16f709e9c3b

  • SSDEEP

    12288:QIny5DYTDqAw8Dz6Rpu8iQzrBQLyLkgQdPYnNDY:uUTDqZYscszy+L4PoNDY

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0df9df38ea032b19ad0867f3509b02ceb8795836f03cce8df197d2b146f839b3.exe
    "C:\Users\Admin\AppData\Local\Temp\0df9df38ea032b19ad0867f3509b02ceb8795836f03cce8df197d2b146f839b3.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:840
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1184
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:2024
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2000
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1548
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:972
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1972
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:572
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:532
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:1076
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:432
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:1072

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            3006b9dea5c5a60822e12e5ba64848f5

            SHA1

            59b3c64a2e0e0b88ec15ba1b0d9956bb772fcc2b

            SHA256

            6554590a19403ef8fd6378b299721cd1aea52ff93636fadcad3fa3e021ba7dbf

            SHA512

            e3c4295bc96d4188b80a5685d43ed636dea40e226481638da8634000eda8a34e228c6493c2dd73f56cef98822f1cf7c6f5e0a97cba390cdffe5ed947dcd775d6

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            b236cd126c4ed8bbc3a1de66cab68403

            SHA1

            92740193a72b669eef4a80c66d7248f462dd1a61

            SHA256

            6b775afc5437a6c6b11b81709bce64c1cfcaef21c0cfd133bf6799609bbb0ca4

            SHA512

            bbe91b65b3fae05ce0fb29d6a17bdd10eedcda3b26ed523122f619f0e228a9592ef421bf537470fcdeafb546b16f57e7f14b2240ecc3086f3aa781ca4751ba63

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            e206912fe52e3ddd6771573a6dc79ba5

            SHA1

            3c6342c44dec1bb2e8fc9048869a1b1766e1e524

            SHA256

            e9390a8db48cbebbaef566d083f7439c0cac9bd7fa687f6e86068bca6d9cf9b1

            SHA512

            19047cc97511350e5684fa4407b0529d186a4cef1a8302786eaeca568240a792d61c5462cd811cfb3a9621d0ca0bb5122ec5782facdc43e652b502a12e9cedcd

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            f216240caeab4c6bda1511ad9b0f08a0

            SHA1

            b7456ab2783bc4097b3ba1d9baa7b6d4bc8ae8d7

            SHA256

            08b49e6f36a6be11c6b526111e5f0d9a394f6f94f7b0e48fa645e561bf41bf5b

            SHA512

            c87daac0402748311bf94cb9eb7abe7b4a6ad151826cf6e0ecbe82f5286533e497ef56d1bda5c8c8ab22707b2278ef5e14e15da2b566e55b7187f74fc6d12069

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            f216240caeab4c6bda1511ad9b0f08a0

            SHA1

            b7456ab2783bc4097b3ba1d9baa7b6d4bc8ae8d7

            SHA256

            08b49e6f36a6be11c6b526111e5f0d9a394f6f94f7b0e48fa645e561bf41bf5b

            SHA512

            c87daac0402748311bf94cb9eb7abe7b4a6ad151826cf6e0ecbe82f5286533e497ef56d1bda5c8c8ab22707b2278ef5e14e15da2b566e55b7187f74fc6d12069

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            d1a178e7b0b6f17476153223a824fbf1

            SHA1

            925a6a0b645b75b0da911549f1a10925b4b53370

            SHA256

            c9adcdb9077f44679183a30a5760c8493799ec1f510913a9eff28c3141d18da5

            SHA512

            99773f304acf244e7ae3e0a33cd6dd8b091ceb6a1eb80853bf65542e81905485d63415ed9a5925a119781cb810e650091dfb47fac2fa4a27746878aa82e85a61

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            d1a178e7b0b6f17476153223a824fbf1

            SHA1

            925a6a0b645b75b0da911549f1a10925b4b53370

            SHA256

            c9adcdb9077f44679183a30a5760c8493799ec1f510913a9eff28c3141d18da5

            SHA512

            99773f304acf244e7ae3e0a33cd6dd8b091ceb6a1eb80853bf65542e81905485d63415ed9a5925a119781cb810e650091dfb47fac2fa4a27746878aa82e85a61

          • \Users\Admin\AppData\Local\Temp\nsy6F78.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • \Users\Admin\AppData\Local\Temp\nsy6F78.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsy6F78.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsy6F78.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsy6F78.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            3006b9dea5c5a60822e12e5ba64848f5

            SHA1

            59b3c64a2e0e0b88ec15ba1b0d9956bb772fcc2b

            SHA256

            6554590a19403ef8fd6378b299721cd1aea52ff93636fadcad3fa3e021ba7dbf

            SHA512

            e3c4295bc96d4188b80a5685d43ed636dea40e226481638da8634000eda8a34e228c6493c2dd73f56cef98822f1cf7c6f5e0a97cba390cdffe5ed947dcd775d6

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            3006b9dea5c5a60822e12e5ba64848f5

            SHA1

            59b3c64a2e0e0b88ec15ba1b0d9956bb772fcc2b

            SHA256

            6554590a19403ef8fd6378b299721cd1aea52ff93636fadcad3fa3e021ba7dbf

            SHA512

            e3c4295bc96d4188b80a5685d43ed636dea40e226481638da8634000eda8a34e228c6493c2dd73f56cef98822f1cf7c6f5e0a97cba390cdffe5ed947dcd775d6

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            3006b9dea5c5a60822e12e5ba64848f5

            SHA1

            59b3c64a2e0e0b88ec15ba1b0d9956bb772fcc2b

            SHA256

            6554590a19403ef8fd6378b299721cd1aea52ff93636fadcad3fa3e021ba7dbf

            SHA512

            e3c4295bc96d4188b80a5685d43ed636dea40e226481638da8634000eda8a34e228c6493c2dd73f56cef98822f1cf7c6f5e0a97cba390cdffe5ed947dcd775d6

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            b236cd126c4ed8bbc3a1de66cab68403

            SHA1

            92740193a72b669eef4a80c66d7248f462dd1a61

            SHA256

            6b775afc5437a6c6b11b81709bce64c1cfcaef21c0cfd133bf6799609bbb0ca4

            SHA512

            bbe91b65b3fae05ce0fb29d6a17bdd10eedcda3b26ed523122f619f0e228a9592ef421bf537470fcdeafb546b16f57e7f14b2240ecc3086f3aa781ca4751ba63

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            b236cd126c4ed8bbc3a1de66cab68403

            SHA1

            92740193a72b669eef4a80c66d7248f462dd1a61

            SHA256

            6b775afc5437a6c6b11b81709bce64c1cfcaef21c0cfd133bf6799609bbb0ca4

            SHA512

            bbe91b65b3fae05ce0fb29d6a17bdd10eedcda3b26ed523122f619f0e228a9592ef421bf537470fcdeafb546b16f57e7f14b2240ecc3086f3aa781ca4751ba63

          • \Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            e206912fe52e3ddd6771573a6dc79ba5

            SHA1

            3c6342c44dec1bb2e8fc9048869a1b1766e1e524

            SHA256

            e9390a8db48cbebbaef566d083f7439c0cac9bd7fa687f6e86068bca6d9cf9b1

            SHA512

            19047cc97511350e5684fa4407b0529d186a4cef1a8302786eaeca568240a792d61c5462cd811cfb3a9621d0ca0bb5122ec5782facdc43e652b502a12e9cedcd

          • \Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            f216240caeab4c6bda1511ad9b0f08a0

            SHA1

            b7456ab2783bc4097b3ba1d9baa7b6d4bc8ae8d7

            SHA256

            08b49e6f36a6be11c6b526111e5f0d9a394f6f94f7b0e48fa645e561bf41bf5b

            SHA512

            c87daac0402748311bf94cb9eb7abe7b4a6ad151826cf6e0ecbe82f5286533e497ef56d1bda5c8c8ab22707b2278ef5e14e15da2b566e55b7187f74fc6d12069

          • \Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            d1a178e7b0b6f17476153223a824fbf1

            SHA1

            925a6a0b645b75b0da911549f1a10925b4b53370

            SHA256

            c9adcdb9077f44679183a30a5760c8493799ec1f510913a9eff28c3141d18da5

            SHA512

            99773f304acf244e7ae3e0a33cd6dd8b091ceb6a1eb80853bf65542e81905485d63415ed9a5925a119781cb810e650091dfb47fac2fa4a27746878aa82e85a61

          • memory/532-87-0x0000000000000000-mapping.dmp

          • memory/572-82-0x0000000000000000-mapping.dmp

          • memory/840-58-0x0000000000000000-mapping.dmp

          • memory/972-77-0x0000000000000000-mapping.dmp

          • memory/1076-88-0x0000000000000000-mapping.dmp

          • memory/1124-69-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1124-54-0x0000000076401000-0x0000000076403000-memory.dmp

            Filesize

            8KB

          • memory/1124-59-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1124-90-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1184-61-0x0000000000000000-mapping.dmp

          • memory/1548-71-0x0000000000000000-mapping.dmp

          • memory/1624-57-0x0000000000000000-mapping.dmp

          • memory/1972-81-0x0000000000000000-mapping.dmp

          • memory/2000-64-0x0000000000000000-mapping.dmp

          • memory/2024-62-0x0000000000000000-mapping.dmp