Analysis
-
max time kernel
204s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 05:41
Static task
static1
Behavioral task
behavioral1
Sample
4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe
Resource
win10v2004-20221111-en
General
-
Target
4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe
-
Size
601KB
-
MD5
c1fb18d6d2c5a22be24f492e7ceb8f14
-
SHA1
e67d4e8824f7ee99b05d11ce6b65101f7a4116f8
-
SHA256
4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1
-
SHA512
972ecb8380e9a49eb64f1b0fca1c2168d2b1e804a979cac6fe699963964d4ba262621ef49d5e00d1549304677c13ae79f3004fc41859e1fc145a4675eca8391a
-
SSDEEP
12288:iIny5DYTgn8Z1jy39rZ2tCqB0ipeYY2mSFN+p98ztCA0vFo:EUTji39d2tCIvYHyN+peAdo
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe -
Executes dropped EXE 5 IoCs
pid Process 3644 installd.exe 2428 nethtsrv.exe 2264 netupdsrv.exe 2884 nethtsrv.exe 676 netupdsrv.exe -
Loads dropped DLL 14 IoCs
pid Process 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 3644 installd.exe 2428 nethtsrv.exe 2428 nethtsrv.exe 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 2884 nethtsrv.exe 2884 nethtsrv.exe 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfnapi.dll 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe File created C:\Windows\SysWOW64\hfpapi.dll 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe File created C:\Windows\SysWOW64\installd.exe 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe File created C:\Windows\SysWOW64\nethtsrv.exe 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe File created C:\Windows\SysWOW64\netupdsrv.exe 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 640 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2884 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3396 wrote to memory of 3800 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 86 PID 3396 wrote to memory of 3800 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 86 PID 3396 wrote to memory of 3800 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 86 PID 3800 wrote to memory of 216 3800 net.exe 88 PID 3800 wrote to memory of 216 3800 net.exe 88 PID 3800 wrote to memory of 216 3800 net.exe 88 PID 3396 wrote to memory of 2240 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 89 PID 3396 wrote to memory of 2240 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 89 PID 3396 wrote to memory of 2240 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 89 PID 2240 wrote to memory of 3760 2240 net.exe 91 PID 2240 wrote to memory of 3760 2240 net.exe 91 PID 2240 wrote to memory of 3760 2240 net.exe 91 PID 3396 wrote to memory of 3644 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 92 PID 3396 wrote to memory of 3644 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 92 PID 3396 wrote to memory of 3644 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 92 PID 3396 wrote to memory of 2428 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 93 PID 3396 wrote to memory of 2428 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 93 PID 3396 wrote to memory of 2428 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 93 PID 3396 wrote to memory of 2264 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 96 PID 3396 wrote to memory of 2264 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 96 PID 3396 wrote to memory of 2264 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 96 PID 3396 wrote to memory of 4236 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 98 PID 3396 wrote to memory of 4236 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 98 PID 3396 wrote to memory of 4236 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 98 PID 4236 wrote to memory of 4600 4236 net.exe 100 PID 4236 wrote to memory of 4600 4236 net.exe 100 PID 4236 wrote to memory of 4600 4236 net.exe 100 PID 3396 wrote to memory of 1096 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 103 PID 3396 wrote to memory of 1096 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 103 PID 3396 wrote to memory of 1096 3396 4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe 103 PID 1096 wrote to memory of 2092 1096 net.exe 105 PID 1096 wrote to memory of 2092 1096 net.exe 105 PID 1096 wrote to memory of 2092 1096 net.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe"C:\Users\Admin\AppData\Local\Temp\4326365dca92b987e852582b03e2fae230491afc30ff7591e2200ab1b5e5e9a1.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:216
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:3760
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3644
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2428
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:2264
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:4600
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:2092
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:676
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5816ddae898ed64f8da69df6d9b332dde
SHA1c5a453754f50a1003ac2072746deeb80bf5901a3
SHA2568ee2198906b803a342649250012326fb5e60a305cdc23534d5c24a600bb3ac39
SHA51263e41836509279e4463b58090043c9e4eed1e1e134e21469fe404512b7084d18dcb0f62ed479c8b3fb971fa039fb20faf2d57eee484f0df214f1577cb4ecc450
-
Filesize
106KB
MD5816ddae898ed64f8da69df6d9b332dde
SHA1c5a453754f50a1003ac2072746deeb80bf5901a3
SHA2568ee2198906b803a342649250012326fb5e60a305cdc23534d5c24a600bb3ac39
SHA51263e41836509279e4463b58090043c9e4eed1e1e134e21469fe404512b7084d18dcb0f62ed479c8b3fb971fa039fb20faf2d57eee484f0df214f1577cb4ecc450
-
Filesize
106KB
MD5816ddae898ed64f8da69df6d9b332dde
SHA1c5a453754f50a1003ac2072746deeb80bf5901a3
SHA2568ee2198906b803a342649250012326fb5e60a305cdc23534d5c24a600bb3ac39
SHA51263e41836509279e4463b58090043c9e4eed1e1e134e21469fe404512b7084d18dcb0f62ed479c8b3fb971fa039fb20faf2d57eee484f0df214f1577cb4ecc450
-
Filesize
106KB
MD5816ddae898ed64f8da69df6d9b332dde
SHA1c5a453754f50a1003ac2072746deeb80bf5901a3
SHA2568ee2198906b803a342649250012326fb5e60a305cdc23534d5c24a600bb3ac39
SHA51263e41836509279e4463b58090043c9e4eed1e1e134e21469fe404512b7084d18dcb0f62ed479c8b3fb971fa039fb20faf2d57eee484f0df214f1577cb4ecc450
-
Filesize
241KB
MD53cc8e3a501624ade9b1cc8b3cb80b537
SHA1d589aeefc0ddd8c8e5bdfdfc2ed548b491d44af4
SHA25652c17dfb42eac2cb18ccdb5f428050f314b6ff6930f94448136a70b1031773b1
SHA51261faa2f0d98f525269b32e363615721a45d0857e0c0917107bb72a55fcaf6b15f40b694534e67c8ec39611e04dd7c65d0217da8ff67bb21def712b71c3afb82e
-
Filesize
241KB
MD53cc8e3a501624ade9b1cc8b3cb80b537
SHA1d589aeefc0ddd8c8e5bdfdfc2ed548b491d44af4
SHA25652c17dfb42eac2cb18ccdb5f428050f314b6ff6930f94448136a70b1031773b1
SHA51261faa2f0d98f525269b32e363615721a45d0857e0c0917107bb72a55fcaf6b15f40b694534e67c8ec39611e04dd7c65d0217da8ff67bb21def712b71c3afb82e
-
Filesize
241KB
MD53cc8e3a501624ade9b1cc8b3cb80b537
SHA1d589aeefc0ddd8c8e5bdfdfc2ed548b491d44af4
SHA25652c17dfb42eac2cb18ccdb5f428050f314b6ff6930f94448136a70b1031773b1
SHA51261faa2f0d98f525269b32e363615721a45d0857e0c0917107bb72a55fcaf6b15f40b694534e67c8ec39611e04dd7c65d0217da8ff67bb21def712b71c3afb82e
-
Filesize
108KB
MD57c8d487ef068ee4f8ab098a9f382afbf
SHA10372892aa04bce2e9a7e5fff7eb7101d00d632de
SHA25699154caffba889f3485db34b141705830a4d3d33567a3dcfe4980e3b6cf53409
SHA512eed90a5e835c9cc05909f52f672888109ca4e384dfb33c44ef6e9d5688b1000fa83ca5e3f018aaa0996eec23c688f334a37b8a0f3a68e5ae9a00cc9510dd8b21
-
Filesize
108KB
MD57c8d487ef068ee4f8ab098a9f382afbf
SHA10372892aa04bce2e9a7e5fff7eb7101d00d632de
SHA25699154caffba889f3485db34b141705830a4d3d33567a3dcfe4980e3b6cf53409
SHA512eed90a5e835c9cc05909f52f672888109ca4e384dfb33c44ef6e9d5688b1000fa83ca5e3f018aaa0996eec23c688f334a37b8a0f3a68e5ae9a00cc9510dd8b21
-
Filesize
176KB
MD52a60ab969a97b8d8c0cb88ce3c92ca1c
SHA127840a892169d3c7a5e4b2a942a936d414e9a102
SHA256e99227e94e1a4c5a0837d6ec58b32dbd940b6c9bd17cc6a16751f65c262ae462
SHA51221e157300736d4332931dd99083bf37286241f299374342e37ced9f47fd299dbd665585ab58d32226133148e61e64b8688295b36578ddfc03a2e35d9af348543
-
Filesize
176KB
MD52a60ab969a97b8d8c0cb88ce3c92ca1c
SHA127840a892169d3c7a5e4b2a942a936d414e9a102
SHA256e99227e94e1a4c5a0837d6ec58b32dbd940b6c9bd17cc6a16751f65c262ae462
SHA51221e157300736d4332931dd99083bf37286241f299374342e37ced9f47fd299dbd665585ab58d32226133148e61e64b8688295b36578ddfc03a2e35d9af348543
-
Filesize
176KB
MD52a60ab969a97b8d8c0cb88ce3c92ca1c
SHA127840a892169d3c7a5e4b2a942a936d414e9a102
SHA256e99227e94e1a4c5a0837d6ec58b32dbd940b6c9bd17cc6a16751f65c262ae462
SHA51221e157300736d4332931dd99083bf37286241f299374342e37ced9f47fd299dbd665585ab58d32226133148e61e64b8688295b36578ddfc03a2e35d9af348543
-
Filesize
158KB
MD520eabf6827f7c1aeb65cfac5e533d190
SHA1d72030c724756260d0fb8c7b920ef6f91a52dc16
SHA2569b3415f59bf399120662974f3a9e987ec0e5b8c7d6449f10e023d85360f656d0
SHA512f6b3137cc5162ef0e8760c22e4c625ab11b849aa9519b61049ad4dd3b25e84c48a26607267b2f9ac6e77530790e881862f3af38913ea135987943f2faf6bba6d
-
Filesize
158KB
MD520eabf6827f7c1aeb65cfac5e533d190
SHA1d72030c724756260d0fb8c7b920ef6f91a52dc16
SHA2569b3415f59bf399120662974f3a9e987ec0e5b8c7d6449f10e023d85360f656d0
SHA512f6b3137cc5162ef0e8760c22e4c625ab11b849aa9519b61049ad4dd3b25e84c48a26607267b2f9ac6e77530790e881862f3af38913ea135987943f2faf6bba6d
-
Filesize
158KB
MD520eabf6827f7c1aeb65cfac5e533d190
SHA1d72030c724756260d0fb8c7b920ef6f91a52dc16
SHA2569b3415f59bf399120662974f3a9e987ec0e5b8c7d6449f10e023d85360f656d0
SHA512f6b3137cc5162ef0e8760c22e4c625ab11b849aa9519b61049ad4dd3b25e84c48a26607267b2f9ac6e77530790e881862f3af38913ea135987943f2faf6bba6d