Analysis

  • max time kernel
    40s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:35

General

  • Target

    035e24b61f0cc54d1648eeda04595ad08fb3de1193b00a339866903c58aa72ed.exe

  • Size

    602KB

  • MD5

    cf61ccda1442f616e40e3d5119b7296b

  • SHA1

    d5885f07d7cdbe3460bb8703d896a84ea6758089

  • SHA256

    035e24b61f0cc54d1648eeda04595ad08fb3de1193b00a339866903c58aa72ed

  • SHA512

    16f429b8c04cbddd3c9a5f0025a676dc403e3b68e0725a7df4567c5f6bacbe1ca3a0297b8461ba48658d65688ede6e07a1523c8f37278c63b6e3e2cfea12d8d6

  • SSDEEP

    12288:ZIny5DYTcIjDorI/LeKIWYtSv08pYzVuEOUhBNFH3SKw8:VUTcMUrI/LTrs8pYXOy7FRw

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\035e24b61f0cc54d1648eeda04595ad08fb3de1193b00a339866903c58aa72ed.exe
    "C:\Users\Admin\AppData\Local\Temp\035e24b61f0cc54d1648eeda04595ad08fb3de1193b00a339866903c58aa72ed.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:988
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:948
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:2020
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2044
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1640
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:1288
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1972
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:1968
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:820
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:1560
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1964
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:1912

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            3e678e9f1b74cb13e8dca1b381d27f2c

            SHA1

            8f9874b3989526dcefbb90ae5db080ec19d28ea0

            SHA256

            5527a84fa805048902d5de39ca4e1f52f2ff2d9bdedbb161b58fc626118f3d72

            SHA512

            fca2759a8d0fb2d6387c1bc3e594c82c89d707908975b66d70a25f1eafbf9b418d2cfdc2f635d2181a0c7b9e5a53c5bbc5b0ccf6e281724a8e481534fa2f6131

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            d855b0e96a1e013e4b64ecc6232e4b3a

            SHA1

            568b39c3bd61c81f634ecd07ca378caf83dca227

            SHA256

            a0801ba7f16a728067d81deef0fb6cbd12cd4f517ae47db5cb70102c647a2d97

            SHA512

            aa16cf66d0cc5f4c3cf4d4e8b62c9b568236c47e7235d2791d75e50ea6394729a405a499c76a2500046ed107eea74bdfc6d2b461b0a46d37afd8ce5644b87c22

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            1a735526ef12fc2594935d614a7097c3

            SHA1

            f5349237742da542b8022be41c330b2d79e89ec6

            SHA256

            7774de61248f257e56ba9d434a9310e685f312a3cb4ad3f7a64b2928293242ba

            SHA512

            892b51f5a2bc62bc35ae9c11ae84ff2cb40519e7bcd225adc15c2a8a7947478601845dc360146dae06a14c0a4dd123a3225f54c13255d3024272783f719146a1

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            205f5314149b2c6d3490d61e2babb6d0

            SHA1

            31d2553be8d327e2dcef4d20b5b51ba5fa447331

            SHA256

            4e87635e2a208f365e7c558c7221cfe4aea39fa197bec3989f508e5522f0c16c

            SHA512

            b6286712a3f521fdb38f9cb6e017177cb8fe050c3dc7d9a546eaa245efa67bc6562c10965c20da27e1de063fc074f2cd4a4800a4be46ce3afe7e9fbdcaafb6d0

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            205f5314149b2c6d3490d61e2babb6d0

            SHA1

            31d2553be8d327e2dcef4d20b5b51ba5fa447331

            SHA256

            4e87635e2a208f365e7c558c7221cfe4aea39fa197bec3989f508e5522f0c16c

            SHA512

            b6286712a3f521fdb38f9cb6e017177cb8fe050c3dc7d9a546eaa245efa67bc6562c10965c20da27e1de063fc074f2cd4a4800a4be46ce3afe7e9fbdcaafb6d0

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            10c8ec2c3ee3b544662ba53037f4f075

            SHA1

            e09a19536c0a6e72a6a876771cc841d654b45152

            SHA256

            0d51fdaaaf2ccb7a5f34afaaa2b4652488e510a507848fb4598927367cf5c1a4

            SHA512

            2d1928a9fe9e60f5f363ff874afdd89b2d88722043a6a0cdeba9e37c7425bb06890088174cbcad625a5a7b19898917b399c4b62132e8676e9d8dc0e2d8062da8

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            10c8ec2c3ee3b544662ba53037f4f075

            SHA1

            e09a19536c0a6e72a6a876771cc841d654b45152

            SHA256

            0d51fdaaaf2ccb7a5f34afaaa2b4652488e510a507848fb4598927367cf5c1a4

            SHA512

            2d1928a9fe9e60f5f363ff874afdd89b2d88722043a6a0cdeba9e37c7425bb06890088174cbcad625a5a7b19898917b399c4b62132e8676e9d8dc0e2d8062da8

          • \Users\Admin\AppData\Local\Temp\nst5A53.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • \Users\Admin\AppData\Local\Temp\nst5A53.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nst5A53.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nst5A53.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nst5A53.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            3e678e9f1b74cb13e8dca1b381d27f2c

