Analysis

  • max time kernel
    211s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:53

General

  • Target

    aef24e2997b263198b55b42723d4e13016852e713c52d46083c055bfe98b8137.exe

  • Size

    446KB

  • MD5

    c64fea75503018e1a4ed2ad81af968c9

  • SHA1

    13168e19702573d2df73c6619021542f645b9d39

  • SHA256

    aef24e2997b263198b55b42723d4e13016852e713c52d46083c055bfe98b8137

  • SHA512

    66561db733f65f9d621b12615a8ec145b51740f538fa232f266a0d4a755c6f2c04579e0611f80a22df36cecb167286be61d50bc38ceb2b431f9cfe79bf9896f8

  • SSDEEP

    12288:ICpGyWmpFkEpju+c0qVW8NoDeuUYzAjX/MxvR6:ICcyWmjkElu+jqVTUe0q/+6

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aef24e2997b263198b55b42723d4e13016852e713c52d46083c055bfe98b8137.exe
    "C:\Users\Admin\AppData\Local\Temp\aef24e2997b263198b55b42723d4e13016852e713c52d46083c055bfe98b8137.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1496
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:780
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:560
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:268
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:1536
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1556
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1668
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:1748

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\hfnapi.dll

        Filesize

        106KB

        MD5

        53e33a7b3538590545cd838adaf4ea6d

        SHA1

        2dd4ae8e05db5740a2ccae63cdfd16aaf79a1e8e

        SHA256

        0f9b50f579b3ab92d4607e91f61cfda1e5d5ebdec0502e94cb24bd0bb898eeb6

        SHA512

        2bf6d3c76e3a289f5036fc69dc20d9ed1280853ac328f7705c42db6a1c6138019a9ccff9a50cb746ee4b541496b44f7ea7586c34aadf3fc1ee31835b8bad6227

      • C:\Windows\SysWOW64\hfpapi.dll

        Filesize

        244KB

        MD5

        1a9d0eb447cf5367bc5c754e4a39ea74

        SHA1

        1d4496befe956da0e549bfa16734d1a2f6c43a01

        SHA256

        117721c6655456c940a060d28110edd982f615e00b7287b23782809408496394

        SHA512

        cf57ec3162c1a4d8f0be5f3e009e5b4faa2ff56677f21f14e516ea6a029e7c80f23f0d69508481be12eac269e70a79d684a240671d1012a89f0049194bb3190e

      • C:\Windows\SysWOW64\installd.exe

        Filesize

        108KB

        MD5

        eed1bb7545e8ddefc1c83b246c9396ff

        SHA1

        c363695fa6323b0f1dcc9f7b1d92c8ff439f47e9

        SHA256

        13fe118ba4b76be805c238feb5079c758db965ddb03f15937ffc1a45ef01c49a

        SHA512

        5e1128688922e9593201646bd1e74945a7020fe9395cdbd028b420af8959a6ed94586efcd093a6598610b16255ca2512f89fd16a020daa5eb60871e9e9cea5d0

      • C:\Windows\SysWOW64\nethtsrv.exe

        Filesize

        176KB

        MD5

        7b62b7057f9c9a198c9113f039927213

        SHA1

        44f1f5c34975e53735dd1208915f6501dafce2a6

        SHA256

        7ba18b86e9bd88d27cdcb41c0da16dd02b796097344f8f7b84567e9eee76d908

        SHA512

        d8f78ba7bf6adcf08d63eab890b1082bffbd701f22f5e1c890304011d6cdc98398e18582b77f8c445aaea22c57de445d321a57ca31488c74f7f5d0cc956e4322

      • C:\Windows\SysWOW64\netupdsrv.exe

        Filesize

        158KB

        MD5

        4f6feb0b0754d052407faad935096209

        SHA1

        98b9d447cb7d3ff9c6013111db79c8d5194e1cdd

        SHA256

        a65336e1a0815a5a142555806471e39e6acf0cc6b0c2903677cf5dd3f9933f15

        SHA512

        f6a46b0bf29f98f1243a4a04c327259f07e7d0a0e0885cc89ae733ba7f62e6492d9a3f3d5d9e35d402050f01417b9e2d4a71e18355151e667b48663a3996dcf0

      • \Users\Admin\AppData\Local\Temp\nsz8A29.tmp\System.dll

        Filesize

        11KB

        MD5

        c17103ae9072a06da581dec998343fc1

        SHA1

        b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

        SHA256

        dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

        SHA512

        d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

      • \Users\Admin\AppData\Local\Temp\nsz8A29.tmp\nsExec.dll

        Filesize

        6KB

        MD5

        acc2b699edfea5bf5aae45aba3a41e96

        SHA1

        d2accf4d494e43ceb2cff69abe4dd17147d29cc2

        SHA256

        168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

        SHA512

        e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

      • \Users\Admin\AppData\Local\Temp\nsz8A29.tmp\nsExec.dll

        Filesize

        6KB

        MD5

        acc2b699edfea5bf5aae45aba3a41e96

        SHA1

        d2accf4d494e43ceb2cff69abe4dd17147d29cc2

        SHA256

        168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

        SHA512

        e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

      • \Windows\SysWOW64\hfnapi.dll

        Filesize

        106KB

        MD5

        53e33a7b3538590545cd838adaf4ea6d

        SHA1

        2dd4ae8e05db5740a2ccae63cdfd16aaf79a1e8e

        SHA256

        0f9b50f579b3ab92d4607e91f61cfda1e5d5ebdec0502e94cb24bd0bb898eeb6

        SHA512

        2bf6d3c76e3a289f5036fc69dc20d9ed1280853ac328f7705c42db6a1c6138019a9ccff9a50cb746ee4b541496b44f7ea7586c34aadf3fc1ee31835b8bad6227

      • \Windows\SysWOW64\hfnapi.dll

        Filesize

        106KB

        MD5

        53e33a7b3538590545cd838adaf4ea6d

        SHA1

        2dd4ae8e05db5740a2ccae63cdfd16aaf79a1e8e

        SHA256

        0f9b50f579b3ab92d4607e91f61cfda1e5d5ebdec0502e94cb24bd0bb898eeb6

        SHA512

        2bf6d3c76e3a289f5036fc69dc20d9ed1280853ac328f7705c42db6a1c6138019a9ccff9a50cb746ee4b541496b44f7ea7586c34aadf3fc1ee31835b8bad6227

      • \Windows\SysWOW64\hfpapi.dll

        Filesize

        244KB

        MD5

        1a9d0eb447cf5367bc5c754e4a39ea74

        SHA1

        1d4496befe956da0e549bfa16734d1a2f6c43a01

        SHA256

        117721c6655456c940a060d28110edd982f615e00b7287b23782809408496394

        SHA512

        cf57ec3162c1a4d8f0be5f3e009e5b4faa2ff56677f21f14e516ea6a029e7c80f23f0d69508481be12eac269e70a79d684a240671d1012a89f0049194bb3190e

      • \Windows\SysWOW64\installd.exe

        Filesize

        108KB

        MD5

        eed1bb7545e8ddefc1c83b246c9396ff

        SHA1

        c363695fa6323b0f1dcc9f7b1d92c8ff439f47e9

        SHA256

        13fe118ba4b76be805c238feb5079c758db965ddb03f15937ffc1a45ef01c49a

        SHA512

        5e1128688922e9593201646bd1e74945a7020fe9395cdbd028b420af8959a6ed94586efcd093a6598610b16255ca2512f89fd16a020daa5eb60871e9e9cea5d0

      • \Windows\SysWOW64\nethtsrv.exe

        Filesize

        176KB

        MD5

        7b62b7057f9c9a198c9113f039927213

        SHA1

        44f1f5c34975e53735dd1208915f6501dafce2a6

        SHA256

        7ba18b86e9bd88d27cdcb41c0da16dd02b796097344f8f7b84567e9eee76d908

        SHA512

        d8f78ba7bf6adcf08d63eab890b1082bffbd701f22f5e1c890304011d6cdc98398e18582b77f8c445aaea22c57de445d321a57ca31488c74f7f5d0cc956e4322

      • \Windows\SysWOW64\netupdsrv.exe

        Filesize

        158KB

        MD5

        4f6feb0b0754d052407faad935096209

        SHA1

        98b9d447cb7d3ff9c6013111db79c8d5194e1cdd

        SHA256

        a65336e1a0815a5a142555806471e39e6acf0cc6b0c2903677cf5dd3f9933f15

        SHA512

        f6a46b0bf29f98f1243a4a04c327259f07e7d0a0e0885cc89ae733ba7f62e6492d9a3f3d5d9e35d402050f01417b9e2d4a71e18355151e667b48663a3996dcf0

      • memory/268-60-0x0000000000000000-mapping.dmp

      • memory/560-58-0x0000000000000000-mapping.dmp

      • memory/780-57-0x0000000000000000-mapping.dmp

      • memory/1496-54-0x0000000076391000-0x0000000076393000-memory.dmp

        Filesize

        8KB

      • memory/1536-61-0x0000000000000000-mapping.dmp

      • memory/1556-63-0x0000000000000000-mapping.dmp

      • memory/1668-69-0x0000000000000000-mapping.dmp

      • memory/1748-75-0x0000000000000000-mapping.dmp