Analysis
-
max time kernel
175s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe
Resource
win10v2004-20220812-en
General
-
Target
90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe
-
Size
672KB
-
MD5
100f05637837da051b77c780cfec1134
-
SHA1
a7acdde4ee8afa09a52d1e0ca150cf0777ea0ab9
-
SHA256
90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da
-
SHA512
34c0f3b7e7bc539561ffa786db8f9f56d310eedfde591c0e7df257737003df18e200b5f0606401686a34b7a4b924a4e35e977818fd8023188c028614f595fc40
-
SSDEEP
12288:V+1VlCxzXBInIv+iZXStVTEtOJ34ETYoNMWDIjsy6gkUqbfD1JkhtSficBIE:2VIxy0hS/ThYoNMWDk/60MfDvkhtSfip
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe -
Executes dropped EXE 5 IoCs
pid Process 4696 installd.exe 3664 nethtsrv.exe 1400 netupdsrv.exe 176 nethtsrv.exe 3792 netupdsrv.exe -
Loads dropped DLL 14 IoCs
pid Process 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 4696 installd.exe 3664 nethtsrv.exe 3664 nethtsrv.exe 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 176 nethtsrv.exe 176 nethtsrv.exe 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\netupdsrv.exe 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe File created C:\Windows\SysWOW64\hfnapi.dll 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe File created C:\Windows\SysWOW64\hfpapi.dll 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe File created C:\Windows\SysWOW64\installd.exe 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe File created C:\Windows\SysWOW64\nethtsrv.exe 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 176 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 768 wrote to memory of 2040 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 82 PID 768 wrote to memory of 2040 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 82 PID 768 wrote to memory of 2040 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 82 PID 2040 wrote to memory of 1108 2040 net.exe 84 PID 2040 wrote to memory of 1108 2040 net.exe 84 PID 2040 wrote to memory of 1108 2040 net.exe 84 PID 768 wrote to memory of 4548 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 85 PID 768 wrote to memory of 4548 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 85 PID 768 wrote to memory of 4548 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 85 PID 4548 wrote to memory of 4808 4548 net.exe 87 PID 4548 wrote to memory of 4808 4548 net.exe 87 PID 4548 wrote to memory of 4808 4548 net.exe 87 PID 768 wrote to memory of 4696 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 88 PID 768 wrote to memory of 4696 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 88 PID 768 wrote to memory of 4696 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 88 PID 768 wrote to memory of 3664 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 89 PID 768 wrote to memory of 3664 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 89 PID 768 wrote to memory of 3664 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 89 PID 768 wrote to memory of 1400 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 91 PID 768 wrote to memory of 1400 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 91 PID 768 wrote to memory of 1400 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 91 PID 768 wrote to memory of 756 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 93 PID 768 wrote to memory of 756 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 93 PID 768 wrote to memory of 756 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 93 PID 756 wrote to memory of 1588 756 net.exe 95 PID 756 wrote to memory of 1588 756 net.exe 95 PID 756 wrote to memory of 1588 756 net.exe 95 PID 768 wrote to memory of 3516 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 97 PID 768 wrote to memory of 3516 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 97 PID 768 wrote to memory of 3516 768 90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe 97 PID 3516 wrote to memory of 1452 3516 net.exe 99 PID 3516 wrote to memory of 1452 3516 net.exe 99 PID 3516 wrote to memory of 1452 3516 net.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe"C:\Users\Admin\AppData\Local\Temp\90ea0f007830403c8a78bface32595781b628cbc4732d1c9aa88b268a0a3f0da.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1108
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:4808
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4696
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3664
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1400
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1588
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1452
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:176
