Analysis
-
max time kernel
90s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 06:10
Static task
static1
Behavioral task
behavioral1
Sample
956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe
Resource
win10v2004-20220901-en
General
-
Target
956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe
-
Size
675KB
-
MD5
caad6a8e6accd67a9533172f5d44a17d
-
SHA1
94e4b257943026af1b0ca597eef968133f4bcedc
-
SHA256
956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090
-
SHA512
674d7ff3deba117dec54c6a8fe7a02564f63a1e8d50e5318ce66d9a9745acbeda24ed53fca3eb846d8aa36c2832b870769f5b29d388b377cb2b909745c6b1411
-
SSDEEP
12288:Hdgmy6lZ8E9soPvow2bfzBlLEFYCXpHB8uV34KLXwBQjULQdPQcVAah:HdgX6tTLafjLbCXp2uV34KLXwAdIcq
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe -
Executes dropped EXE 5 IoCs
pid Process 224 installd.exe 3748 nethtsrv.exe 940 netupdsrv.exe 1548 nethtsrv.exe 5020 netupdsrv.exe -
Loads dropped DLL 14 IoCs
pid Process 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 224 installd.exe 3748 nethtsrv.exe 3748 nethtsrv.exe 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 1548 nethtsrv.exe 1548 nethtsrv.exe 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfnapi.dll 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe File created C:\Windows\SysWOW64\hfpapi.dll 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe File created C:\Windows\SysWOW64\installd.exe 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe File created C:\Windows\SysWOW64\nethtsrv.exe 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe File created C:\Windows\SysWOW64\netupdsrv.exe 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1548 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2716 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 83 PID 2404 wrote to memory of 2716 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 83 PID 2404 wrote to memory of 2716 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 83 PID 2716 wrote to memory of 3740 2716 net.exe 85 PID 2716 wrote to memory of 3740 2716 net.exe 85 PID 2716 wrote to memory of 3740 2716 net.exe 85 PID 2404 wrote to memory of 3868 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 86 PID 2404 wrote to memory of 3868 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 86 PID 2404 wrote to memory of 3868 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 86 PID 3868 wrote to memory of 5052 3868 net.exe 88 PID 3868 wrote to memory of 5052 3868 net.exe 88 PID 3868 wrote to memory of 5052 3868 net.exe 88 PID 2404 wrote to memory of 224 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 91 PID 2404 wrote to memory of 224 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 91 PID 2404 wrote to memory of 224 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 91 PID 2404 wrote to memory of 3748 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 92 PID 2404 wrote to memory of 3748 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 92 PID 2404 wrote to memory of 3748 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 92 PID 2404 wrote to memory of 940 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 94 PID 2404 wrote to memory of 940 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 94 PID 2404 wrote to memory of 940 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 94 PID 2404 wrote to memory of 2512 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 97 PID 2404 wrote to memory of 2512 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 97 PID 2404 wrote to memory of 2512 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 97 PID 2512 wrote to memory of 2004 2512 net.exe 99 PID 2512 wrote to memory of 2004 2512 net.exe 99 PID 2512 wrote to memory of 2004 2512 net.exe 99 PID 2404 wrote to memory of 4620 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 101 PID 2404 wrote to memory of 4620 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 101 PID 2404 wrote to memory of 4620 2404 956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe 101 PID 4620 wrote to memory of 3460 4620 net.exe 103 PID 4620 wrote to memory of 3460 4620 net.exe 103 PID 4620 wrote to memory of 3460 4620 net.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe"C:\Users\Admin\AppData\Local\Temp\956fec0e0bc8e75fbe9622760499798d4d6bd36f9712dc9da1ca8391572f2090.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:3740
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:5052
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:224
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3748
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:940
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:2004
