Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    185s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2022, 23:52

General

  • Target

    d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe

  • Size

    603KB

  • MD5

    fd3a5952a35ae1318c4b321c06c59119

  • SHA1

    2b4e7869b2be6471236860c1aeda8c4e117ec1b5

  • SHA256

    d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06

  • SHA512

    5d9a51d0d18739c23d6d4ea60f14a00ae2093f6ac59eca62e75092e593a18fe9bc3b1f4f2ac8dcd705c37ab125128f687d4ad37ac4f049ce71859d2b5405327b

  • SSDEEP

    12288:vIny5DYTfIArTQdGtAG/qNKkcMRUSa4SlijXZsVh5N:3UTfjrTaG6kq8cRFazqXyh

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe
    "C:\Users\Admin\AppData\Local\Temp\d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:212
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:3728
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4800
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:5088
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2840
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4396
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:3024
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4352
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:2128
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2004
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:4780
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:3524
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:4648

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsy82CE.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nsy82CE.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsy82CE.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsy82CE.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsy82CE.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsy82CE.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsy82CE.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsy82CE.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Users\Admin\AppData\Local\Temp\nsy82CE.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            909ae3dbb50ed1db5eb357342f784633

            SHA1

            edbc88bc1603a048b406e88f5571750fdc2063c7

            SHA256

            9be8f1719a8b3e9d7105b6a613e13aa10ce35da9d06c290a86cda751339a85eb

            SHA512

            18b6fc7703a0234be8ba4e080e596be59da2937059978d87b4955285ad0a24784decc3bad5243fd35ed91576f08b06ca8a271cf784147261392d34c6d9bad0b7

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            909ae3dbb50ed1db5eb357342f784633

            SHA1

            edbc88bc1603a048b406e88f5571750fdc2063c7

            SHA256

            9be8f1719a8b3e9d7105b6a613e13aa10ce35da9d06c290a86cda751339a85eb

            SHA512

            18b6fc7703a0234be8ba4e080e596be59da2937059978d87b4955285ad0a24784decc3bad5243fd35ed91576f08b06ca8a271cf784147261392d34c6d9bad0b7

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            909ae3dbb50ed1db5eb357342f784633

            SHA1

            edbc88bc1603a048b406e88f5571750fdc2063c7

            SHA256

            9be8f1719a8b3e9d7105b6a613e13aa10ce35da9d06c290a86cda751339a85eb

            SHA512

            18b6fc7703a0234be8ba4e080e596be59da2937059978d87b4955285ad0a24784decc3bad5243fd35ed91576f08b06ca8a271cf784147261392d34c6d9bad0b7

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            909ae3dbb50ed1db5eb357342f784633

            SHA1

            edbc88bc1603a048b406e88f5571750fdc2063c7

            SHA256

            9be8f1719a8b3e9d7105b6a613e13aa10ce35da9d06c290a86cda751339a85eb

            SHA512

            18b6fc7703a0234be8ba4e080e596be59da2937059978d87b4955285ad0a24784decc3bad5243fd35ed91576f08b06ca8a271cf784147261392d34c6d9bad0b7

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            0452ae6cee9fd01cff92b3f0df62c3df

            SHA1

            352951d54e213ec7cba1adb8f1da4a1c3fa5e2b9

            SHA256

            a10807122d35b2e4f90a87128663ca9855fa57ca1bd8f4b082b9928e2f1e0d22

            SHA512

            24cbf24f3d14da6167a22279c9b31ba90af1c85eed796692d9d26c2d685bf4a9e189ba6e5a74e49250c32a4b1e9dca2ac2f93a3a3a1468a9858d12f3402c91a2

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            0452ae6cee9fd01cff92b3f0df62c3df

            SHA1

            352951d54e213ec7cba1adb8f1da4a1c3fa5e2b9

            SHA256

            a10807122d35b2e4f90a87128663ca9855fa57ca1bd8f4b082b9928e2f1e0d22

            SHA512

            24cbf24f3d14da6167a22279c9b31ba90af1c85eed796692d9d26c2d685bf4a9e189ba6e5a74e49250c32a4b1e9dca2ac2f93a3a3a1468a9858d12f3402c91a2

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            0452ae6cee9fd01cff92b3f0df62c3df

            SHA1

            352951d54e213ec7cba1adb8f1da4a1c3fa5e2b9

            SHA256

            a10807122d35b2e4f90a87128663ca9855fa57ca1bd8f4b082b9928e2f1e0d22

            SHA512

            24cbf24f3d14da6167a22279c9b31ba90af1c85eed796692d9d26c2d685bf4a9e189ba6e5a74e49250c32a4b1e9dca2ac2f93a3a3a1468a9858d12f3402c91a2

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            3979c7247607baf2790ee1840b863d80

            SHA1

            ec626bbd47fc69ed17a12c43a12f0ed2bd278e87

            SHA256

            7d6faa9860b58eec97c8d41a98ae5ee1676aaf510578c5640a48dcbcfcc69e55

            SHA512

            26a485bd5d765e3759db88656139e55937799b06b2b9ae949cc0a9647c39af589bdf7ace23ab1aa5a0bfda1e374c29a9ecd299512e16fed96ab45ed89fdde567

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            3979c7247607baf2790ee1840b863d80

            SHA1

            ec626bbd47fc69ed17a12c43a12f0ed2bd278e87

            SHA256

            7d6faa9860b58eec97c8d41a98ae5ee1676aaf510578c5640a48dcbcfcc69e55

            SHA512

            26a485bd5d765e3759db88656139e55937799b06b2b9ae949cc0a9647c39af589bdf7ace23ab1aa5a0bfda1e374c29a9ecd299512e16fed96ab45ed89fdde567

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            5680991c3236106a696bffa7e43f44a4

            SHA1

            e1d2e91a4bd15d93691186178226f88a9d9b694e

            SHA256

            a3a4109663552aec806f6cdd2bbfd383fa0d5a73ba63babafff4385099e09b98

            SHA512

            ea0cb5729cabc4be98883d497bf9f39a7ce4419fcaa377cd78c05666fa636285113fd965c3c7870516f785c48dd9b1fce54c2255641f05454ee456d7d8c3c863

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            5680991c3236106a696bffa7e43f44a4

            SHA1

            e1d2e91a4bd15d93691186178226f88a9d9b694e

            SHA256

            a3a4109663552aec806f6cdd2bbfd383fa0d5a73ba63babafff4385099e09b98

            SHA512

            ea0cb5729cabc4be98883d497bf9f39a7ce4419fcaa377cd78c05666fa636285113fd965c3c7870516f785c48dd9b1fce54c2255641f05454ee456d7d8c3c863

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            5680991c3236106a696bffa7e43f44a4

            SHA1

            e1d2e91a4bd15d93691186178226f88a9d9b694e

            SHA256

            a3a4109663552aec806f6cdd2bbfd383fa0d5a73ba63babafff4385099e09b98

            SHA512

            ea0cb5729cabc4be98883d497bf9f39a7ce4419fcaa377cd78c05666fa636285113fd965c3c7870516f785c48dd9b1fce54c2255641f05454ee456d7d8c3c863

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            ac10436752d28588dfc61f97d79cc6f9

            SHA1

            8c5c4d90d48f06cba1564157b52304a11de2491e

            SHA256

            e0398d2c8917f974e93126591648470ada27c61142eab1699d6ed11130ca0847

            SHA512

            bd8542d5f7c018c26ef0148d9aa9823d89dc149741f9a8a2edc3fd77cd1accac6ecf7fd5fa178e6700a02446495715292f35398b940ee539f6418ca84c225586

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            ac10436752d28588dfc61f97d79cc6f9

            SHA1

            8c5c4d90d48f06cba1564157b52304a11de2491e

            SHA256

            e0398d2c8917f974e93126591648470ada27c61142eab1699d6ed11130ca0847

            SHA512

            bd8542d5f7c018c26ef0148d9aa9823d89dc149741f9a8a2edc3fd77cd1accac6ecf7fd5fa178e6700a02446495715292f35398b940ee539f6418ca84c225586

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            ac10436752d28588dfc61f97d79cc6f9

            SHA1

            8c5c4d90d48f06cba1564157b52304a11de2491e

            SHA256

            e0398d2c8917f974e93126591648470ada27c61142eab1699d6ed11130ca0847

            SHA512

            bd8542d5f7c018c26ef0148d9aa9823d89dc149741f9a8a2edc3fd77cd1accac6ecf7fd5fa178e6700a02446495715292f35398b940ee539f6418ca84c225586

          • memory/4696-132-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/4696-142-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/4696-169-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB