Analysis

  • max time kernel
    166s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:53

General

  • Target

    adea5a63dd582d2bdce20d4de2f8c1875bcaf34c25d9bc713bde7cad5ac7b8d1.exe

  • Size

    447KB

  • MD5

    ac6b729d542f44fd353c0420184bd8e0

  • SHA1

    f70e84f3e66c844b3ab13a41d99a466798c1a1cd

  • SHA256

    adea5a63dd582d2bdce20d4de2f8c1875bcaf34c25d9bc713bde7cad5ac7b8d1

  • SHA512

    0e64227b8987116ec16bace796b19a71c4b0eb04831ff8eea5f39a88e8272779c8e7037e3051fd01c8f3b4eea0e369ae703e888f053d52dc6487b3cbb2becc4a

  • SSDEEP

    12288:lXKkPIP4hkHmmfgiNGS2XncmJ+iw7oNGKe9+6OmWwDOVRUCmrNf:lXKkPIqG7IyXG9+Ke0xosWhf

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adea5a63dd582d2bdce20d4de2f8c1875bcaf34c25d9bc713bde7cad5ac7b8d1.exe
    "C:\Users\Admin\AppData\Local\Temp\adea5a63dd582d2bdce20d4de2f8c1875bcaf34c25d9bc713bde7cad5ac7b8d1.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3688
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1932
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:4052
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4492
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:1724
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:5028
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2268
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:4976
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3400
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:4452
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1284
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:4696
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:208
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:4372

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsrAEF.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nsrAEF.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsrAEF.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsrAEF.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsrAEF.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsrAEF.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsrAEF.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsrAEF.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsrAEF.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            29ca9d451fbb25fcf09a1de64144da67

            SHA1

            61809a0526a5c46bc100d4a3336440d58794277f

            SHA256

            a6c4c6e547bbb1d072d2df3cfe9088382162bc731ca666dc4ba2f94d55f83362

            SHA512

            678611ff6e6aa5d603c91806bf01757e484557e60ed2b8b9e4960ec42baee570ce95b8770814d3a7b817ef3648e196830a97425dc0713b70750278c0b182fbe7

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            29ca9d451fbb25fcf09a1de64144da67

            SHA1

            61809a0526a5c46bc100d4a3336440d58794277f

            SHA256

            a6c4c6e547bbb1d072d2df3cfe9088382162bc731ca666dc4ba2f94d55f83362

            SHA512

            678611ff6e6aa5d603c91806bf01757e484557e60ed2b8b9e4960ec42baee570ce95b8770814d3a7b817ef3648e196830a97425dc0713b70750278c0b182fbe7

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            29ca9d451fbb25fcf09a1de64144da67

            SHA1

            61809a0526a5c46bc100d4a3336440d58794277f

            SHA256

            a6c4c6e547bbb1d072d2df3cfe9088382162bc731ca666dc4ba2f94d55f83362

            SHA512

            678611ff6e6aa5d603c91806bf01757e484557e60ed2b8b9e4960ec42baee570ce95b8770814d3a7b817ef3648e196830a97425dc0713b70750278c0b182fbe7

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            29ca9d451fbb25fcf09a1de64144da67

            SHA1

            61809a0526a5c46bc100d4a3336440d58794277f

            SHA256

            a6c4c6e547bbb1d072d2df3cfe9088382162bc731ca666dc4ba2f94d55f83362

            SHA512

            678611ff6e6aa5d603c91806bf01757e484557e60ed2b8b9e4960ec42baee570ce95b8770814d3a7b817ef3648e196830a97425dc0713b70750278c0b182fbe7

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            3da1f1511238ec7c30a1aae4a36bbd70

            SHA1

            8a4741b73f1e1bf89b5aa8e9b3744c2f26cba38a

            SHA256

            b4df88ad77bafc4f9c9d46a70a3acb08d867d20857a80daa544473abcf3cbb4c

            SHA512

            096ab9cf1e2d82632055b513cf39d8e5b515cde7c3c74a441fbcb3a09ebac6cd73f749b43d881b1755c7504cf7fdf704e1c6e853bef5c49a616e64baf7adab7b

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            3da1f1511238ec7c30a1aae4a36bbd70

            SHA1

            8a4741b73f1e1bf89b5aa8e9b3744c2f26cba38a

            SHA256

            b4df88ad77bafc4f9c9d46a70a3acb08d867d20857a80daa544473abcf3cbb4c

            SHA512

            096ab9cf1e2d82632055b513cf39d8e5b515cde7c3c74a441fbcb3a09ebac6cd73f749b43d881b1755c7504cf7fdf704e1c6e853bef5c49a616e64baf7adab7b

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            3da1f1511238ec7c30a1aae4a36bbd70

            SHA1

            8a4741b73f1e1bf89b5aa8e9b3744c2f26cba38a

            SHA256

            b4df88ad77bafc4f9c9d46a70a3acb08d867d20857a80daa544473abcf3cbb4c

            SHA512

            096ab9cf1e2d82632055b513cf39d8e5b515cde7c3c74a441fbcb3a09ebac6cd73f749b43d881b1755c7504cf7fdf704e1c6e853bef5c49a616e64baf7adab7b

