Analysis

  • max time kernel
    27s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:34

General

  • Target

    0a7c727d2175d6c778ed8f589935b39a67150f3007acb218eab4b56a07691755.exe

  • Size

    602KB

  • MD5

    1da34bb58a6986329b77e5e104767521

  • SHA1

    a72beecd6f338401f713a6f9e4eedca16237aba5

  • SHA256

    0a7c727d2175d6c778ed8f589935b39a67150f3007acb218eab4b56a07691755

  • SHA512

    734e9490362530c75d45168615fe1686ecc4352a042fec4eff4a6e288938643e846392f867f28d69c9b34aa7cc4a490a62bd95853e1c14bd0aab2bfc3be8146b

  • SSDEEP

    12288:LIny5DYTIDOr+3UfWZanTVUuFZt2yjxk4+ctNLIXO:zUTIDRZZaTau3tNfLz

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a7c727d2175d6c778ed8f589935b39a67150f3007acb218eab4b56a07691755.exe
    "C:\Users\Admin\AppData\Local\Temp\0a7c727d2175d6c778ed8f589935b39a67150f3007acb218eab4b56a07691755.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:1792
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1360
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:1720
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:872
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1320
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:1000
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:584
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:532
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1556
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:316
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1996
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:1748

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            fc805fcd45ea4cbae1515c6b607a5d70

            SHA1

            08b0b10fe0d744bda114c5540544429b2b8d2259

            SHA256

            c912373feda08f661d72218521f8c6c96b78a42b2a119eef7812612ef113ecb3

            SHA512

            671943bdd180cfd9c3858695d91f63733568dc033c5f52d729d46584cf6ceb7f46869d848c7a612079de4c3163ea99cfb390050d6483772111d85091dd751152

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            809e1034f40a5782540830327083b344

            SHA1

            775042d61e870e1318bbb9536ef91e5e8b924045

            SHA256

            793b8443ec353365d799b51dba5114acd2d87fd142b197a0aa7b4586bca1955f

            SHA512

            7c27c58f97e562bd627db7120b1eb57a23e3d0fe43b7b789e04ed79c69f76c7e7e8321f28bb3a2cfffcf931dc166b8ccaab59b88386908b88c5094deb2cc16a7

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            2be7b9f6bbf651f06054e41bf44d801b

            SHA1

            3592c66dfa97a6e81fb2557e90bc5ae61fe42356

            SHA256

            99ac31f79848d5627720056f1a3f62862d00bb76d893f99f2ff260dd3b61726d

            SHA512

            83b361900e641b89f8504f3964f837cc41132b22b1fb1671cc9e4c7125ae7642098cb6b358e35dc03a784d111e9160915615cab97f0fa7e68c2582e36451cbb0

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            5efe3846212047685746d200c8ec9a69

            SHA1

            ae3abbe7fe4781e1c6c53bd61115a9dfb7e61cf8

            SHA256

            ec5ffe3184bba0bad3ac1484e411ce66a26ef7921e60cdf311874ecd7582b07b

            SHA512

            92614c2798cf0a0f5432886f9c2a9a5b4bd89464ca6854b4f58d32b345b2dce0266d8d275c4e491183f8e426254efa7d2bc2eeb36dd50430a1a3df9ef7c45371

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            5efe3846212047685746d200c8ec9a69

            SHA1

            ae3abbe7fe4781e1c6c53bd61115a9dfb7e61cf8

            SHA256

            ec5ffe3184bba0bad3ac1484e411ce66a26ef7921e60cdf311874ecd7582b07b

            SHA512

            92614c2798cf0a0f5432886f9c2a9a5b4bd89464ca6854b4f58d32b345b2dce0266d8d275c4e491183f8e426254efa7d2bc2eeb36dd50430a1a3df9ef7c45371

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            358b48062532794ec5c3de8d86790104

            SHA1

            89463607a66b7f33d5d3e0a1624b7ae0c1797115

            SHA256

            fbbd4a3e9d01b1e58c8c2df83acd42143dd53b017c0c0fee3940951b57966836

            SHA512

            13240679b837e5fb2c168f4a1f387893dc52f6dd735bda5d8abea63739f8063433e67a0bd8a4572fb19ee57df5f6e96cfd72dd15bb83822cf0974485791831c2

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            358b48062532794ec5c3de8d86790104

            SHA1

            89463607a66b7f33d5d3e0a1624b7ae0c1797115

            SHA256

            fbbd4a3e9d01b1e58c8c2df83acd42143dd53b017c0c0fee3940951b57966836

            SHA512

            13240679b837e5fb2c168f4a1f387893dc52f6dd735bda5d8abea63739f8063433e67a0bd8a4572fb19ee57df5f6e96cfd72dd15bb83822cf0974485791831c2

          • \Users\Admin\AppData\Local\Temp\nst3BDB.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • \Users\Admin\AppData\Local\Temp\nst3BDB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nst3BDB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nst3BDB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nst3BDB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            fc805fcd45ea4cbae1515c6b607a5d70

            SHA1

            08b0b10fe0d744bda114c5540544429b2b8d2259

            SHA256

            c912373feda08f661d72218521f8c6c96b78a42b2a119eef7812612ef113ecb3

            SHA512

            671943bdd180cfd9c3858695d91f63733568dc033c5f52d729d46584cf6ceb7f46869d848c7a612079de4c3163ea99cfb390050d6483772111d85091dd751152

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            fc805fcd45ea4cbae1515c6b607a5d70

            SHA1

            08b0b10fe0d744bda114c5540544429b2b8d2259

            SHA256

            c912373feda08f661d72218521f8c6c96b78a42b2a119eef7812612ef113ecb3

            SHA512

            671943bdd180cfd9c3858695d91f63733568dc033c5f52d729d46584cf6ceb7f46869d848c7a612079de4c3163ea99cfb390050d6483772111d85091dd751152

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            fc805fcd45ea4cbae1515c6b607a5d70

            SHA1

            08b0b10fe0d744bda114c5540544429b2b8d2259

            SHA256

            c912373feda08f661d72218521f8c6c96b78a42b2a119eef7812612ef113ecb3

            SHA512

            671943bdd180cfd9c3858695d91f63733568dc033c5f52d729d46584cf6ceb7f46869d848c7a612079de4c3163ea99cfb390050d6483772111d85091dd751152

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            809e1034f40a5782540830327083b344

            SHA1

            775042d61e870e1318bbb9536ef91e5e8b924045

            SHA256

            793b8443ec353365d799b51dba5114acd2d87fd142b197a0aa7b4586bca1955f

            SHA512

            7c27c58f97e562bd627db7120b1eb57a23e3d0fe43b7b789e04ed79c69f76c7e7e8321f28bb3a2cfffcf931dc166b8ccaab59b88386908b88c5094deb2cc16a7

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            809e1034f40a5782540830327083b344

            SHA1

            775042d61e870e1318bbb9536ef91e5e8b924045

            SHA256

            793b8443ec353365d799b51dba5114acd2d87fd142b197a0aa7b4586bca1955f

            SHA512

            7c27c58f97e562bd627db7120b1eb57a23e3d0fe43b7b789e04ed79c69f76c7e7e8321f28bb3a2cfffcf931dc166b8ccaab59b88386908b88c5094deb2cc16a7

          • \Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            2be7b9f6bbf651f06054e41bf44d801b

            SHA1

            3592c66dfa97a6e81fb2557e90bc5ae61fe42356

            SHA256

            99ac31f79848d5627720056f1a3f62862d00bb76d893f99f2ff260dd3b61726d

            SHA512

            83b361900e641b89f8504f3964f837cc41132b22b1fb1671cc9e4c7125ae7642098cb6b358e35dc03a784d111e9160915615cab97f0fa7e68c2582e36451cbb0

          • \Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            5efe3846212047685746d200c8ec9a69

            SHA1

            ae3abbe7fe4781e1c6c53bd61115a9dfb7e61cf8

            SHA256

            ec5ffe3184bba0bad3ac1484e411ce66a26ef7921e60cdf311874ecd7582b07b

            SHA512

            92614c2798cf0a0f5432886f9c2a9a5b4bd89464ca6854b4f58d32b345b2dce0266d8d275c4e491183f8e426254efa7d2bc2eeb36dd50430a1a3df9ef7c45371

          • \Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            358b48062532794ec5c3de8d86790104

            SHA1

            89463607a66b7f33d5d3e0a1624b7ae0c1797115

            SHA256

            fbbd4a3e9d01b1e58c8c2df83acd42143dd53b017c0c0fee3940951b57966836

            SHA512

            13240679b837e5fb2c168f4a1f387893dc52f6dd735bda5d8abea63739f8063433e67a0bd8a4572fb19ee57df5f6e96cfd72dd15bb83822cf0974485791831c2

          • memory/316-87-0x0000000000000000-mapping.dmp

          • memory/532-81-0x0000000000000000-mapping.dmp

          • memory/584-80-0x0000000000000000-mapping.dmp

          • memory/872-64-0x0000000000000000-mapping.dmp

          • memory/1000-76-0x0000000000000000-mapping.dmp

          • memory/1320-70-0x0000000000000000-mapping.dmp

          • memory/1360-61-0x0000000000000000-mapping.dmp

          • memory/1536-58-0x0000000000000000-mapping.dmp

          • memory/1556-86-0x0000000000000000-mapping.dmp

          • memory/1628-54-0x0000000075831000-0x0000000075833000-memory.dmp

            Filesize

            8KB

          • memory/1628-55-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1628-90-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1720-62-0x0000000000000000-mapping.dmp

          • memory/1792-59-0x0000000000000000-mapping.dmp