Analysis

  • max time kernel
    123s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/11/2022, 02:55

General

  • Target

    b996f562fce9fbc82c74d0404b6421ab00c3114eecad76e08620892c6dfd4173.exe

  • Size

    830KB

  • MD5

    074cbda344f2b7b0bc8922154d2aa545

  • SHA1

    bed0fbd3a0ef67749d3e99e6e2df651cdc995a67

  • SHA256

    b996f562fce9fbc82c74d0404b6421ab00c3114eecad76e08620892c6dfd4173

  • SHA512

    9a6de48b9ff8b7adbda1ea9983f033d1f01a291b450cdda7bcef2eb4be6384eb94320f0532f8798fa20d756af06ca231085abfb96552eadb91b7a10765168e51

  • SSDEEP

    24576:7rfGR2wDeRMTlw2rKJClAzd3hPyqeK/SeaNAk5:7YYRMTVuCSd3h3eK/Smk5

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b996f562fce9fbc82c74d0404b6421ab00c3114eecad76e08620892c6dfd4173.exe
    "C:\Users\Admin\AppData\Local\Temp\b996f562fce9fbc82c74d0404b6421ab00c3114eecad76e08620892c6dfd4173.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:412
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:452
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:1700
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:888
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3880
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:4072
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2760
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:1684
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1956
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:3340
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:3964
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:2768

          Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\nsqCA8A.tmp\System.dll

                  Filesize

                  11KB

                  MD5

                  c17103ae9072a06da581dec998343fc1

                  SHA1

                  b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

                  SHA256

                  dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

                  SHA512

                  d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

                • C:\Users\Admin\AppData\Local\Temp\nsqCA8A.tmp\nsExec.dll

                  Filesize

                  6KB

                  MD5

                  acc2b699edfea5bf5aae45aba3a41e96

                  SHA1

                  d2accf4d494e43ceb2cff69abe4dd17147d29cc2

                  SHA256

                  168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

                  SHA512

                  e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

                • C:\Users\Admin\AppData\Local\Temp\nsqCA8A.tmp\nsExec.dll

                  Filesize

                  6KB

                  MD5

                  acc2b699edfea5bf5aae45aba3a41e96

                  SHA1

                  d2accf4d494e43ceb2cff69abe4dd17147d29cc2

                  SHA256

                  168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

                  SHA512

                  e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

                • C:\Users\Admin\AppData\Local\Temp\nsqCA8A.tmp\nsExec.dll

                  Filesize

                  6KB

                  MD5

                  acc2b699edfea5bf5aae45aba3a41e96

                  SHA1

                  d2accf4d494e43ceb2cff69abe4dd17147d29cc2

                  SHA256

                  168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

                  SHA512

                  e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

                • C:\Users\Admin\AppData\Local\Temp\nsqCA8A.tmp\nsExec.dll

                  Filesize

                  6KB

                  MD5

                  acc2b699edfea5bf5aae45aba3a41e96

                  SHA1

                  d2accf4d494e43ceb2cff69abe4dd17147d29cc2

                  SHA256

                  168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

                  SHA512

                  e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

                • C:\Users\Admin\AppData\Local\Temp\nsqCA8A.tmp\nsExec.dll

                  Filesize

                  6KB

                  MD5

                  acc2b699edfea5bf5aae45aba3a41e96

                  SHA1

                  d2accf4d494e43ceb2cff69abe4dd17147d29cc2

                  SHA256

                  168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

                  SHA512

                  e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

                • C:\Users\Admin\AppData\Local\Temp\nsqCA8A.tmp\nsExec.dll

                  Filesize

                  6KB

                  MD5

                  acc2b699edfea5bf5aae45aba3a41e96

                  SHA1

                  d2accf4d494e43ceb2cff69abe4dd17147d29cc2

                  SHA256

                  168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

                  SHA512

                  e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

                • C:\Users\Admin\AppData\Local\Temp\nsqCA8A.tmp\nsExec.dll

                  Filesize

                  6KB

                  MD5

                  acc2b699edfea5bf5aae45aba3a41e96

                  SHA1

                  d2accf4d494e43ceb2cff69abe4dd17147d29cc2

                  SHA256

                  168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

                  SHA512

                  e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

                • C:\Users\Admin\AppData\Local\Temp\nsqCA8A.tmp\nsExec.dll

                  Filesize

                  6KB

                  MD5

                  acc2b699edfea5bf5aae45aba3a41e96

                  SHA1

                  d2accf4d494e43ceb2cff69abe4dd17147d29cc2

                  SHA256

                  168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

                  SHA512

                  e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

                • C:\Windows\SysWOW64\hfnapi.dll

                  Filesize

                  106KB

                  MD5

                  d3e5f67c1ff751aa5713236dc6835982

                  SHA1

                  93429e36fe2a236fa8571dd099ada82e806cb54b

                  SHA256

                  edd29c51113019bc053ddf212a71b699a1938d023bf55e4b99f9d2f7f29abb8d

                  SHA512

                  046d6a0325e86d0b8d0e7b650bb4a063800d756ff33ac3c16617440b4d7bf5fa62c43441d7e5b666e7c771c977246e992966198bbf16b65591ce2b2b67cd5e27

                • C:\Windows\SysWOW64\hfnapi.dll

                  Filesize

                  106KB

                  MD5

                  d3e5f67c1ff751aa5713236dc6835982

                  SHA1

                  93429e36fe2a236fa8571dd099ada82e806cb54b

                  SHA256

                  edd29c51113019bc053ddf212a71b699a1938d023bf55e4b99f9d2f7f29abb8d

                  SHA512

                  046d6a0325e86d0b8d0e7b650bb4a063800d756ff33ac3c16617440b4d7bf5fa62c43441d7e5b666e7c771c977246e992966198bbf16b65591ce2b2b67cd5e27

                • C:\Windows\SysWOW64\hfnapi.dll

                  Filesize

                  106KB

                  MD5

                  d3e5f67c1ff751aa5713236dc6835982

                  SHA1

                  93429e36fe2a236fa8571dd099ada82e806cb54b

                  SHA256

                  edd29c51113019bc053ddf212a71b699a1938d023bf55e4b99f9d2f7f29abb8d

                  SHA512

                  046d6a0325e86d0b8d0e7b650bb4a063800d756ff33ac3c16617440b4d7bf5fa62c43441d7e5b666e7c771c977246e992966198bbf16b65591ce2b2b67cd5e27

                • C:\Windows\SysWOW64\hfnapi.dll

                  Filesize

                  106KB

                  MD5

                  d3e5f67c1ff751aa5713236dc6835982

                  SHA1

                  93429e36fe2a236fa8571dd099ada82e806cb54b

                  SHA256

                  edd29c51113019bc053ddf212a71b699a1938d023bf55e4b99f9d2f7f29abb8d

                  SHA512

                  046d6a0325e86d0b8d0e7b650bb4a063800d756ff33ac3c16617440b4d7bf5fa62c43441d7e5b666e7c771c977246e992966198bbf16b65591ce2b2b67cd5e27

                • C:\Windows\SysWOW64\hfpapi.dll

                  Filesize

                  427KB

                  MD5

                  9a79c25e82e2e78b6e47e00d1fae292f

                  SHA1

                  51a46f6d9458191068fd24896ffdc48b14996b78

                  SHA256

                  a87b76faaf0247da6a4f9a05a8d2181862f620e80735b0093564dabd3b2b7946

                  SHA512

                  c7848d2f7bd48017278f09abb106c45f1758dbfea5caf2ae8d258b74995fc847413f0b2db7473e4b366f721eca8b15428a8621b9c96d63fc6030687dc98c5d37

                • C:\Windows\SysWOW64\hfpapi.dll

                  Filesize

                  427KB

                  MD5

                  9a79c25e82e2e78b6e47e00d1fae292f

                  SHA1

                  51a46f6d9458191068fd24896ffdc48b14996b78

                  SHA256

                  a87b76faaf0247da6a4f9a05a8d2181862f620e80735b0093564dabd3b2b7946

                  SHA512

                  c7848d2f7bd48017278f09abb106c45f1758dbfea5caf2ae8d258b74995fc847413f0b2db7473e4b366f721eca8b15428a8621b9c96d63fc6030687dc98c5d37

                • C:\Windows\SysWOW64\hfpapi.dll

                  Filesize

                  427KB

                  MD5

                  9a79c25e82e2e78b6e47e00d1fae292f

                  SHA1

                  51a46f6d9458191068fd24896ffdc48b14996b78

                  SHA256

                  a87b76faaf0247da6a4f9a05a8d2181862f620e80735b0093564dabd3b2b7946

                  SHA512

                  c7848d2f7bd48017278f09abb106c45f1758dbfea5caf2ae8d258b74995fc847413f0b2db7473e4b366f721eca8b15428a8621b9c96d63fc6030687dc98c5d37

                • C:\Windows\SysWOW64\installd.exe

                  Filesize

                  137KB

                  MD5

                  03f39a2c07bdb3c6e819f77507aaa9ab

                  SHA1

                  62fde93b7e66a1ca6b26dd28f1a693af2491b3ce

                  SHA256

                  bd175f6bcebc6cb7a6295c18d13711558f4611433ad5ab78ebf2be17b956fa10

                  SHA512

                  71feff2349e30780a74b27fc972ee33b6a433a10aa52ebf7825d5a25391807e9ce911467b8323e25e9878e34540656f4729a4718c117c3992b9663a94a04a8f7

