Analysis
-
max time kernel
187s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 05:36
Static task
static1
Behavioral task
behavioral1
Sample
a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe
Resource
win10v2004-20221111-en
General
-
Target
a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe
-
Size
603KB
-
MD5
8a7ad3f3ba4bf27bba47b8f824662f11
-
SHA1
31f3f00a17c0399096714155258f5788b16c3088
-
SHA256
a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8
-
SHA512
59b2707567bf2f9c401a66fbeadc432849809a06cef31907762cc87cadd6caa39c7beefee7b4ab730625b226948bab63b6dd6695b6ff2d5a5ef3ed57cb31c500
-
SSDEEP
12288:CIny5DYT92UdH3q3ijEZbqSyXwdH/QZCCCllj9t48p:kUT92MH3q3igg5XwdHIZkj48
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe -
Executes dropped EXE 5 IoCs
pid Process 4616 installd.exe 1840 nethtsrv.exe 4784 netupdsrv.exe 1368 nethtsrv.exe 3588 netupdsrv.exe -
Loads dropped DLL 14 IoCs
pid Process 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 4616 installd.exe 1840 nethtsrv.exe 1840 nethtsrv.exe 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 1368 nethtsrv.exe 1368 nethtsrv.exe 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfnapi.dll a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe File created C:\Windows\SysWOW64\hfpapi.dll a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe File created C:\Windows\SysWOW64\installd.exe a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe File created C:\Windows\SysWOW64\nethtsrv.exe a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe File created C:\Windows\SysWOW64\netupdsrv.exe a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe File created C:\Program Files (x86)\Common Files\Config\data.xml a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1368 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2876 wrote to memory of 5000 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 83 PID 2876 wrote to memory of 5000 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 83 PID 2876 wrote to memory of 5000 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 83 PID 5000 wrote to memory of 364 5000 net.exe 85 PID 5000 wrote to memory of 364 5000 net.exe 85 PID 5000 wrote to memory of 364 5000 net.exe 85 PID 2876 wrote to memory of 3112 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 86 PID 2876 wrote to memory of 3112 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 86 PID 2876 wrote to memory of 3112 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 86 PID 3112 wrote to memory of 2796 3112 net.exe 88 PID 3112 wrote to memory of 2796 3112 net.exe 88 PID 3112 wrote to memory of 2796 3112 net.exe 88 PID 2876 wrote to memory of 4616 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 90 PID 2876 wrote to memory of 4616 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 90 PID 2876 wrote to memory of 4616 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 90 PID 2876 wrote to memory of 1840 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 91 PID 2876 wrote to memory of 1840 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 91 PID 2876 wrote to memory of 1840 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 91 PID 2876 wrote to memory of 4784 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 93 PID 2876 wrote to memory of 4784 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 93 PID 2876 wrote to memory of 4784 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 93 PID 2876 wrote to memory of 5060 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 95 PID 2876 wrote to memory of 5060 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 95 PID 2876 wrote to memory of 5060 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 95 PID 5060 wrote to memory of 1440 5060 net.exe 97 PID 5060 wrote to memory of 1440 5060 net.exe 97 PID 5060 wrote to memory of 1440 5060 net.exe 97 PID 2876 wrote to memory of 3132 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 99 PID 2876 wrote to memory of 3132 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 99 PID 2876 wrote to memory of 3132 2876 a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe 99 PID 3132 wrote to memory of 4648 3132 net.exe 101 PID 3132 wrote to memory of 4648 3132 net.exe 101 PID 3132 wrote to memory of 4648 3132 net.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe"C:\Users\Admin\AppData\Local\Temp\a8ea8c969b37a27ecb605ba648bc804d6d8fdde0829e13a014902d16b8a45ac8.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:364
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:2796
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4616
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1840
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:4784
