Analysis
-
max time kernel
161s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe
Resource
win10v2004-20220812-en
General
-
Target
fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe
-
Size
695KB
-
MD5
f5711ee53cc24f523e267d907c9ae0c8
-
SHA1
1b8ca7db3b69fb6cde7aad4244f030661ca86dbe
-
SHA256
fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122
-
SHA512
54e26069507b3d4ff886723929cfde78bbde9d1da1981f3d447a9ec00dcf8961da6e17275df497314f5da0167bef1a3dff1ffc3c345c70fc5b0c668436e48b7a
-
SSDEEP
12288:0Abu3fQ+thk6Ezvbf1yrerCOKqGXrq1ijDWm39CIT9mOCI7U1dz:0AbuPPEzzf4eeOK/rsiD/Ci9mO7o
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe -
Executes dropped EXE 5 IoCs
pid Process 4912 installd.exe 516 nethtsrv.exe 452 netupdsrv.exe 1780 nethtsrv.exe 1692 netupdsrv.exe -
Loads dropped DLL 14 IoCs
pid Process 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 4912 installd.exe 516 nethtsrv.exe 516 nethtsrv.exe 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 1780 nethtsrv.exe 1780 nethtsrv.exe 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfnapi.dll fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe File created C:\Windows\SysWOW64\hfpapi.dll fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe File created C:\Windows\SysWOW64\installd.exe fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe File created C:\Windows\SysWOW64\nethtsrv.exe fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe File created C:\Windows\SysWOW64\netupdsrv.exe fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1780 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1236 wrote to memory of 836 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 80 PID 1236 wrote to memory of 836 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 80 PID 1236 wrote to memory of 836 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 80 PID 836 wrote to memory of 4768 836 net.exe 81 PID 836 wrote to memory of 4768 836 net.exe 81 PID 836 wrote to memory of 4768 836 net.exe 81 PID 1236 wrote to memory of 4420 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 82 PID 1236 wrote to memory of 4420 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 82 PID 1236 wrote to memory of 4420 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 82 PID 4420 wrote to memory of 4928 4420 net.exe 84 PID 4420 wrote to memory of 4928 4420 net.exe 84 PID 4420 wrote to memory of 4928 4420 net.exe 84 PID 1236 wrote to memory of 4912 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 85 PID 1236 wrote to memory of 4912 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 85 PID 1236 wrote to memory of 4912 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 85 PID 1236 wrote to memory of 516 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 86 PID 1236 wrote to memory of 516 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 86 PID 1236 wrote to memory of 516 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 86 PID 1236 wrote to memory of 452 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 88 PID 1236 wrote to memory of 452 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 88 PID 1236 wrote to memory of 452 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 88 PID 1236 wrote to memory of 4224 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 90 PID 1236 wrote to memory of 4224 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 90 PID 1236 wrote to memory of 4224 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 90 PID 4224 wrote to memory of 416 4224 net.exe 92 PID 4224 wrote to memory of 416 4224 net.exe 92 PID 4224 wrote to memory of 416 4224 net.exe 92 PID 1236 wrote to memory of 2436 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 94 PID 1236 wrote to memory of 2436 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 94 PID 1236 wrote to memory of 2436 1236 fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe 94 PID 2436 wrote to memory of 1616 2436 net.exe 96 PID 2436 wrote to memory of 1616 2436 net.exe 96 PID 2436 wrote to memory of 1616 2436 net.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe"C:\Users\Admin\AppData\Local\Temp\fface8fd30fd082bd9b73ecc55eeffa45a8da7f9b6d7580f54e6f899e8723122.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:4768
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:4928
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4912
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:516
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:452
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:416
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1616
