Analysis
-
max time kernel
293s -
max time network
349s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 06:01
Static task
static1
Behavioral task
behavioral1
Sample
d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe
Resource
win10v2004-20221111-en
General
-
Target
d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe
-
Size
695KB
-
MD5
3ef432bbf8cf07c9211e2d782ea5a6b1
-
SHA1
e320f0a946261797d8da0a4bc540f619148d0271
-
SHA256
d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e
-
SHA512
708ebf43fd95c2cf5fa27b6726e37a4e5445990903e3e6af283f207911eb1e15fdf581eb5bd44cd02b8b176327857f2d2e1d9bfe6a87a1a2e049e05de8e672d0
-
SSDEEP
12288:8Abu3fQ+thk6Ezvbfo0TWNKuMu/sDj+nvnOfYrG0xVocIoMLJAFK4xhWt/:8AbuPPEzzf/puF/uynWmG0jzIb+pm
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe -
Executes dropped EXE 2 IoCs
pid Process 3952 installd.exe 3672 nethtsrv.exe -
Loads dropped DLL 8 IoCs
pid Process 1084 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 1084 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 1084 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 1084 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 1084 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 3952 installd.exe 3672 nethtsrv.exe 3672 nethtsrv.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\netupdsrv.exe d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe File created C:\Windows\SysWOW64\hfnapi.dll d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe File created C:\Windows\SysWOW64\hfpapi.dll d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe File created C:\Windows\SysWOW64\installd.exe d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe File created C:\Windows\SysWOW64\nethtsrv.exe d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1084 wrote to memory of 4704 1084 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 83 PID 1084 wrote to memory of 4704 1084 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 83 PID 1084 wrote to memory of 4704 1084 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 83 PID 4704 wrote to memory of 2748 4704 net.exe 85 PID 4704 wrote to memory of 2748 4704 net.exe 85 PID 4704 wrote to memory of 2748 4704 net.exe 85 PID 1084 wrote to memory of 3884 1084 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 86 PID 1084 wrote to memory of 3884 1084 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 86 PID 1084 wrote to memory of 3884 1084 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 86 PID 3884 wrote to memory of 3476 3884 net.exe 88 PID 3884 wrote to memory of 3476 3884 net.exe 88 PID 3884 wrote to memory of 3476 3884 net.exe 88 PID 1084 wrote to memory of 3952 1084 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 89 PID 1084 wrote to memory of 3952 1084 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 89 PID 1084 wrote to memory of 3952 1084 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 89 PID 1084 wrote to memory of 3672 1084 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 91 PID 1084 wrote to memory of 3672 1084 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 91 PID 1084 wrote to memory of 3672 1084 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe"C:\Users\Admin\AppData\Local\Temp\d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:2748
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:3476
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3952
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3672
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD57dd815f6ea982848a71866e967f031cc
SHA110038ac72bc6b26dc6fe819c0524e60eaab8e306
SHA256adc16d3cc6bd399cfe809957ad6d4b27b2421c805c009dfd0ac5de82772b31cd
SHA5124b5294e2b17b1812b2d1415a100fd99407d2c3ea31774dfbdd6943c553d5cb48a11cb6873a00c9f9eec34e472f2786ada7c08f23e3e8030eff24f81cbb04e008
-
Filesize
106KB
MD57dd815f6ea982848a71866e967f031cc
SHA110038ac72bc6b26dc6fe819c0524e60eaab8e306
SHA256adc16d3cc6bd399cfe809957ad6d4b27b2421c805c009dfd0ac5de82772b31cd
SHA5124b5294e2b17b1812b2d1415a100fd99407d2c3ea31774dfbdd6943c553d5cb48a11cb6873a00c9f9eec34e472f2786ada7c08f23e3e8030eff24f81cbb04e008
-
Filesize
106KB
MD57dd815f6ea982848a71866e967f031cc
SHA110038ac72bc6b26dc6fe819c0524e60eaab8e306
SHA256adc16d3cc6bd399cfe809957ad6d4b27b2421c805c009dfd0ac5de82772b31cd
SHA5124b5294e2b17b1812b2d1415a100fd99407d2c3ea31774dfbdd6943c553d5cb48a11cb6873a00c9f9eec34e472f2786ada7c08f23e3e8030eff24f81cbb04e008
-
Filesize
241KB
MD57163b4419c5c6f4ac8ea997b02772338
SHA1a2aebd63f37842bd47afb6ed5dd701fb6ee2f59c
SHA256dfc800c13c44ec9f076515a55c1382ac0f15e1410c0f53c79deac781f9a066b5
SHA512ab9e3627c12d1c6de9e19cff537c703a45c0b55ef28108c3f949e84c7139ceb7d78fb65fc0a07d07b77a49fe557d785c42aa66f38ec2cdaa00f5f9cfb78800e6
-
Filesize
241KB
MD57163b4419c5c6f4ac8ea997b02772338
SHA1a2aebd63f37842bd47afb6ed5dd701fb6ee2f59c
SHA256dfc800c13c44ec9f076515a55c1382ac0f15e1410c0f53c79deac781f9a066b5
SHA512ab9e3627c12d1c6de9e19cff537c703a45c0b55ef28108c3f949e84c7139ceb7d78fb65fc0a07d07b77a49fe557d785c42aa66f38ec2cdaa00f5f9cfb78800e6
-
Filesize
108KB
MD5f6b33bd9c92672a535751aa95ef2fff2
SHA15b36fab4ac52705869d7cb7b4c8b990f84405168
SHA256326feac22ea4f8013422aa231f4b21216ca7fa38b499aa9543face4a3569c552
SHA512428e19a008ac5f82d40bdb1e7ecc6e840d1d7a2f0e89052c5e6b9e0d89d84694274101d1a95b95ee0953f99dae0a8cc3bcb02855c12893ad57a4a02677a6f1cf
-
Filesize
108KB
MD5f6b33bd9c92672a535751aa95ef2fff2
SHA15b36fab4ac52705869d7cb7b4c8b990f84405168
SHA256326feac22ea4f8013422aa231f4b21216ca7fa38b499aa9543face4a3569c552
SHA512428e19a008ac5f82d40bdb1e7ecc6e840d1d7a2f0e89052c5e6b9e0d89d84694274101d1a95b95ee0953f99dae0a8cc3bcb02855c12893ad57a4a02677a6f1cf
-
Filesize
176KB
MD503cb1b626b043d78ba9b7adbfe91c0ad
SHA1a7da08b20776657c1b57b2c66e99ed05e9bf7fb7
SHA256bad06609b50688766cd0ce3b168b12b10c67cb3fadf42e1e0fdaa5c15ae08c3e
SHA5127a98da9abf80620d2de7d2ccfa1ff9cb5a79fd960df5421b4282a73d3d2049e887d6d451b08b4dab36fda8f3913663fa98418b204d5eaca041a7e19dc60b939b
-
Filesize
176KB
MD503cb1b626b043d78ba9b7adbfe91c0ad
SHA1a7da08b20776657c1b57b2c66e99ed05e9bf7fb7
SHA256bad06609b50688766cd0ce3b168b12b10c67cb3fadf42e1e0fdaa5c15ae08c3e
SHA5127a98da9abf80620d2de7d2ccfa1ff9cb5a79fd960df5421b4282a73d3d2049e887d6d451b08b4dab36fda8f3913663fa98418b204d5eaca041a7e19dc60b939b