Analysis

  • max time kernel
    91s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2022, 05:42

General

  • Target

    257c4ba98ddc6fd71ed76c7250ea2902d5909f30468f0bb21e9d3b1de2b11264.exe

  • Size

    602KB

  • MD5

    f5d297eeff6ac4b7b1e14fb2d222cd6d

  • SHA1

    e3e62ebd2f588c05a8b34113fa687e7478b747e8

  • SHA256

    257c4ba98ddc6fd71ed76c7250ea2902d5909f30468f0bb21e9d3b1de2b11264

  • SHA512

    bbba9ccd8ff5691379d04ff8d1d204284179cd84e8e807723c0d43100dc5d2fdabf97b4e45a67e0830ee522f9b62a91b4185d13c69a73bfa4529001ba87ea82f

  • SSDEEP

    12288:9Iny5DYTuqfZTuAiSabzGbHgHotq8ho5SJuFbK+IeQ6Gk3/fmwtN9:pUTuqfZuA0ib7fhXwxjAmewtN

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\257c4ba98ddc6fd71ed76c7250ea2902d5909f30468f0bb21e9d3b1de2b11264.exe
    "C:\Users\Admin\AppData\Local\Temp\257c4ba98ddc6fd71ed76c7250ea2902d5909f30468f0bb21e9d3b1de2b11264.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4008
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1420
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:5028
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5064
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:4900
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1964
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2980
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:1756
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4924
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:628
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2584
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:2844
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:4832
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:2948

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsfD4DB.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nsfD4DB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsfD4DB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsfD4DB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsfD4DB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsfD4DB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsfD4DB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsfD4DB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsfD4DB.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            4b3773c3e43b837f2be93d24a38beb45

            SHA1

            02ddca9a1a7707a456b7742d2035d1e30aaeb9b2

            SHA256

            2e91462035e76cd1ca6aa10a1c38f546a3f9a3bf72201ec8bb932192625c896b

            SHA512

            b1c43c1dcef5e052f0257b3d89787cfb82467249dd755aa174228a3df4415b6d051b8127d2f7d73bcdd7a06310284fb9bd7b86d6c4ef8374656ba5dd3f79f7ee

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            4b3773c3e43b837f2be93d24a38beb45

            SHA1

            02ddca9a1a7707a456b7742d2035d1e30aaeb9b2

            SHA256

            2e91462035e76cd1ca6aa10a1c38f546a3f9a3bf72201ec8bb932192625c896b

            SHA512

            b1c43c1dcef5e052f0257b3d89787cfb82467249dd755aa174228a3df4415b6d051b8127d2f7d73bcdd7a06310284fb9bd7b86d6c4ef8374656ba5dd3f79f7ee

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            4b3773c3e43b837f2be93d24a38beb45

            SHA1

            02ddca9a1a7707a456b7742d2035d1e30aaeb9b2

            SHA256

            2e91462035e76cd1ca6aa10a1c38f546a3f9a3bf72201ec8bb932192625c896b

            SHA512

            b1c43c1dcef5e052f0257b3d89787cfb82467249dd755aa174228a3df4415b6d051b8127d2f7d73bcdd7a06310284fb9bd7b86d6c4ef8374656ba5dd3f79f7ee

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            4b3773c3e43b837f2be93d24a38beb45

            SHA1

            02ddca9a1a7707a456b7742d2035d1e30aaeb9b2

            SHA256

            2e91462035e76cd1ca6aa10a1c38f546a3f9a3bf72201ec8bb932192625c896b

            SHA512

            b1c43c1dcef5e052f0257b3d89787cfb82467249dd755aa174228a3df4415b6d051b8127d2f7d73bcdd7a06310284fb9bd7b86d6c4ef8374656ba5dd3f79f7ee

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            ef86eb2c45bad947a1b428b411ffa166

            SHA1

            35a5e5f1544471c9acba577e94b5c1ee8818b8e5

            SHA256

            3f08e2a65b72a1ffc7951f992b05a68180d8626aa96818a3792df3a5eb3a84a0

            SHA512

            8979619ac2b61468195d6e407b0b4533155a3c5b75c374a2c3ef7d858b57dbfc90f98944b3c3247f66d53ea64f4fe80be9c0372479c9ee7bacdc40a8400c56d9

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            ef86eb2c45bad947a1b428b411ffa166

            SHA1

            35a5e5f1544471c9acba577e94b5c1ee8818b8e5

            SHA256

            3f08e2a65b72a1ffc7951f992b05a68180d8626aa96818a3792df3a5eb3a84a0

            SHA512

            8979619ac2b61468195d6e407b0b4533155a3c5b75c374a2c3ef7d858b57dbfc90f98944b3c3247f66d53ea64f4fe80be9c0372479c9ee7bacdc40a8400c56d9

