Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:36

General

  • Target

    6f65440789a83171fed63e221e28c72e82a649046d672208f8f5923ddf4927f5.exe

  • Size

    558KB

  • MD5

    762f050b3a368c3c54279c2bc760ee6a

  • SHA1

    3fe7f10078b937f54ee8590d3baa749fab6ac2bf

  • SHA256

    6f65440789a83171fed63e221e28c72e82a649046d672208f8f5923ddf4927f5

  • SHA512

    2326bf8fb35f1b0066d4152f5f5ecf1032d74b0e17722f469812e279f2040183c04e47f81b7b321a46a65567598b9c1ca35630c8c35f22f50920ffc1ea3bad87

  • SSDEEP

    12288:Z/gHuiosUEAa8tRopSyTmlGNU5d64F8TwzOIMc:ZDsUEAJMYymaUL6YMc

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f65440789a83171fed63e221e28c72e82a649046d672208f8f5923ddf4927f5.exe
    "C:\Users\Admin\AppData\Local\Temp\6f65440789a83171fed63e221e28c72e82a649046d672208f8f5923ddf4927f5.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1108
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:1744
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1568
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:624
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1728
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1116
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:300
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:268
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:1400
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1460
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:968
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1196
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:952

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            05ba2ee1a047b9ca0dbf9585e1169c79

            SHA1

            d13c93856c082ec58bba3f03059a02b62fbb1368

            SHA256

            5d419de4001909de7b40a53846b2e539460e7b6ca298770a5440c73b6f30b2ac

            SHA512

            fdd60bf8dfbd0779b9e84c606b8ac1df7afacdbe901a3602020867c79e8a0bf7770641efca995856b050ee60fdd476f523e0a55705fbdb95ea533dadaa0b7d89

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            0a038cf1983f51690c7f039c0481e1c3

            SHA1

            2c9fe298a088b9e9a01d1715ea25079dae2f5b7e

            SHA256

            a54ced206f536f0f9433305205fbb475e7a2bbdece9e87fd0ef419ae6b6f80cb

            SHA512

            7712522102c40a3dcccb08390f4ed9e9c50f8dee2b25f4bb8f37d952ed980fa5b568552f50e73c5521c8e8d55faebae90737622a95c9454060f82958fde8bbf4

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            106KB

            MD5

            c189839903c5e43802a7fbfb75da5ac4

            SHA1

            7d0269d35ad5d89f9de26d3c8a34711d93c731d3

            SHA256

            f4c02258b1af0f22d2464f12d104ce982df4925e1d92709bc3f1bec1ee27c82d

            SHA512

            546d00adc14482d0c53f3ee30592ed4a57b4dbe9308f9676e2a70fdd951ff60ba37040d8385f4be25ac59cf40c380c8035d6fc326c9792c0c4442e2fd2ff8c4e

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            175KB

            MD5

            33f979d0958e44caff4fefb0096c7e73

            SHA1

            086511bde1db0e546c2d57b22a52351c6b729d04

            SHA256

            2165a7dcb8a509b499425f4e7d6da853ac8d733d7d2b4931a20a4d051f3a986b

            SHA512

            2b4d5a1875e486feb2a530bc87d349b8cf85ec57af4de3537056f7314ef1a226f4e05dfdf20d0494e3c27eaca87cb33712375468389af7fb00d66e334ede5c08

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            175KB

            MD5

            33f979d0958e44caff4fefb0096c7e73

            SHA1

            086511bde1db0e546c2d57b22a52351c6b729d04

            SHA256

            2165a7dcb8a509b499425f4e7d6da853ac8d733d7d2b4931a20a4d051f3a986b

            SHA512

            2b4d5a1875e486feb2a530bc87d349b8cf85ec57af4de3537056f7314ef1a226f4e05dfdf20d0494e3c27eaca87cb33712375468389af7fb00d66e334ede5c08

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            156KB

            MD5

            7a6836cc9ab9f199fa354099511896f2

            SHA1

            ada76061ca35c986a7450e2c7326d4e91e697f65

            SHA256

            dcf94d36899510ce88bd0b66851bb75ca0a6e25e7ec5ffd6cf606db89233a8a3

            SHA512

            42ba2f91b7b79afe13c3226438cbbe4218046a7f5a3ccb95127b88e12912ac16e5a8c8adc0c244e32450a720dbdb77f07f03376cde077279295f9404bb4f7175

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            156KB

            MD5

            7a6836cc9ab9f199fa354099511896f2

            SHA1

            ada76061ca35c986a7450e2c7326d4e91e697f65

            SHA256

            dcf94d36899510ce88bd0b66851bb75ca0a6e25e7ec5ffd6cf606db89233a8a3

            SHA512

            42ba2f91b7b79afe13c3226438cbbe4218046a7f5a3ccb95127b88e12912ac16e5a8c8adc0c244e32450a720dbdb77f07f03376cde077279295f9404bb4f7175

          • \Users\Admin\AppData\Local\Temp\nsy20DC.tmp\System.dll

            Filesize

            11KB

            MD5

            960a5c48e25cf2bca332e74e11d825c9

            SHA1

            da35c6816ace5daf4c6c1d57b93b09a82ecdc876

            SHA256

            484f8e9f194ed9016274ef3672b2c52ed5f574fb71d3884edf3c222b758a75a2

            SHA512

            cc450179e2d0d56aee2ccf8163d3882978c4e9c1aa3d3a95875fe9ba9831e07ddfd377111dc67f801fa53b6f468a418f086f1de7c71e0a5b634e1ae2a67cd3da

          • \Users\Admin\AppData\Local\Temp\nsy20DC.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            51e63a9c5d6d230ef1c421b2eccd45dc

            SHA1

            c499cdad5c613d71ed3f7e93360f1bbc5748c45d

            SHA256

            cd8496a3802378391ec425dec424a14f5d30e242f192ec4eb022d767f9a2480f

            SHA512

            c23d713c3c834b3397c2a199490aed28f28d21f5781205c24df5e1e32365985c8a55be58f06979df09222740ffa51f4da764ebc3d912cd0c9d56ab6a33cab522

          • \Users\Admin\AppData\Local\Temp\nsy20DC.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            51e63a9c5d6d230ef1c421b2eccd45dc

            SHA1

            c499cdad5c613d71ed3f7e93360f1bbc5748c45d

            SHA256

            cd8496a3802378391ec425dec424a14f5d30e242f192ec4eb022d767f9a2480f

            SHA512

            c23d713c3c834b3397c2a199490aed28f28d21f5781205c24df5e1e32365985c8a55be58f06979df09222740ffa51f4da764ebc3d912cd0c9d56ab6a33cab522

          • \Users\Admin\AppData\Local\Temp\nsy20DC.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            51e63a9c5d6d230ef1c421b2eccd45dc

            SHA1

            c499cdad5c613d71ed3f7e93360f1bbc5748c45d

            SHA256

            cd8496a3802378391ec425dec424a14f5d30e242f192ec4eb022d767f9a2480f

            SHA512

            c23d713c3c834b3397c2a199490aed28f28d21f5781205c24df5e1e32365985c8a55be58f06979df09222740ffa51f4da764ebc3d912cd0c9d56ab6a33cab522

          • \Users\Admin\AppData\Local\Temp\nsy20DC.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            51e63a9c5d6d230ef1c421b2eccd45dc

            SHA1

            c499cdad5c613d71ed3f7e93360f1bbc5748c45d

            SHA256

            cd8496a3802378391ec425dec424a14f5d30e242f192ec4eb022d767f9a2480f

            SHA512

            c23d713c3c834b3397c2a199490aed28f28d21f5781205c24df5e1e32365985c8a55be58f06979df09222740ffa51f4da764ebc3d912cd0c9d56ab6a33cab522

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            05ba2ee1a047b9ca0dbf9585e1169c79

            SHA1

            d13c93856c082ec58bba3f03059a02b62fbb1368

            SHA256

            5d419de4001909de7b40a53846b2e539460e7b6ca298770a5440c73b6f30b2ac

            SHA512

            fdd60bf8dfbd0779b9e84c606b8ac1df7afacdbe901a3602020867c79e8a0bf7770641efca995856b050ee60fdd476f523e0a55705fbdb95ea533dadaa0b7d89

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            05ba2ee1a047b9ca0dbf9585e1169c79

            SHA1

            d13c93856c082ec58bba3f03059a02b62fbb1368

            SHA256

            5d419de4001909de7b40a53846b2e539460e7b6ca298770a5440c73b6f30b2ac

            SHA512

            fdd60bf8dfbd0779b9e84c606b8ac1df7afacdbe901a3602020867c79e8a0bf7770641efca995856b050ee60fdd476f523e0a55705fbdb95ea533dadaa0b7d89

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            05ba2ee1a047b9ca0dbf9585e1169c79

            SHA1

            d13c93856c082ec58bba3f03059a02b62fbb1368

            SHA256

            5d419de4001909de7b40a53846b2e539460e7b6ca298770a5440c73b6f30b2ac

            SHA512

            fdd60bf8dfbd0779b9e84c606b8ac1df7afacdbe901a3602020867c79e8a0bf7770641efca995856b050ee60fdd476f523e0a55705fbdb95ea533dadaa0b7d89

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            0a038cf1983f51690c7f039c0481e1c3

            SHA1

            2c9fe298a088b9e9a01d1715ea25079dae2f5b7e

            SHA256

            a54ced206f536f0f9433305205fbb475e7a2bbdece9e87fd0ef419ae6b6f80cb

            SHA512

            7712522102c40a3dcccb08390f4ed9e9c50f8dee2b25f4bb8f37d952ed980fa5b568552f50e73c5521c8e8d55faebae90737622a95c9454060f82958fde8bbf4

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            0a038cf1983f51690c7f039c0481e1c3

            SHA1

            2c9fe298a088b9e9a01d1715ea25079dae2f5b7e

            SHA256

            a54ced206f536f0f9433305205fbb475e7a2bbdece9e87fd0ef419ae6b6f80cb

            SHA512

            7712522102c40a3dcccb08390f4ed9e9c50f8dee2b25f4bb8f37d952ed980fa5b568552f50e73c5521c8e8d55faebae90737622a95c9454060f82958fde8bbf4

          • \Windows\SysWOW64\installd.exe

            Filesize

            106KB

            MD5

            c189839903c5e43802a7fbfb75da5ac4

            SHA1

            7d0269d35ad5d89f9de26d3c8a34711d93c731d3

            SHA256

            f4c02258b1af0f22d2464f12d104ce982df4925e1d92709bc3f1bec1ee27c82d

            SHA512

            546d00adc14482d0c53f3ee30592ed4a57b4dbe9308f9676e2a70fdd951ff60ba37040d8385f4be25ac59cf40c380c8035d6fc326c9792c0c4442e2fd2ff8c4e

          • \Windows\SysWOW64\nethtsrv.exe

            Filesize

            175KB

            MD5

            33f979d0958e44caff4fefb0096c7e73

            SHA1

            086511bde1db0e546c2d57b22a52351c6b729d04

            SHA256

            2165a7dcb8a509b499425f4e7d6da853ac8d733d7d2b4931a20a4d051f3a986b

            SHA512

            2b4d5a1875e486feb2a530bc87d349b8cf85ec57af4de3537056f7314ef1a226f4e05dfdf20d0494e3c27eaca87cb33712375468389af7fb00d66e334ede5c08

          • \Windows\SysWOW64\netupdsrv.exe

            Filesize

            156KB

            MD5

            7a6836cc9ab9f199fa354099511896f2

            SHA1

            ada76061ca35c986a7450e2c7326d4e91e697f65

            SHA256

            dcf94d36899510ce88bd0b66851bb75ca0a6e25e7ec5ffd6cf606db89233a8a3

            SHA512

            42ba2f91b7b79afe13c3226438cbbe4218046a7f5a3ccb95127b88e12912ac16e5a8c8adc0c244e32450a720dbdb77f07f03376cde077279295f9404bb4f7175

          • memory/268-80-0x0000000000000000-mapping.dmp

          • memory/300-76-0x0000000000000000-mapping.dmp

          • memory/624-61-0x0000000000000000-mapping.dmp

          • memory/968-87-0x0000000000000000-mapping.dmp

          • memory/1108-57-0x0000000000000000-mapping.dmp

          • memory/1116-70-0x0000000000000000-mapping.dmp

          • memory/1400-81-0x0000000000000000-mapping.dmp

          • memory/1460-86-0x0000000000000000-mapping.dmp

          • memory/1568-60-0x0000000000000000-mapping.dmp

          • memory/1728-64-0x0000000000000000-mapping.dmp

          • memory/1744-58-0x0000000000000000-mapping.dmp

          • memory/1800-62-0x0000000000370000-0x00000000007BE000-memory.dmp

            Filesize

            4.3MB

          • memory/1800-54-0x00000000758C1000-0x00000000758C3000-memory.dmp

            Filesize

            8KB

          • memory/1800-90-0x0000000000370000-0x00000000007BE000-memory.dmp

            Filesize

            4.3MB