            SHA1

            8f9874b3989526dcefbb90ae5db080ec19d28ea0

            SHA256

            5527a84fa805048902d5de39ca4e1f52f2ff2d9bdedbb161b58fc626118f3d72

            SHA512

            fca2759a8d0fb2d6387c1bc3e594c82c89d707908975b66d70a25f1eafbf9b418d2cfdc2f635d2181a0c7b9e5a53c5bbc5b0ccf6e281724a8e481534fa2f6131

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            3e678e9f1b74cb13e8dca1b381d27f2c

            SHA1

            8f9874b3989526dcefbb90ae5db080ec19d28ea0

            SHA256

            5527a84fa805048902d5de39ca4e1f52f2ff2d9bdedbb161b58fc626118f3d72

            SHA512

            fca2759a8d0fb2d6387c1bc3e594c82c89d707908975b66d70a25f1eafbf9b418d2cfdc2f635d2181a0c7b9e5a53c5bbc5b0ccf6e281724a8e481534fa2f6131

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            3e678e9f1b74cb13e8dca1b381d27f2c

            SHA1

            8f9874b3989526dcefbb90ae5db080ec19d28ea0

            SHA256

            5527a84fa805048902d5de39ca4e1f52f2ff2d9bdedbb161b58fc626118f3d72

            SHA512

            fca2759a8d0fb2d6387c1bc3e594c82c89d707908975b66d70a25f1eafbf9b418d2cfdc2f635d2181a0c7b9e5a53c5bbc5b0ccf6e281724a8e481534fa2f6131

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            d855b0e96a1e013e4b64ecc6232e4b3a

            SHA1

            568b39c3bd61c81f634ecd07ca378caf83dca227

            SHA256

            a0801ba7f16a728067d81deef0fb6cbd12cd4f517ae47db5cb70102c647a2d97

            SHA512

            aa16cf66d0cc5f4c3cf4d4e8b62c9b568236c47e7235d2791d75e50ea6394729a405a499c76a2500046ed107eea74bdfc6d2b461b0a46d37afd8ce5644b87c22

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            d855b0e96a1e013e4b64ecc6232e4b3a

            SHA1

            568b39c3bd61c81f634ecd07ca378caf83dca227

            SHA256

            a0801ba7f16a728067d81deef0fb6cbd12cd4f517ae47db5cb70102c647a2d97

            SHA512

            aa16cf66d0cc5f4c3cf4d4e8b62c9b568236c47e7235d2791d75e50ea6394729a405a499c76a2500046ed107eea74bdfc6d2b461b0a46d37afd8ce5644b87c22

          • \Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            1a735526ef12fc2594935d614a7097c3

            SHA1

            f5349237742da542b8022be41c330b2d79e89ec6

            SHA256

            7774de61248f257e56ba9d434a9310e685f312a3cb4ad3f7a64b2928293242ba

            SHA512

            892b51f5a2bc62bc35ae9c11ae84ff2cb40519e7bcd225adc15c2a8a7947478601845dc360146dae06a14c0a4dd123a3225f54c13255d3024272783f719146a1

          • \Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            205f5314149b2c6d3490d61e2babb6d0

            SHA1

            31d2553be8d327e2dcef4d20b5b51ba5fa447331

            SHA256

            4e87635e2a208f365e7c558c7221cfe4aea39fa197bec3989f508e5522f0c16c

            SHA512

            b6286712a3f521fdb38f9cb6e017177cb8fe050c3dc7d9a546eaa245efa67bc6562c10965c20da27e1de063fc074f2cd4a4800a4be46ce3afe7e9fbdcaafb6d0

          • \Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            10c8ec2c3ee3b544662ba53037f4f075

            SHA1

            e09a19536c0a6e72a6a876771cc841d654b45152

            SHA256

            0d51fdaaaf2ccb7a5f34afaaa2b4652488e510a507848fb4598927367cf5c1a4

            SHA512

            2d1928a9fe9e60f5f363ff874afdd89b2d88722043a6a0cdeba9e37c7425bb06890088174cbcad625a5a7b19898917b399c4b62132e8676e9d8dc0e2d8062da8

          • memory/820-86-0x0000000000000000-mapping.dmp

          • memory/948-61-0x0000000000000000-mapping.dmp

          • memory/988-59-0x0000000000000000-mapping.dmp

          • memory/1184-91-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1184-54-0x0000000074BB1000-0x0000000074BB3000-memory.dmp

            Filesize

            8KB

          • memory/1184-90-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1184-55-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/1288-76-0x0000000000000000-mapping.dmp

          • memory/1560-87-0x0000000000000000-mapping.dmp

          • memory/1640-70-0x0000000000000000-mapping.dmp

          • memory/1748-58-0x0000000000000000-mapping.dmp

          • memory/1968-81-0x0000000000000000-mapping.dmp

          • memory/1972-80-0x0000000000000000-mapping.dmp

          • memory/2020-62-0x0000000000000000-mapping.dmp

          • memory/2044-64-0x0000000000000000-mapping.dmp