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            241KB

            MD5

            ef86eb2c45bad947a1b428b411ffa166

            SHA1

            35a5e5f1544471c9acba577e94b5c1ee8818b8e5

            SHA256

            3f08e2a65b72a1ffc7951f992b05a68180d8626aa96818a3792df3a5eb3a84a0

            SHA512

            8979619ac2b61468195d6e407b0b4533155a3c5b75c374a2c3ef7d858b57dbfc90f98944b3c3247f66d53ea64f4fe80be9c0372479c9ee7bacdc40a8400c56d9

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            c52de8c1e2c3ac81d9c6ec8704d7f3fc

            SHA1

            73ea24f0fbe1914a5e7997ef0112978aa954c2e8

            SHA256

            b9c4eae52a61175394c9de1239c9ae8ffa545af731a0a25c7100ae8ff02b41b2

            SHA512

            722c39c76a259553f65be997d7631ca0e42631f2a0e6040765f253a68b87909be3f768ed1ce230ca179b5ef170d37cc5bd2a88656b8e50a973079ebbc245fef7

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            c52de8c1e2c3ac81d9c6ec8704d7f3fc

            SHA1

            73ea24f0fbe1914a5e7997ef0112978aa954c2e8

            SHA256

            b9c4eae52a61175394c9de1239c9ae8ffa545af731a0a25c7100ae8ff02b41b2

            SHA512

            722c39c76a259553f65be997d7631ca0e42631f2a0e6040765f253a68b87909be3f768ed1ce230ca179b5ef170d37cc5bd2a88656b8e50a973079ebbc245fef7

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            89f833aae15d1fac28d88a4bd0cb46c3

            SHA1

            5b7b52dbb201ae3a259ba2af54d913e9c50e949d

            SHA256

            777e1894b5fb837791a1c890da31b172dcec10096735598f8a607af45104385e

            SHA512

            9783eaf47daa28af8bac3223caef9dfe8daf8e0b16806997c098e72f68cb02a56465cacf622e5f68ef23e04209ab30c2cdeede123ad3a64f13d3bb0d2e97369e

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            89f833aae15d1fac28d88a4bd0cb46c3

            SHA1

            5b7b52dbb201ae3a259ba2af54d913e9c50e949d

            SHA256

            777e1894b5fb837791a1c890da31b172dcec10096735598f8a607af45104385e

            SHA512

            9783eaf47daa28af8bac3223caef9dfe8daf8e0b16806997c098e72f68cb02a56465cacf622e5f68ef23e04209ab30c2cdeede123ad3a64f13d3bb0d2e97369e

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            89f833aae15d1fac28d88a4bd0cb46c3

            SHA1

            5b7b52dbb201ae3a259ba2af54d913e9c50e949d

            SHA256

            777e1894b5fb837791a1c890da31b172dcec10096735598f8a607af45104385e

            SHA512

            9783eaf47daa28af8bac3223caef9dfe8daf8e0b16806997c098e72f68cb02a56465cacf622e5f68ef23e04209ab30c2cdeede123ad3a64f13d3bb0d2e97369e

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            d1f8abc3847e1abaf3eae9407fcf538b

            SHA1

            0d8a9042fd29dff375ed1020b9fc56235e6d4ac5

            SHA256

            a32f33e9124e3cb4728561f3086c44cb39b85fb316f0e9e6957affbe87ca1c45

            SHA512

            8f722fc5ac71392e7199bf14d7b3767a52481dac0e3674747755f46bbe2bfca84dd24d0a3eaceadd7c0b185a9b06788b3f08569d8a2e410ad9d6f74b5bb658de

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            d1f8abc3847e1abaf3eae9407fcf538b

            SHA1

            0d8a9042fd29dff375ed1020b9fc56235e6d4ac5

            SHA256

            a32f33e9124e3cb4728561f3086c44cb39b85fb316f0e9e6957affbe87ca1c45

            SHA512

            8f722fc5ac71392e7199bf14d7b3767a52481dac0e3674747755f46bbe2bfca84dd24d0a3eaceadd7c0b185a9b06788b3f08569d8a2e410ad9d6f74b5bb658de

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            d1f8abc3847e1abaf3eae9407fcf538b

            SHA1

            0d8a9042fd29dff375ed1020b9fc56235e6d4ac5

            SHA256

            a32f33e9124e3cb4728561f3086c44cb39b85fb316f0e9e6957affbe87ca1c45

            SHA512

            8f722fc5ac71392e7199bf14d7b3767a52481dac0e3674747755f46bbe2bfca84dd24d0a3eaceadd7c0b185a9b06788b3f08569d8a2e410ad9d6f74b5bb658de

          • memory/4008-132-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/4008-168-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB