Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe
Resource
win10v2004-20220812-en
General
-
Target
bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe
-
Size
563KB
-
MD5
bcb6b4cef2a7a004b43750b6b265035e
-
SHA1
79f63c1fae42dadb08b996d8b59213fc79bdb138
-
SHA256
bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db
-
SHA512
5c8a3148acb55d09710ca60cefe9d86d550f54706470e6f525e37ab62840cab78a20c7094e7c99371961b7235f674e0856838d3cbc2e155b5cecb6a735711b14
-
SSDEEP
12288:2PRYzbbfwVPlqmp0V4NLfHXjjXfgrXobqwnD0G72rUCl9:rz3fClzmVifHzrI8D0G7y
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe -
Executes dropped EXE 5 IoCs
pid Process 3160 installd.exe 388 nethtsrv.exe 3656 netupdsrv.exe 4696 nethtsrv.exe 3816 netupdsrv.exe -
Loads dropped DLL 14 IoCs
pid Process 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 3160 installd.exe 388 nethtsrv.exe 388 nethtsrv.exe 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 4696 nethtsrv.exe 4696 nethtsrv.exe 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\netupdsrv.exe bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe File created C:\Windows\SysWOW64\hfnapi.dll bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe File created C:\Windows\SysWOW64\hfpapi.dll bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe File created C:\Windows\SysWOW64\installd.exe bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe File created C:\Windows\SysWOW64\nethtsrv.exe bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4696 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4968 wrote to memory of 4164 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 81 PID 4968 wrote to memory of 4164 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 81 PID 4968 wrote to memory of 4164 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 81 PID 4164 wrote to memory of 1952 4164 net.exe 83 PID 4164 wrote to memory of 1952 4164 net.exe 83 PID 4164 wrote to memory of 1952 4164 net.exe 83 PID 4968 wrote to memory of 4556 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 84 PID 4968 wrote to memory of 4556 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 84 PID 4968 wrote to memory of 4556 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 84 PID 4556 wrote to memory of 4528 4556 net.exe 86 PID 4556 wrote to memory of 4528 4556 net.exe 86 PID 4556 wrote to memory of 4528 4556 net.exe 86 PID 4968 wrote to memory of 3160 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 87 PID 4968 wrote to memory of 3160 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 87 PID 4968 wrote to memory of 3160 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 87 PID 4968 wrote to memory of 388 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 88 PID 4968 wrote to memory of 388 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 88 PID 4968 wrote to memory of 388 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 88 PID 4968 wrote to memory of 3656 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 90 PID 4968 wrote to memory of 3656 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 90 PID 4968 wrote to memory of 3656 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 90 PID 4968 wrote to memory of 4432 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 92 PID 4968 wrote to memory of 4432 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 92 PID 4968 wrote to memory of 4432 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 92 PID 4432 wrote to memory of 2716 4432 net.exe 94 PID 4432 wrote to memory of 2716 4432 net.exe 94 PID 4432 wrote to memory of 2716 4432 net.exe 94 PID 4968 wrote to memory of 2284 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 96 PID 4968 wrote to memory of 2284 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 96 PID 4968 wrote to memory of 2284 4968 bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe 96 PID 2284 wrote to memory of 3812 2284 net.exe 98 PID 2284 wrote to memory of 3812 2284 net.exe 98 PID 2284 wrote to memory of 3812 2284 net.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe"C:\Users\Admin\AppData\Local\Temp\bbb08c51a61b8cd7a3143e16279bb5dcaa90720b21ad15cd312c643fab4fb0db.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1952
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:4528
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3160
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:388
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:3656
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:2716
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:3812
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:3816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5d10b4ae727c8a21de42398ec17f8aa80
SHA1390691e5704d6bd29c044febbfb335c9a1450886
SHA2569ab1675bed9fa53fccdd34f9fc13b2ce4f2c4b3a843dbd0d6f9ecac3d1e7f298
SHA51280b72572d62ece7c4a5dbfab8a3113664149766174cfe1a9c2e1e1cef0a8349640641925f390749a2d729b842bb50d052d359abe7bec5f812e45b8e430dea95e
-
Filesize
106KB
MD5d10b4ae727c8a21de42398ec17f8aa80
SHA1390691e5704d6bd29c044febbfb335c9a1450886
SHA2569ab1675bed9fa53fccdd34f9fc13b2ce4f2c4b3a843dbd0d6f9ecac3d1e7f298
SHA51280b72572d62ece7c4a5dbfab8a3113664149766174cfe1a9c2e1e1cef0a8349640641925f390749a2d729b842bb50d052d359abe7bec5f812e45b8e430dea95e
-
Filesize
106KB
MD5d10b4ae727c8a21de42398ec17f8aa80
SHA1390691e5704d6bd29c044febbfb335c9a1450886
SHA2569ab1675bed9fa53fccdd34f9fc13b2ce4f2c4b3a843dbd0d6f9ecac3d1e7f298
SHA51280b72572d62ece7c4a5dbfab8a3113664149766174cfe1a9c2e1e1cef0a8349640641925f390749a2d729b842bb50d052d359abe7bec5f812e45b8e430dea95e
-
Filesize
106KB
MD5d10b4ae727c8a21de42398ec17f8aa80
SHA1390691e5704d6bd29c044febbfb335c9a1450886
SHA2569ab1675bed9fa53fccdd34f9fc13b2ce4f2c4b3a843dbd0d6f9ecac3d1e7f298
SHA51280b72572d62ece7c4a5dbfab8a3113664149766174cfe1a9c2e1e1cef0a8349640641925f390749a2d729b842bb50d052d359abe7bec5f812e45b8e430dea95e
-
Filesize
244KB
MD5acc46df70e53a80d131b90d1d6229bf3
SHA11292e47a231543db466d9fc80bc1593ae17af223
SHA256d334886aa77524938503c963d532855fdff63f355acf8ee611cb601e79986df0
SHA5123ea9854398a79c5c854a54d140adc1845816d871cf639362fcee222f84b2adb627ffea9c568be88c8813cd231bc5641f83428914a6e13016f8943831a6d260ff
-
Filesize
244KB
MD5acc46df70e53a80d131b90d1d6229bf3
SHA11292e47a231543db466d9fc80bc1593ae17af223
SHA256d334886aa77524938503c963d532855fdff63f355acf8ee611cb601e79986df0
SHA5123ea9854398a79c5c854a54d140adc1845816d871cf639362fcee222f84b2adb627ffea9c568be88c8813cd231bc5641f83428914a6e13016f8943831a6d260ff
-
Filesize
244KB
MD5acc46df70e53a80d131b90d1d6229bf3
SHA11292e47a231543db466d9fc80bc1593ae17af223
SHA256d334886aa77524938503c963d532855fdff63f355acf8ee611cb601e79986df0
SHA5123ea9854398a79c5c854a54d140adc1845816d871cf639362fcee222f84b2adb627ffea9c568be88c8813cd231bc5641f83428914a6e13016f8943831a6d260ff
-
Filesize
108KB
MD553444cc1d1469e3eedfa9218bca4bfd1
SHA13a4a8768ce08eb0195aed30d2e36549406df5ad1
SHA256a173a0648ab16f0f8b2fc80005410ed46a4fc7e9db0c9f21b826111ba1a2376e
SHA5121600aa6471558a82555c9ada5aef6cf48a88d90c1297b49b589596e93042c52a14633ecd7d1a30760ed06904984c00883b48964f488f8070395ae9b0f0f75b62
-
Filesize
108KB
MD553444cc1d1469e3eedfa9218bca4bfd1
SHA13a4a8768ce08eb0195aed30d2e36549406df5ad1
SHA256a173a0648ab16f0f8b2fc80005410ed46a4fc7e9db0c9f21b826111ba1a2376e
SHA5121600aa6471558a82555c9ada5aef6cf48a88d90c1297b49b589596e93042c52a14633ecd7d1a30760ed06904984c00883b48964f488f8070395ae9b0f0f75b62
-
Filesize
176KB
MD503a737b255dfce7fc1f84b8ae3ca56ee
SHA1563663afaba3b3ee3b3c3e7d22bb6a213bff334e
SHA25661e3ee020f2eac006980dddc76a2e1227b8f3229aea5d199cf72d2a8ef03940b
SHA5122f042c5b0b31d6685bb63d0931aba934705d66b309a5dc6c350cdedf090445a9e315c6ba210e818ad496b7bb5dd2a4642caf8a87c3b2cc83b167a9010c796fbf
-
Filesize
176KB
MD503a737b255dfce7fc1f84b8ae3ca56ee
SHA1563663afaba3b3ee3b3c3e7d22bb6a213bff334e
SHA25661e3ee020f2eac006980dddc76a2e1227b8f3229aea5d199cf72d2a8ef03940b
SHA5122f042c5b0b31d6685bb63d0931aba934705d66b309a5dc6c350cdedf090445a9e315c6ba210e818ad496b7bb5dd2a4642caf8a87c3b2cc83b167a9010c796fbf
-
Filesize
176KB
MD503a737b255dfce7fc1f84b8ae3ca56ee
SHA1563663afaba3b3ee3b3c3e7d22bb6a213bff334e
SHA25661e3ee020f2eac006980dddc76a2e1227b8f3229aea5d199cf72d2a8ef03940b
SHA5122f042c5b0b31d6685bb63d0931aba934705d66b309a5dc6c350cdedf090445a9e315c6ba210e818ad496b7bb5dd2a4642caf8a87c3b2cc83b167a9010c796fbf
-
Filesize
159KB
MD55e1843c4566c305ecb3b3aec80d48390
SHA13fd86b20eeedbbc862c688b293f42b33cb7a9974
SHA256acfed7fd455544e34392fe42bc986ce9c577e1e5f7ab7f29f8f359cd0226c04b
SHA51268562bfeda61ecfac95c29e15753da1ba17dc04a2016e32b7208d66bcc5aa222ae17153a1045ea2e4488ee5c76fb2443213790ee1bbf1fb949c95e47886bbce8
-
Filesize
159KB
MD55e1843c4566c305ecb3b3aec80d48390
SHA13fd86b20eeedbbc862c688b293f42b33cb7a9974
SHA256acfed7fd455544e34392fe42bc986ce9c577e1e5f7ab7f29f8f359cd0226c04b
SHA51268562bfeda61ecfac95c29e15753da1ba17dc04a2016e32b7208d66bcc5aa222ae17153a1045ea2e4488ee5c76fb2443213790ee1bbf1fb949c95e47886bbce8
-
Filesize
159KB
MD55e1843c4566c305ecb3b3aec80d48390
SHA13fd86b20eeedbbc862c688b293f42b33cb7a9974
SHA256acfed7fd455544e34392fe42bc986ce9c577e1e5f7ab7f29f8f359cd0226c04b
SHA51268562bfeda61ecfac95c29e15753da1ba17dc04a2016e32b7208d66bcc5aa222ae17153a1045ea2e4488ee5c76fb2443213790ee1bbf1fb949c95e47886bbce8