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1440
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:4648
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:3588
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5a75a6b2f248c21c1c344a9a43fe4a03c
SHA1c0360eb71873f6fe7fed859888a34d292835fb1d
SHA256545edeb0447aeea5f27e48e1f92d602db2ff6d6c1148fa2328e5286819aec3fd
SHA51235f48ba82a3706fdf42c72f517a5bc51eba5c224f88fab53667d0fe9f6ee101099bf5048b4fa04d677fc4ff9ac2d963588f4417770daf933859e767779d53476
-
Filesize
106KB
MD5a75a6b2f248c21c1c344a9a43fe4a03c
SHA1c0360eb71873f6fe7fed859888a34d292835fb1d
SHA256545edeb0447aeea5f27e48e1f92d602db2ff6d6c1148fa2328e5286819aec3fd
SHA51235f48ba82a3706fdf42c72f517a5bc51eba5c224f88fab53667d0fe9f6ee101099bf5048b4fa04d677fc4ff9ac2d963588f4417770daf933859e767779d53476
-
Filesize
106KB
MD5a75a6b2f248c21c1c344a9a43fe4a03c
SHA1c0360eb71873f6fe7fed859888a34d292835fb1d
SHA256545edeb0447aeea5f27e48e1f92d602db2ff6d6c1148fa2328e5286819aec3fd
SHA51235f48ba82a3706fdf42c72f517a5bc51eba5c224f88fab53667d0fe9f6ee101099bf5048b4fa04d677fc4ff9ac2d963588f4417770daf933859e767779d53476
-
Filesize
106KB
MD5a75a6b2f248c21c1c344a9a43fe4a03c
SHA1c0360eb71873f6fe7fed859888a34d292835fb1d
SHA256545edeb0447aeea5f27e48e1f92d602db2ff6d6c1148fa2328e5286819aec3fd
SHA51235f48ba82a3706fdf42c72f517a5bc51eba5c224f88fab53667d0fe9f6ee101099bf5048b4fa04d677fc4ff9ac2d963588f4417770daf933859e767779d53476
-
Filesize
244KB
MD5448762cc736edc7ef17337b408038e14
SHA1c63164e53d2ee32b774a671187a6200fd8ef8159
SHA2569aebd6c70de162b35e9b2e8efbaefddae448e41d5715e031910457a660268a3f
SHA5129323e54c9aaf227a04d6bbd8ec56a41d898131c583434f98d0dc71f22f28d9a4396a65c18e98c8d85bd1676fd7d73fb3ed8dc82899d1b1112bccec85b232fe38
-
Filesize
244KB
MD5448762cc736edc7ef17337b408038e14
SHA1c63164e53d2ee32b774a671187a6200fd8ef8159
SHA2569aebd6c70de162b35e9b2e8efbaefddae448e41d5715e031910457a660268a3f
SHA5129323e54c9aaf227a04d6bbd8ec56a41d898131c583434f98d0dc71f22f28d9a4396a65c18e98c8d85bd1676fd7d73fb3ed8dc82899d1b1112bccec85b232fe38
-
Filesize
244KB
MD5448762cc736edc7ef17337b408038e14
SHA1c63164e53d2ee32b774a671187a6200fd8ef8159
SHA2569aebd6c70de162b35e9b2e8efbaefddae448e41d5715e031910457a660268a3f
SHA5129323e54c9aaf227a04d6bbd8ec56a41d898131c583434f98d0dc71f22f28d9a4396a65c18e98c8d85bd1676fd7d73fb3ed8dc82899d1b1112bccec85b232fe38
-
Filesize
108KB
MD574c8a6101e9b7ccda7c873a3a5f0081c
SHA192040097089192871de3e2ca6a763dbba17c2dbe
SHA256e442db59ef301f8467f7713a09881e4c5beac95b2899cef6e118e32727f1a128
SHA5125883405652e310d25031e077d9e5e8d9d9d8a7caef71abc11ad1810f47648cf91468e2877ef8a66437eb1ddb55512f837431e769081cf0a35649749f977704fc
-
Filesize
108KB
MD574c8a6101e9b7ccda7c873a3a5f0081c
SHA192040097089192871de3e2ca6a763dbba17c2dbe
SHA256e442db59ef301f8467f7713a09881e4c5beac95b2899cef6e118e32727f1a128
SHA5125883405652e310d25031e077d9e5e8d9d9d8a7caef71abc11ad1810f47648cf91468e2877ef8a66437eb1ddb55512f837431e769081cf0a35649749f977704fc
-
Filesize
176KB
MD50b4e84050385d56b1961b926995e06d7
SHA1b08adaa03f012aebe2a1b58679daee86dce6bfa6
SHA25635c035f195cf5a4d43b898d7c57628a4e61d0fc29eda1b76db24f95afd40ff6c
SHA512d0730b44fe40510c30f0f331f82c96e2d965635d3a16428a32a9cbabb7f73219a6972abe5bc355228f66e594d8c85d91e80d6a1b4ba7f2f33b79b0497c51e652
-
Filesize
176KB
MD50b4e84050385d56b1961b926995e06d7
SHA1b08adaa03f012aebe2a1b58679daee86dce6bfa6
SHA25635c035f195cf5a4d43b898d7c57628a4e61d0fc29eda1b76db24f95afd40ff6c
SHA512d0730b44fe40510c30f0f331f82c96e2d965635d3a16428a32a9cbabb7f73219a6972abe5bc355228f66e594d8c85d91e80d6a1b4ba7f2f33b79b0497c51e652
-
Filesize
176KB
MD50b4e84050385d56b1961b926995e06d7
SHA1b08adaa03f012aebe2a1b58679daee86dce6bfa6
SHA25635c035f195cf5a4d43b898d7c57628a4e61d0fc29eda1b76db24f95afd40ff6c
SHA512d0730b44fe40510c30f0f331f82c96e2d965635d3a16428a32a9cbabb7f73219a6972abe5bc355228f66e594d8c85d91e80d6a1b4ba7f2f33b79b0497c51e652
-
Filesize
158KB
MD59f89f8700b9e4154a8de0d1705b46b8e
SHA1331f8a04fa68abb5b9c208649d094c95524992d7
SHA256d889fcac88dd7e2a3a7c531c2d92b61e9b6deb8c99d3121c7a15497d96c0408f
SHA512cd830d609053fd2926d044f64f9dbfa2867efc668a91becc8f3a4a3caa6fbf8e35cb679e3ad821b67257fcffcee54cc1b652cac87d5fe6d50f860f8522f61e09
-
Filesize
158KB
MD59f89f8700b9e4154a8de0d1705b46b8e
SHA1331f8a04fa68abb5b9c208649d094c95524992d7
SHA256d889fcac88dd7e2a3a7c531c2d92b61e9b6deb8c99d3121c7a15497d96c0408f
SHA512cd830d609053fd2926d044f64f9dbfa2867efc668a91becc8f3a4a3caa6fbf8e35cb679e3ad821b67257fcffcee54cc1b652cac87d5fe6d50f860f8522f61e09
-
Filesize
158KB
MD59f89f8700b9e4154a8de0d1705b46b8e
SHA1331f8a04fa68abb5b9c208649d094c95524992d7
SHA256d889fcac88dd7e2a3a7c531c2d92b61e9b6deb8c99d3121c7a15497d96c0408f
SHA512cd830d609053fd2926d044f64f9dbfa2867efc668a91becc8f3a4a3caa6fbf8e35cb679e3ad821b67257fcffcee54cc1b652cac87d5fe6d50f860f8522f61e09