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:1692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5dfb76a660d8989475aa4c292133d1dd1
SHA17690aebd8fd5551deb10145169eef78af30c964e
SHA2560588d6f23b55b92cff6b8b61d35c01f3df8fe66fc1824c4a8b7d3ef3467d4960
SHA512cf45ef2044e450c59ba8ebb20c837390f7b43dc4880334e620f0006a1b183f259e24ad23f7bd696ffe8ee74e7e7234ef9a8c3789b050dc0f01f97e45579ee3ae
-
Filesize
106KB
MD5dfb76a660d8989475aa4c292133d1dd1
SHA17690aebd8fd5551deb10145169eef78af30c964e
SHA2560588d6f23b55b92cff6b8b61d35c01f3df8fe66fc1824c4a8b7d3ef3467d4960
SHA512cf45ef2044e450c59ba8ebb20c837390f7b43dc4880334e620f0006a1b183f259e24ad23f7bd696ffe8ee74e7e7234ef9a8c3789b050dc0f01f97e45579ee3ae
-
Filesize
106KB
MD5dfb76a660d8989475aa4c292133d1dd1
SHA17690aebd8fd5551deb10145169eef78af30c964e
SHA2560588d6f23b55b92cff6b8b61d35c01f3df8fe66fc1824c4a8b7d3ef3467d4960
SHA512cf45ef2044e450c59ba8ebb20c837390f7b43dc4880334e620f0006a1b183f259e24ad23f7bd696ffe8ee74e7e7234ef9a8c3789b050dc0f01f97e45579ee3ae
-
Filesize
106KB
MD5dfb76a660d8989475aa4c292133d1dd1
SHA17690aebd8fd5551deb10145169eef78af30c964e
SHA2560588d6f23b55b92cff6b8b61d35c01f3df8fe66fc1824c4a8b7d3ef3467d4960
SHA512cf45ef2044e450c59ba8ebb20c837390f7b43dc4880334e620f0006a1b183f259e24ad23f7bd696ffe8ee74e7e7234ef9a8c3789b050dc0f01f97e45579ee3ae
-
Filesize
241KB
MD5fa231fb3835c6babbab922e667d60176
SHA11c5df587444c5119b75cd12fccaf8253fd9db191
SHA256fc3078b52b415ce75c78e9425c60514d52d22b8ff1205c22271c205b02112496
SHA5129490f189d69bb47f25a47ee976602eab6136f3402b8f310ea39c032b830e98231582deddbf51f73e67e9706c5bec4b333afcb37042c1cb0b219063412e867983
-
Filesize
241KB
MD5fa231fb3835c6babbab922e667d60176
SHA11c5df587444c5119b75cd12fccaf8253fd9db191
SHA256fc3078b52b415ce75c78e9425c60514d52d22b8ff1205c22271c205b02112496
SHA5129490f189d69bb47f25a47ee976602eab6136f3402b8f310ea39c032b830e98231582deddbf51f73e67e9706c5bec4b333afcb37042c1cb0b219063412e867983
-
Filesize
241KB
MD5fa231fb3835c6babbab922e667d60176
SHA11c5df587444c5119b75cd12fccaf8253fd9db191
SHA256fc3078b52b415ce75c78e9425c60514d52d22b8ff1205c22271c205b02112496
SHA5129490f189d69bb47f25a47ee976602eab6136f3402b8f310ea39c032b830e98231582deddbf51f73e67e9706c5bec4b333afcb37042c1cb0b219063412e867983
-
Filesize
108KB
MD5bf4898a9f3e909efab3300997751e1c5
SHA1dc6aa58e4f7a83b09da625f9769a0027b4db7d99
SHA256934595f0155cffe5c000f3902bf7540182da25aa73db1d5afaed238fe21f54f1
SHA512fb49a72d7c76d45c73ceaeec444a2e65143e214e4ebaf5e6c228baea4033caac8cbb2b297d6adf21245d1c6e2e6eb2ffa05591c3cde2f018167205f206b47e9c
-
Filesize
108KB
MD5bf4898a9f3e909efab3300997751e1c5
SHA1dc6aa58e4f7a83b09da625f9769a0027b4db7d99
SHA256934595f0155cffe5c000f3902bf7540182da25aa73db1d5afaed238fe21f54f1
SHA512fb49a72d7c76d45c73ceaeec444a2e65143e214e4ebaf5e6c228baea4033caac8cbb2b297d6adf21245d1c6e2e6eb2ffa05591c3cde2f018167205f206b47e9c
-
Filesize
176KB
MD5a79257dfef1c8068d980ebe2f121ebea
SHA148d416a341de2f218fae6af6690296ec964c9d50
SHA25696f33c35b41a6db71614b75b8f9aab324689bf3f25d99ceed7f2530b07d619f0
SHA51232c0be6c57628a0127f8716287b8f15c07788664427b71600fd1590f38ba07d2932ade8d5b0885945c34329adb3c3fa389764112b93688ac545ff64e44672e6e
-
Filesize
176KB
MD5a79257dfef1c8068d980ebe2f121ebea
SHA148d416a341de2f218fae6af6690296ec964c9d50
SHA25696f33c35b41a6db71614b75b8f9aab324689bf3f25d99ceed7f2530b07d619f0
SHA51232c0be6c57628a0127f8716287b8f15c07788664427b71600fd1590f38ba07d2932ade8d5b0885945c34329adb3c3fa389764112b93688ac545ff64e44672e6e
-
Filesize
176KB
MD5a79257dfef1c8068d980ebe2f121ebea
SHA148d416a341de2f218fae6af6690296ec964c9d50
SHA25696f33c35b41a6db71614b75b8f9aab324689bf3f25d99ceed7f2530b07d619f0
SHA51232c0be6c57628a0127f8716287b8f15c07788664427b71600fd1590f38ba07d2932ade8d5b0885945c34329adb3c3fa389764112b93688ac545ff64e44672e6e
-
Filesize
159KB
MD5104adfcf4f45e18fbe2780b0200c144f
SHA197cd5f388d3e175460149ce5db54e7c788bcbe96
SHA256a06ba009d3df9ecab0208c917ed3d690963d97682e9814bafa9baa42887add6f
SHA5124753a0a882b1816c3e43ba2e58f9fbe71840e2ddceadec90241830a64b955929503a00ee6f08e6df863024b0c341c3c4c9946e749eae87373b466abf102854af
-
Filesize
159KB
MD5104adfcf4f45e18fbe2780b0200c144f
SHA197cd5f388d3e175460149ce5db54e7c788bcbe96
SHA256a06ba009d3df9ecab0208c917ed3d690963d97682e9814bafa9baa42887add6f
SHA5124753a0a882b1816c3e43ba2e58f9fbe71840e2ddceadec90241830a64b955929503a00ee6f08e6df863024b0c341c3c4c9946e749eae87373b466abf102854af
-
Filesize
159KB
MD5104adfcf4f45e18fbe2780b0200c144f
SHA197cd5f388d3e175460149ce5db54e7c788bcbe96
SHA256a06ba009d3df9ecab0208c917ed3d690963d97682e9814bafa9baa42887add6f
SHA5124753a0a882b1816c3e43ba2e58f9fbe71840e2ddceadec90241830a64b955929503a00ee6f08e6df863024b0c341c3c4c9946e749eae87373b466abf102854af