                • C:\Windows\SysWOW64\installd.exe

                  Filesize

                  137KB

                  MD5

                  03f39a2c07bdb3c6e819f77507aaa9ab

                  SHA1

                  62fde93b7e66a1ca6b26dd28f1a693af2491b3ce

                  SHA256

                  bd175f6bcebc6cb7a6295c18d13711558f4611433ad5ab78ebf2be17b956fa10

                  SHA512

                  71feff2349e30780a74b27fc972ee33b6a433a10aa52ebf7825d5a25391807e9ce911467b8323e25e9878e34540656f4729a4718c117c3992b9663a94a04a8f7

                • C:\Windows\SysWOW64\nethtsrv.exe

                  Filesize

                  330KB

                  MD5

                  93a3cd003b2d79dda29b52c86d4a283b

                  SHA1

                  4b76c369fd66373ae354e36aacf534d80d1d0f1a

                  SHA256

                  8501d5459d553b5955f695fed1fe2c3e787c8e782eff2096b9592dd909dea895

                  SHA512

                  c4b5a70da00632f6d1dda37aa36a6d5ba5056dd338576837ba4c408eede2a142bf55bd3e4962c51b31530093602a378db54f7ae48bb22f4726f538c7b8af4de0

                • C:\Windows\SysWOW64\nethtsrv.exe

                  Filesize

                  330KB

                  MD5

                  93a3cd003b2d79dda29b52c86d4a283b

                  SHA1

                  4b76c369fd66373ae354e36aacf534d80d1d0f1a

                  SHA256

                  8501d5459d553b5955f695fed1fe2c3e787c8e782eff2096b9592dd909dea895

                  SHA512

                  c4b5a70da00632f6d1dda37aa36a6d5ba5056dd338576837ba4c408eede2a142bf55bd3e4962c51b31530093602a378db54f7ae48bb22f4726f538c7b8af4de0

                • C:\Windows\SysWOW64\nethtsrv.exe

                  Filesize

                  330KB

                  MD5

                  93a3cd003b2d79dda29b52c86d4a283b

                  SHA1

                  4b76c369fd66373ae354e36aacf534d80d1d0f1a

                  SHA256

                  8501d5459d553b5955f695fed1fe2c3e787c8e782eff2096b9592dd909dea895

                  SHA512

                  c4b5a70da00632f6d1dda37aa36a6d5ba5056dd338576837ba4c408eede2a142bf55bd3e4962c51b31530093602a378db54f7ae48bb22f4726f538c7b8af4de0

                • C:\Windows\SysWOW64\netupdsrv.exe

                  Filesize

                  186KB

                  MD5

                  3a749fd13ea7f8ba38d894f4a5dfa632

                  SHA1

                  cf29089e02ee9cb6133acfa892d9869526daf9f8

                  SHA256

                  fb2bc31846f4ec226cedf063dd5073730a09e3b855dbfa794ae0cc512db1b18d

                  SHA512

                  6b2bac363334b83d678eba2c1f81e925cdb07f06a46e9f6d91dc41d89d0ddf511cfde7cbea58e4a12b39abadf5c08c96371763a9c7491db8c5354cbf73e0ac21

                • C:\Windows\SysWOW64\netupdsrv.exe

                  Filesize

                  186KB

                  MD5

                  3a749fd13ea7f8ba38d894f4a5dfa632

                  SHA1

                  cf29089e02ee9cb6133acfa892d9869526daf9f8

                  SHA256

                  fb2bc31846f4ec226cedf063dd5073730a09e3b855dbfa794ae0cc512db1b18d

                  SHA512

                  6b2bac363334b83d678eba2c1f81e925cdb07f06a46e9f6d91dc41d89d0ddf511cfde7cbea58e4a12b39abadf5c08c96371763a9c7491db8c5354cbf73e0ac21

                • C:\Windows\SysWOW64\netupdsrv.exe

                  Filesize

                  186KB

                  MD5

                  3a749fd13ea7f8ba38d894f4a5dfa632

                  SHA1

                  cf29089e02ee9cb6133acfa892d9869526daf9f8

                  SHA256

                  fb2bc31846f4ec226cedf063dd5073730a09e3b855dbfa794ae0cc512db1b18d

                  SHA512

                  6b2bac363334b83d678eba2c1f81e925cdb07f06a46e9f6d91dc41d89d0ddf511cfde7cbea58e4a12b39abadf5c08c96371763a9c7491db8c5354cbf73e0ac21

                • memory/2340-132-0x0000000000320000-0x00000000007BE000-memory.dmp

                  Filesize

                  4.6MB

                • memory/2340-168-0x0000000000320000-0x00000000007BE000-memory.dmp

                  Filesize

                  4.6MB