Analysis
-
max time kernel
91s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 06:09
Static task
static1
Behavioral task
behavioral1
Sample
bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe
Resource
win10v2004-20220901-en
General
-
Target
bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe
-
Size
675KB
-
MD5
51738b8a4823b0e494add57169a078b9
-
SHA1
57aac8f87a6b6790d5056e0ce5ee282bd15506c1
-
SHA256
bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a
-
SHA512
c3a0a3e09025312581f7d32df8e61e6c682d1ace59022cb3af7a70c75671bf98b925e19aea7638545f58cabdddab2f8b0c6b776fadcaa296a79be4a286985743
-
SSDEEP
12288:Bdgmy6lZ8E9soPvow2bfzJjxjPKm9LEfAKlzqA6IVk4t6vpFzUujrqXX07O5l9:BdgX6tTLafFjFxREYID6mXX0w
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe -
Executes dropped EXE 5 IoCs
pid Process 2724 installd.exe 2392 nethtsrv.exe 4244 netupdsrv.exe 4548 nethtsrv.exe 3068 netupdsrv.exe -
Loads dropped DLL 14 IoCs
pid Process 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 2724 installd.exe 2392 nethtsrv.exe 2392 nethtsrv.exe 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 4548 nethtsrv.exe 4548 nethtsrv.exe 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\installd.exe bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe File created C:\Windows\SysWOW64\nethtsrv.exe bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe File created C:\Windows\SysWOW64\netupdsrv.exe bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe File created C:\Windows\SysWOW64\hfnapi.dll bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe File created C:\Windows\SysWOW64\hfpapi.dll bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4548 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4992 wrote to memory of 3588 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 82 PID 4992 wrote to memory of 3588 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 82 PID 4992 wrote to memory of 3588 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 82 PID 3588 wrote to memory of 5088 3588 net.exe 84 PID 3588 wrote to memory of 5088 3588 net.exe 84 PID 3588 wrote to memory of 5088 3588 net.exe 84 PID 4992 wrote to memory of 3624 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 85 PID 4992 wrote to memory of 3624 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 85 PID 4992 wrote to memory of 3624 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 85 PID 3624 wrote to memory of 2292 3624 net.exe 87 PID 3624 wrote to memory of 2292 3624 net.exe 87 PID 3624 wrote to memory of 2292 3624 net.exe 87 PID 4992 wrote to memory of 2724 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 88 PID 4992 wrote to memory of 2724 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 88 PID 4992 wrote to memory of 2724 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 88 PID 4992 wrote to memory of 2392 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 91 PID 4992 wrote to memory of 2392 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 91 PID 4992 wrote to memory of 2392 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 91 PID 4992 wrote to memory of 4244 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 94 PID 4992 wrote to memory of 4244 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 94 PID 4992 wrote to memory of 4244 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 94 PID 4992 wrote to memory of 3324 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 96 PID 4992 wrote to memory of 3324 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 96 PID 4992 wrote to memory of 3324 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 96 PID 3324 wrote to memory of 1964 3324 net.exe 98 PID 3324 wrote to memory of 1964 3324 net.exe 98 PID 3324 wrote to memory of 1964 3324 net.exe 98 PID 4992 wrote to memory of 3608 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 100 PID 4992 wrote to memory of 3608 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 100 PID 4992 wrote to memory of 3608 4992 bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe 100 PID 3608 wrote to memory of 392 3608 net.exe 103 PID 3608 wrote to memory of 392 3608 net.exe 103 PID 3608 wrote to memory of 392 3608 net.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe"C:\Users\Admin\AppData\Local\Temp\bddd13255da2800e78412ec475e350e36f469086c9b6e39a4b5546befe94fb7a.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:5088
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:2292
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2724
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2392
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:4244
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1964