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            ead2f78c24eb017a3e9556e0d39471e2

            SHA1

            c4335f7c2c03e842b47bd38c0fc677f8ec1c02bd

            SHA256

            48d3d9e4a2f277eff64897541b862ac23ac5c71534e953d45d955e62ebf6f4ba

            SHA512

            10c81c3fd20d8e4b2140b6f025d79bd6c27e019b608d256107a4456c211c32dc787b3bb59708b6638b309a02640f4628bd156190a13fe166d62b491b217f9638

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            ead2f78c24eb017a3e9556e0d39471e2

            SHA1

            c4335f7c2c03e842b47bd38c0fc677f8ec1c02bd

            SHA256

            48d3d9e4a2f277eff64897541b862ac23ac5c71534e953d45d955e62ebf6f4ba

            SHA512

            10c81c3fd20d8e4b2140b6f025d79bd6c27e019b608d256107a4456c211c32dc787b3bb59708b6638b309a02640f4628bd156190a13fe166d62b491b217f9638

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            71dd7cf07abf9b4cdce78dc18be7759a

            SHA1

            83c8ee6d7ec14da0489ac290f34a13cf66cfd233

            SHA256

            97406fccce34cb311fda96a2e1e43a86bcf5db2a50c5fbd4d3da2a4d19ea8011

            SHA512

            905e07315b175d3fc55358fb289e2d40cf97776a3888497cdd5147174ec54f2b17d44e0ca1464471d9c62d7133a3dc0e9f1962a7641fcfefe97e4e513d5080fd

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            71dd7cf07abf9b4cdce78dc18be7759a

            SHA1

            83c8ee6d7ec14da0489ac290f34a13cf66cfd233

            SHA256

            97406fccce34cb311fda96a2e1e43a86bcf5db2a50c5fbd4d3da2a4d19ea8011

            SHA512

            905e07315b175d3fc55358fb289e2d40cf97776a3888497cdd5147174ec54f2b17d44e0ca1464471d9c62d7133a3dc0e9f1962a7641fcfefe97e4e513d5080fd

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            71dd7cf07abf9b4cdce78dc18be7759a

            SHA1

            83c8ee6d7ec14da0489ac290f34a13cf66cfd233

            SHA256

            97406fccce34cb311fda96a2e1e43a86bcf5db2a50c5fbd4d3da2a4d19ea8011

            SHA512

            905e07315b175d3fc55358fb289e2d40cf97776a3888497cdd5147174ec54f2b17d44e0ca1464471d9c62d7133a3dc0e9f1962a7641fcfefe97e4e513d5080fd

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            0cdeeea9f42ead8bb1972d20af983875

            SHA1

            69d11a84adf0e73df2a571abdfb2f4e26f57b4e3

            SHA256

            d57495ac32f42308f17145b2182d5c52f72b9d1f84fcf6c62b8f6783296fa3a8

            SHA512

            ff30f9c8110dfe702485da61376c1f0e973265382072864bc3e3b8c5004c1b9af7c88115d7419334e0b2a8f6b9edaafabd14104205e2bc5694bba49ea245aebc

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            0cdeeea9f42ead8bb1972d20af983875

            SHA1

            69d11a84adf0e73df2a571abdfb2f4e26f57b4e3

            SHA256

            d57495ac32f42308f17145b2182d5c52f72b9d1f84fcf6c62b8f6783296fa3a8

            SHA512

            ff30f9c8110dfe702485da61376c1f0e973265382072864bc3e3b8c5004c1b9af7c88115d7419334e0b2a8f6b9edaafabd14104205e2bc5694bba49ea245aebc

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            0cdeeea9f42ead8bb1972d20af983875

            SHA1

            69d11a84adf0e73df2a571abdfb2f4e26f57b4e3

            SHA256

            d57495ac32f42308f17145b2182d5c52f72b9d1f84fcf6c62b8f6783296fa3a8

            SHA512

            ff30f9c8110dfe702485da61376c1f0e973265382072864bc3e3b8c5004c1b9af7c88115d7419334e0b2a8f6b9edaafabd14104205e2bc5694bba49ea245aebc

          • memory/1284-167-0x0000000000000000-mapping.dmp

          • memory/1724-143-0x0000000000000000-mapping.dmp

          • memory/1932-138-0x0000000000000000-mapping.dmp

          • memory/2268-149-0x0000000000000000-mapping.dmp

          • memory/3400-160-0x0000000000000000-mapping.dmp

          • memory/4052-139-0x0000000000000000-mapping.dmp

          • memory/4452-161-0x0000000000000000-mapping.dmp

          • memory/4492-142-0x0000000000000000-mapping.dmp

          • memory/4696-168-0x0000000000000000-mapping.dmp

          • memory/4976-155-0x0000000000000000-mapping.dmp

          • memory/5028-144-0x0000000000000000-mapping.dmp