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:3460
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:5020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5fc969d2fa5cff651ea03bb8660282878
SHA1b0dad2552601e0d20c4a7cd51cfde6c31f520bd1
SHA2566c5d51bd4f9fcb3dc56c9d620b1d884337fff579f0adf1391316e83610054fb1
SHA5120476247a9d44a9ece12f062cd8bf9ff57432acc426c8fa574ebe1c42c4637232c9f83994fc5db5144d71497bcbc3685e5eaf31d2a3ec617c9798a00f147ff093
-
Filesize
106KB
MD5fc969d2fa5cff651ea03bb8660282878
SHA1b0dad2552601e0d20c4a7cd51cfde6c31f520bd1
SHA2566c5d51bd4f9fcb3dc56c9d620b1d884337fff579f0adf1391316e83610054fb1
SHA5120476247a9d44a9ece12f062cd8bf9ff57432acc426c8fa574ebe1c42c4637232c9f83994fc5db5144d71497bcbc3685e5eaf31d2a3ec617c9798a00f147ff093
-
Filesize
106KB
MD5fc969d2fa5cff651ea03bb8660282878
SHA1b0dad2552601e0d20c4a7cd51cfde6c31f520bd1
SHA2566c5d51bd4f9fcb3dc56c9d620b1d884337fff579f0adf1391316e83610054fb1
SHA5120476247a9d44a9ece12f062cd8bf9ff57432acc426c8fa574ebe1c42c4637232c9f83994fc5db5144d71497bcbc3685e5eaf31d2a3ec617c9798a00f147ff093
-
Filesize
106KB
MD5fc969d2fa5cff651ea03bb8660282878
SHA1b0dad2552601e0d20c4a7cd51cfde6c31f520bd1
SHA2566c5d51bd4f9fcb3dc56c9d620b1d884337fff579f0adf1391316e83610054fb1
SHA5120476247a9d44a9ece12f062cd8bf9ff57432acc426c8fa574ebe1c42c4637232c9f83994fc5db5144d71497bcbc3685e5eaf31d2a3ec617c9798a00f147ff093
-
Filesize
244KB
MD593568c3cf32c68a6dcd492bc3e30d989
SHA1ad076d5a7d5860edb3563af776e70289c602d1a0
SHA256f06b8f0ae4b22e46193074ff2955c0544111a87c0aca58702698a9cd60ca7094
SHA5124f3014a90ad5724aa9750dae36ec1535cea97d460435952ae6938d096f863efe69464015c69ed5fda971ff486cc76563347a90233743f62c4199adf2d94fdf6f
-
Filesize
244KB
MD593568c3cf32c68a6dcd492bc3e30d989
SHA1ad076d5a7d5860edb3563af776e70289c602d1a0
SHA256f06b8f0ae4b22e46193074ff2955c0544111a87c0aca58702698a9cd60ca7094
SHA5124f3014a90ad5724aa9750dae36ec1535cea97d460435952ae6938d096f863efe69464015c69ed5fda971ff486cc76563347a90233743f62c4199adf2d94fdf6f
-
Filesize
244KB
MD593568c3cf32c68a6dcd492bc3e30d989
SHA1ad076d5a7d5860edb3563af776e70289c602d1a0
SHA256f06b8f0ae4b22e46193074ff2955c0544111a87c0aca58702698a9cd60ca7094
SHA5124f3014a90ad5724aa9750dae36ec1535cea97d460435952ae6938d096f863efe69464015c69ed5fda971ff486cc76563347a90233743f62c4199adf2d94fdf6f
-
Filesize
108KB
MD5a4552c383317b2b56426c261dc718351
SHA1e4e1f04f1642663fc05de93b4d06b3a1ed29ac84
SHA25609dc60cde66df3c6313bf5cde917c06fcaece134650962fc47cac49852c42a47
SHA5129fd41cd02c7a070c4725eeb0bbd0d9f38c1e22b1f3613a8268d02feb91a423e716d292378157d1cf23d1bfe8088fd3c70d2bfa43df3d07205f23101588edf551
-
Filesize
108KB
MD5a4552c383317b2b56426c261dc718351
SHA1e4e1f04f1642663fc05de93b4d06b3a1ed29ac84
SHA25609dc60cde66df3c6313bf5cde917c06fcaece134650962fc47cac49852c42a47
SHA5129fd41cd02c7a070c4725eeb0bbd0d9f38c1e22b1f3613a8268d02feb91a423e716d292378157d1cf23d1bfe8088fd3c70d2bfa43df3d07205f23101588edf551
-
Filesize
176KB
MD548cc0ff1b60099cb4df3c5f5f7d34e16
SHA1d8f27cfcf9f2f754604599230448a59568566b6a
SHA256bc08e4042a0c1f01bd4a00617bbac19ac942ed220f02afc1c752a0544aa2d97b
SHA5128887cb1acbc7228e9ac72e27a356bd144fe5142ecae1b51757f10470c3873a4117700bf2a4e379a9b6c05b37de883e54f2557d83a6339743797318eff1e8385f
-
Filesize
176KB
MD548cc0ff1b60099cb4df3c5f5f7d34e16
SHA1d8f27cfcf9f2f754604599230448a59568566b6a
SHA256bc08e4042a0c1f01bd4a00617bbac19ac942ed220f02afc1c752a0544aa2d97b
SHA5128887cb1acbc7228e9ac72e27a356bd144fe5142ecae1b51757f10470c3873a4117700bf2a4e379a9b6c05b37de883e54f2557d83a6339743797318eff1e8385f
-
Filesize
176KB
MD548cc0ff1b60099cb4df3c5f5f7d34e16
SHA1d8f27cfcf9f2f754604599230448a59568566b6a
SHA256bc08e4042a0c1f01bd4a00617bbac19ac942ed220f02afc1c752a0544aa2d97b
SHA5128887cb1acbc7228e9ac72e27a356bd144fe5142ecae1b51757f10470c3873a4117700bf2a4e379a9b6c05b37de883e54f2557d83a6339743797318eff1e8385f
-
Filesize
158KB
MD50ab9608719a8dd85d107127381a1b507
SHA132d6986559b2c23c3a4f00530d056a557ac2bbfe
SHA2566b9fb304b9e3e1f20421df3884b6fa5b00babd9eccab10dc09ceef096fd942ff
SHA51222edaf4a5f0b87649058f68874686e22f649a69e100d34ac4d043aaa352e47b46e8b018437c69393b1ae14d3a73eee22dff51aadadc74907c8fc5d85d18c27c4
-
Filesize
158KB
MD50ab9608719a8dd85d107127381a1b507
SHA132d6986559b2c23c3a4f00530d056a557ac2bbfe
SHA2566b9fb304b9e3e1f20421df3884b6fa5b00babd9eccab10dc09ceef096fd942ff
SHA51222edaf4a5f0b87649058f68874686e22f649a69e100d34ac4d043aaa352e47b46e8b018437c69393b1ae14d3a73eee22dff51aadadc74907c8fc5d85d18c27c4
-
Filesize
158KB
MD50ab9608719a8dd85d107127381a1b507
SHA132d6986559b2c23c3a4f00530d056a557ac2bbfe
SHA2566b9fb304b9e3e1f20421df3884b6fa5b00babd9eccab10dc09ceef096fd942ff
SHA51222edaf4a5f0b87649058f68874686e22f649a69e100d34ac4d043aaa352e47b46e8b018437c69393b1ae14d3a73eee22dff51aadadc74907c8fc5d85d18c27c4