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:3792
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5b92ec1c94ad883fab9ad15c92c9f499f
SHA1da5b9354d87abdf43575cf735c5bdf4235f0aa0e
SHA256c5ad5bee6ec5cbf45b449e890bb79a42c5158be46298d22c42f1f12c90909052
SHA512b0232994d275fe2baad9147e5631a85366fab6820e1c431d7f29ae1ce879e80b29bd48d8ee1ae079a83173018277e2dd206dbdcba2a1390dbf1775b580b152bc
-
Filesize
106KB
MD5b92ec1c94ad883fab9ad15c92c9f499f
SHA1da5b9354d87abdf43575cf735c5bdf4235f0aa0e
SHA256c5ad5bee6ec5cbf45b449e890bb79a42c5158be46298d22c42f1f12c90909052
SHA512b0232994d275fe2baad9147e5631a85366fab6820e1c431d7f29ae1ce879e80b29bd48d8ee1ae079a83173018277e2dd206dbdcba2a1390dbf1775b580b152bc
-
Filesize
106KB
MD5b92ec1c94ad883fab9ad15c92c9f499f
SHA1da5b9354d87abdf43575cf735c5bdf4235f0aa0e
SHA256c5ad5bee6ec5cbf45b449e890bb79a42c5158be46298d22c42f1f12c90909052
SHA512b0232994d275fe2baad9147e5631a85366fab6820e1c431d7f29ae1ce879e80b29bd48d8ee1ae079a83173018277e2dd206dbdcba2a1390dbf1775b580b152bc
-
Filesize
106KB
MD5b92ec1c94ad883fab9ad15c92c9f499f
SHA1da5b9354d87abdf43575cf735c5bdf4235f0aa0e
SHA256c5ad5bee6ec5cbf45b449e890bb79a42c5158be46298d22c42f1f12c90909052
SHA512b0232994d275fe2baad9147e5631a85366fab6820e1c431d7f29ae1ce879e80b29bd48d8ee1ae079a83173018277e2dd206dbdcba2a1390dbf1775b580b152bc
-
Filesize
241KB
MD51da21e58799a7e25680bf72adb1455e2
SHA157e21d3fa605403781a02c12b0d93fd5401f238e
SHA25681d007c07ab4471dae6731962c84600f44b10673c8a89c5243b04cb00a398fbb
SHA5125ddeb5f6fff4e65c7a11ce9316ec02815ac82ce62f14b88df787d4d271675614b35b1b999145cb99337488b46eb3345dd9582205206f3763224ac860a5a6fbbd
-
Filesize
241KB
MD51da21e58799a7e25680bf72adb1455e2
SHA157e21d3fa605403781a02c12b0d93fd5401f238e
SHA25681d007c07ab4471dae6731962c84600f44b10673c8a89c5243b04cb00a398fbb
SHA5125ddeb5f6fff4e65c7a11ce9316ec02815ac82ce62f14b88df787d4d271675614b35b1b999145cb99337488b46eb3345dd9582205206f3763224ac860a5a6fbbd
-
Filesize
241KB
MD51da21e58799a7e25680bf72adb1455e2
SHA157e21d3fa605403781a02c12b0d93fd5401f238e
SHA25681d007c07ab4471dae6731962c84600f44b10673c8a89c5243b04cb00a398fbb
SHA5125ddeb5f6fff4e65c7a11ce9316ec02815ac82ce62f14b88df787d4d271675614b35b1b999145cb99337488b46eb3345dd9582205206f3763224ac860a5a6fbbd
-
Filesize
108KB
MD5833e4f58b965a43754c7ba4ca06be9b6
SHA1ff8887e9cb43b300b4ffa7220acda996cf7921fe
SHA256ecd48dfe47a4e0b3b718a70a00df20df475dbc38b6227bc073ad4c1b3a0aff57
SHA5126f9284d054ccd9ae8b41111b255fd80585d00a27b2aff3409b575bb2d58b8eb9aa8a6f35cb626e9f1a8d185e923ea4e28dd496654e4e6350596d6ec4540e7c3d
-
Filesize
108KB
MD5833e4f58b965a43754c7ba4ca06be9b6
SHA1ff8887e9cb43b300b4ffa7220acda996cf7921fe
SHA256ecd48dfe47a4e0b3b718a70a00df20df475dbc38b6227bc073ad4c1b3a0aff57
SHA5126f9284d054ccd9ae8b41111b255fd80585d00a27b2aff3409b575bb2d58b8eb9aa8a6f35cb626e9f1a8d185e923ea4e28dd496654e4e6350596d6ec4540e7c3d
-
Filesize
176KB
MD5af428162e99795c28b783ecfc97d7da5
SHA1f110e846c2f1f2665fedb84f86978350c5b40497
SHA25605640ad23862d7881b5d3e6b103980b9c0ed9e98c3728116aa43d3d9cc87110f
SHA512292b7355cd833b1910182b28da5af13529c8db270ef96c0b76c8703d9195fe2e7a7f8c71e9a40035c800cc317ae188908778b4ec3caffb9e8a9ea368f447ce0e
-
Filesize
176KB
MD5af428162e99795c28b783ecfc97d7da5
SHA1f110e846c2f1f2665fedb84f86978350c5b40497
SHA25605640ad23862d7881b5d3e6b103980b9c0ed9e98c3728116aa43d3d9cc87110f
SHA512292b7355cd833b1910182b28da5af13529c8db270ef96c0b76c8703d9195fe2e7a7f8c71e9a40035c800cc317ae188908778b4ec3caffb9e8a9ea368f447ce0e
-
Filesize
176KB
MD5af428162e99795c28b783ecfc97d7da5
SHA1f110e846c2f1f2665fedb84f86978350c5b40497
SHA25605640ad23862d7881b5d3e6b103980b9c0ed9e98c3728116aa43d3d9cc87110f
SHA512292b7355cd833b1910182b28da5af13529c8db270ef96c0b76c8703d9195fe2e7a7f8c71e9a40035c800cc317ae188908778b4ec3caffb9e8a9ea368f447ce0e
-
Filesize
158KB
MD559a9b5917c534b9967be41493f022dd1
SHA15bfed7858398741cce3ffa1641c4f04aa44a8f2b
SHA2562534638ea6cead8b69370d31e385c5ae904be71f7e68a5ccdebb31f50f0f6b14
SHA512494d1c954d32f8d2f3beb8de58d3b8b94d4dc661ce2184ec8c866f6413ac7d37eab81d4cc3b2eaa1bb7f57701fe150c4baa1bdddf54080acd812b77efd1a703f
-
Filesize
158KB
MD559a9b5917c534b9967be41493f022dd1
SHA15bfed7858398741cce3ffa1641c4f04aa44a8f2b
SHA2562534638ea6cead8b69370d31e385c5ae904be71f7e68a5ccdebb31f50f0f6b14
SHA512494d1c954d32f8d2f3beb8de58d3b8b94d4dc661ce2184ec8c866f6413ac7d37eab81d4cc3b2eaa1bb7f57701fe150c4baa1bdddf54080acd812b77efd1a703f
-
Filesize
158KB
MD559a9b5917c534b9967be41493f022dd1
SHA15bfed7858398741cce3ffa1641c4f04aa44a8f2b
SHA2562534638ea6cead8b69370d31e385c5ae904be71f7e68a5ccdebb31f50f0f6b14
SHA512494d1c954d32f8d2f3beb8de58d3b8b94d4dc661ce2184ec8c866f6413ac7d37eab81d4cc3b2eaa1bb7f57701fe150c4baa1bdddf54080acd812b77efd1a703f