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:392
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:3068
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5ea5830f3b235117bf3197fb1499595fe
SHA1a942129351450120f063778f0404d8097f074bcc
SHA2562fb1634aef6f94f45e2c10927177d5fd6b1e1dfd4fe934e63f094a092abc727f
SHA5125381c386208101e4addb8b2491dfb68223eb0e09e531386d0904b8df8c03bc1fb9174a13182124bbe5dfa02de64bccdbedd171006eae2060e6171863b0f57f21
-
Filesize
106KB
MD5ea5830f3b235117bf3197fb1499595fe
SHA1a942129351450120f063778f0404d8097f074bcc
SHA2562fb1634aef6f94f45e2c10927177d5fd6b1e1dfd4fe934e63f094a092abc727f
SHA5125381c386208101e4addb8b2491dfb68223eb0e09e531386d0904b8df8c03bc1fb9174a13182124bbe5dfa02de64bccdbedd171006eae2060e6171863b0f57f21
-
Filesize
106KB
MD5ea5830f3b235117bf3197fb1499595fe
SHA1a942129351450120f063778f0404d8097f074bcc
SHA2562fb1634aef6f94f45e2c10927177d5fd6b1e1dfd4fe934e63f094a092abc727f
SHA5125381c386208101e4addb8b2491dfb68223eb0e09e531386d0904b8df8c03bc1fb9174a13182124bbe5dfa02de64bccdbedd171006eae2060e6171863b0f57f21
-
Filesize
106KB
MD5ea5830f3b235117bf3197fb1499595fe
SHA1a942129351450120f063778f0404d8097f074bcc
SHA2562fb1634aef6f94f45e2c10927177d5fd6b1e1dfd4fe934e63f094a092abc727f
SHA5125381c386208101e4addb8b2491dfb68223eb0e09e531386d0904b8df8c03bc1fb9174a13182124bbe5dfa02de64bccdbedd171006eae2060e6171863b0f57f21
-
Filesize
244KB
MD5e8902ce40bd7919de3fb72fd088c8c8d
SHA1d612ab2343770584908e47d395169697e29d387e
SHA256f9ade3295b4ab9617cba9bb7ee40237775edd1f5c8969c03675f38cb4f9b5c44
SHA5122adaf5358321a1ea1f609256d0eb5830a38596bda7fc55fae8ab0d88c62b92a5727f022cb64a8e784a5b73312594fa632372d250a7331166de30b57bc154fcc1
-
Filesize
244KB
MD5e8902ce40bd7919de3fb72fd088c8c8d
SHA1d612ab2343770584908e47d395169697e29d387e
SHA256f9ade3295b4ab9617cba9bb7ee40237775edd1f5c8969c03675f38cb4f9b5c44
SHA5122adaf5358321a1ea1f609256d0eb5830a38596bda7fc55fae8ab0d88c62b92a5727f022cb64a8e784a5b73312594fa632372d250a7331166de30b57bc154fcc1
-
Filesize
244KB
MD5e8902ce40bd7919de3fb72fd088c8c8d
SHA1d612ab2343770584908e47d395169697e29d387e
SHA256f9ade3295b4ab9617cba9bb7ee40237775edd1f5c8969c03675f38cb4f9b5c44
SHA5122adaf5358321a1ea1f609256d0eb5830a38596bda7fc55fae8ab0d88c62b92a5727f022cb64a8e784a5b73312594fa632372d250a7331166de30b57bc154fcc1
-
Filesize
108KB
MD5252061f2119906dfe328b9892d65162d
SHA10a67a2e66fddea4b30555ef37955ac5c9532beb6
SHA25636f0335c25a27daa025e0414e3cbbbbf3bce4413d3b1c87ed1d56b7a6229b2bb
SHA512f08b24ca53b3dcbad827c5cbc0a022b141e615a96058176747d18efcbd72fb76b91aa2db95d45542e3e98dd15865c124cc1b859361c7f005c63e50632472d7f6
-
Filesize
108KB
MD5252061f2119906dfe328b9892d65162d
SHA10a67a2e66fddea4b30555ef37955ac5c9532beb6
SHA25636f0335c25a27daa025e0414e3cbbbbf3bce4413d3b1c87ed1d56b7a6229b2bb
SHA512f08b24ca53b3dcbad827c5cbc0a022b141e615a96058176747d18efcbd72fb76b91aa2db95d45542e3e98dd15865c124cc1b859361c7f005c63e50632472d7f6
-
Filesize
176KB
MD5008731b23d0f465effc0a7e2d15c2f0b
SHA1413db00134bd5b9691298444eb35f8fd7af1664b
SHA256f8ab2d745419655936dbcf31d6c18efdf5c3b4f4b875c3993f9f57bccd3a1549
SHA5122a659aabd794160451e5f47d5d89cf332e281a8879f00043509f0b46bc3740f7248380115b1b5c4d44f846b9465c66f8e7d54f8d0d6e62a459ca3b7ca8831419
-
Filesize
176KB
MD5008731b23d0f465effc0a7e2d15c2f0b
SHA1413db00134bd5b9691298444eb35f8fd7af1664b
SHA256f8ab2d745419655936dbcf31d6c18efdf5c3b4f4b875c3993f9f57bccd3a1549
SHA5122a659aabd794160451e5f47d5d89cf332e281a8879f00043509f0b46bc3740f7248380115b1b5c4d44f846b9465c66f8e7d54f8d0d6e62a459ca3b7ca8831419
-
Filesize
176KB
MD5008731b23d0f465effc0a7e2d15c2f0b
SHA1413db00134bd5b9691298444eb35f8fd7af1664b
SHA256f8ab2d745419655936dbcf31d6c18efdf5c3b4f4b875c3993f9f57bccd3a1549
SHA5122a659aabd794160451e5f47d5d89cf332e281a8879f00043509f0b46bc3740f7248380115b1b5c4d44f846b9465c66f8e7d54f8d0d6e62a459ca3b7ca8831419
-
Filesize
158KB
MD58d0d73b185476484ca076e2f9fb4439e
SHA175092f2ccc7946cc83358720e9921e9a8b053369
SHA256f34272c64632209fe10fc03bf67963dfca37903e361392c3bfceaca48a82b522
SHA512330c4d077a4cebef80ca9b3f83f8c305bd28649f8d117efc3120010583b4f9a67a5c34bc2058bd71ebb488a828156bd57a810f248be0434f2c20c505ba72ad35
-
Filesize
158KB
MD58d0d73b185476484ca076e2f9fb4439e
SHA175092f2ccc7946cc83358720e9921e9a8b053369
SHA256f34272c64632209fe10fc03bf67963dfca37903e361392c3bfceaca48a82b522
SHA512330c4d077a4cebef80ca9b3f83f8c305bd28649f8d117efc3120010583b4f9a67a5c34bc2058bd71ebb488a828156bd57a810f248be0434f2c20c505ba72ad35
-
Filesize
158KB
MD58d0d73b185476484ca076e2f9fb4439e
SHA175092f2ccc7946cc83358720e9921e9a8b053369
SHA256f34272c64632209fe10fc03bf67963dfca37903e361392c3bfceaca48a82b522
SHA512330c4d077a4cebef80ca9b3f83f8c305bd28649f8d117efc3120010583b4f9a67a5c34bc2058bd71ebb488a828156bd57a810f248be0434f2c20c505ba72ad35