Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
185s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe
Resource
win10v2004-20221111-en
General
-
Target
d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe
-
Size
603KB
-
MD5
fd3a5952a35ae1318c4b321c06c59119
-
SHA1
2b4e7869b2be6471236860c1aeda8c4e117ec1b5
-
SHA256
d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06
-
SHA512
5d9a51d0d18739c23d6d4ea60f14a00ae2093f6ac59eca62e75092e593a18fe9bc3b1f4f2ac8dcd705c37ab125128f687d4ad37ac4f049ce71859d2b5405327b
-
SSDEEP
12288:vIny5DYTfIArTQdGtAG/qNKkcMRUSa4SlijXZsVh5N:3UTfjrTaG6kq8cRFazqXyh
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe -
Executes dropped EXE 5 IoCs
pid Process 2840 installd.exe 4396 nethtsrv.exe 3024 netupdsrv.exe 3524 nethtsrv.exe 4648 netupdsrv.exe -
Loads dropped DLL 14 IoCs
pid Process 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 2840 installd.exe 4396 nethtsrv.exe 4396 nethtsrv.exe 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 3524 nethtsrv.exe 3524 nethtsrv.exe 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfnapi.dll d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe File created C:\Windows\SysWOW64\hfpapi.dll d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe File created C:\Windows\SysWOW64\installd.exe d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe File created C:\Windows\SysWOW64\nethtsrv.exe d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe File created C:\Windows\SysWOW64\netupdsrv.exe d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3524 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4696 wrote to memory of 212 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 82 PID 4696 wrote to memory of 212 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 82 PID 4696 wrote to memory of 212 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 82 PID 212 wrote to memory of 3728 212 net.exe 84 PID 212 wrote to memory of 3728 212 net.exe 84 PID 212 wrote to memory of 3728 212 net.exe 84 PID 4696 wrote to memory of 4800 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 85 PID 4696 wrote to memory of 4800 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 85 PID 4696 wrote to memory of 4800 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 85 PID 4800 wrote to memory of 5088 4800 net.exe 87 PID 4800 wrote to memory of 5088 4800 net.exe 87 PID 4800 wrote to memory of 5088 4800 net.exe 87 PID 4696 wrote to memory of 2840 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 88 PID 4696 wrote to memory of 2840 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 88 PID 4696 wrote to memory of 2840 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 88 PID 4696 wrote to memory of 4396 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 93 PID 4696 wrote to memory of 4396 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 93 PID 4696 wrote to memory of 4396 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 93 PID 4696 wrote to memory of 3024 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 96 PID 4696 wrote to memory of 3024 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 96 PID 4696 wrote to memory of 3024 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 96 PID 4696 wrote to memory of 4352 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 98 PID 4696 wrote to memory of 4352 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 98 PID 4696 wrote to memory of 4352 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 98 PID 4352 wrote to memory of 2128 4352 net.exe 100 PID 4352 wrote to memory of 2128 4352 net.exe 100 PID 4352 wrote to memory of 2128 4352 net.exe 100 PID 4696 wrote to memory of 2004 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 103 PID 4696 wrote to memory of 2004 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 103 PID 4696 wrote to memory of 2004 4696 d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe 103 PID 2004 wrote to memory of 4780 2004 net.exe 105 PID 2004 wrote to memory of 4780 2004 net.exe 105 PID 2004 wrote to memory of 4780 2004 net.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe"C:\Users\Admin\AppData\Local\Temp\d48dbe89e77f53d757be8cf8743835476de3c81f99f6eae312096203781e9b06.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:3728
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:5088
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2840
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4396
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:3024
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:2128
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:4780
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3524
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:4648
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5909ae3dbb50ed1db5eb357342f784633
SHA1edbc88bc1603a048b406e88f5571750fdc2063c7
SHA2569be8f1719a8b3e9d7105b6a613e13aa10ce35da9d06c290a86cda751339a85eb
SHA51218b6fc7703a0234be8ba4e080e596be59da2937059978d87b4955285ad0a24784decc3bad5243fd35ed91576f08b06ca8a271cf784147261392d34c6d9bad0b7
-
Filesize
106KB
MD5909ae3dbb50ed1db5eb357342f784633
SHA1edbc88bc1603a048b406e88f5571750fdc2063c7
SHA2569be8f1719a8b3e9d7105b6a613e13aa10ce35da9d06c290a86cda751339a85eb
SHA51218b6fc7703a0234be8ba4e080e596be59da2937059978d87b4955285ad0a24784decc3bad5243fd35ed91576f08b06ca8a271cf784147261392d34c6d9bad0b7
-
Filesize
106KB
MD5909ae3dbb50ed1db5eb357342f784633
SHA1edbc88bc1603a048b406e88f5571750fdc2063c7
SHA2569be8f1719a8b3e9d7105b6a613e13aa10ce35da9d06c290a86cda751339a85eb
SHA51218b6fc7703a0234be8ba4e080e596be59da2937059978d87b4955285ad0a24784decc3bad5243fd35ed91576f08b06ca8a271cf784147261392d34c6d9bad0b7
-
Filesize
106KB
MD5909ae3dbb50ed1db5eb357342f784633
SHA1edbc88bc1603a048b406e88f5571750fdc2063c7
SHA2569be8f1719a8b3e9d7105b6a613e13aa10ce35da9d06c290a86cda751339a85eb
SHA51218b6fc7703a0234be8ba4e080e596be59da2937059978d87b4955285ad0a24784decc3bad5243fd35ed91576f08b06ca8a271cf784147261392d34c6d9bad0b7
-
Filesize
244KB
MD50452ae6cee9fd01cff92b3f0df62c3df
SHA1352951d54e213ec7cba1adb8f1da4a1c3fa5e2b9
SHA256a10807122d35b2e4f90a87128663ca9855fa57ca1bd8f4b082b9928e2f1e0d22
SHA51224cbf24f3d14da6167a22279c9b31ba90af1c85eed796692d9d26c2d685bf4a9e189ba6e5a74e49250c32a4b1e9dca2ac2f93a3a3a1468a9858d12f3402c91a2
-
Filesize
244KB
MD50452ae6cee9fd01cff92b3f0df62c3df
SHA1352951d54e213ec7cba1adb8f1da4a1c3fa5e2b9
SHA256a10807122d35b2e4f90a87128663ca9855fa57ca1bd8f4b082b9928e2f1e0d22
SHA51224cbf24f3d14da6167a22279c9b31ba90af1c85eed796692d9d26c2d685bf4a9e189ba6e5a74e49250c32a4b1e9dca2ac2f93a3a3a1468a9858d12f3402c91a2
-
Filesize
244KB
MD50452ae6cee9fd01cff92b3f0df62c3df
SHA1352951d54e213ec7cba1adb8f1da4a1c3fa5e2b9
SHA256a10807122d35b2e4f90a87128663ca9855fa57ca1bd8f4b082b9928e2f1e0d22
SHA51224cbf24f3d14da6167a22279c9b31ba90af1c85eed796692d9d26c2d685bf4a9e189ba6e5a74e49250c32a4b1e9dca2ac2f93a3a3a1468a9858d12f3402c91a2
-
Filesize
108KB
MD53979c7247607baf2790ee1840b863d80
SHA1ec626bbd47fc69ed17a12c43a12f0ed2bd278e87
SHA2567d6faa9860b58eec97c8d41a98ae5ee1676aaf510578c5640a48dcbcfcc69e55
SHA51226a485bd5d765e3759db88656139e55937799b06b2b9ae949cc0a9647c39af589bdf7ace23ab1aa5a0bfda1e374c29a9ecd299512e16fed96ab45ed89fdde567
-
Filesize
108KB
MD53979c7247607baf2790ee1840b863d80
SHA1ec626bbd47fc69ed17a12c43a12f0ed2bd278e87
SHA2567d6faa9860b58eec97c8d41a98ae5ee1676aaf510578c5640a48dcbcfcc69e55
SHA51226a485bd5d765e3759db88656139e55937799b06b2b9ae949cc0a9647c39af589bdf7ace23ab1aa5a0bfda1e374c29a9ecd299512e16fed96ab45ed89fdde567
-
Filesize
176KB
MD55680991c3236106a696bffa7e43f44a4
SHA1e1d2e91a4bd15d93691186178226f88a9d9b694e
SHA256a3a4109663552aec806f6cdd2bbfd383fa0d5a73ba63babafff4385099e09b98
SHA512ea0cb5729cabc4be98883d497bf9f39a7ce4419fcaa377cd78c05666fa636285113fd965c3c7870516f785c48dd9b1fce54c2255641f05454ee456d7d8c3c863
-
Filesize
176KB
MD55680991c3236106a696bffa7e43f44a4
SHA1e1d2e91a4bd15d93691186178226f88a9d9b694e
SHA256a3a4109663552aec806f6cdd2bbfd383fa0d5a73ba63babafff4385099e09b98
SHA512ea0cb5729cabc4be98883d497bf9f39a7ce4419fcaa377cd78c05666fa636285113fd965c3c7870516f785c48dd9b1fce54c2255641f05454ee456d7d8c3c863
-
Filesize
176KB
MD55680991c3236106a696bffa7e43f44a4
SHA1e1d2e91a4bd15d93691186178226f88a9d9b694e
SHA256a3a4109663552aec806f6cdd2bbfd383fa0d5a73ba63babafff4385099e09b98
SHA512ea0cb5729cabc4be98883d497bf9f39a7ce4419fcaa377cd78c05666fa636285113fd965c3c7870516f785c48dd9b1fce54c2255641f05454ee456d7d8c3c863
-
Filesize
158KB
MD5ac10436752d28588dfc61f97d79cc6f9
SHA18c5c4d90d48f06cba1564157b52304a11de2491e
SHA256e0398d2c8917f974e93126591648470ada27c61142eab1699d6ed11130ca0847
SHA512bd8542d5f7c018c26ef0148d9aa9823d89dc149741f9a8a2edc3fd77cd1accac6ecf7fd5fa178e6700a02446495715292f35398b940ee539f6418ca84c225586
-
Filesize
158KB
MD5ac10436752d28588dfc61f97d79cc6f9
SHA18c5c4d90d48f06cba1564157b52304a11de2491e
SHA256e0398d2c8917f974e93126591648470ada27c61142eab1699d6ed11130ca0847
SHA512bd8542d5f7c018c26ef0148d9aa9823d89dc149741f9a8a2edc3fd77cd1accac6ecf7fd5fa178e6700a02446495715292f35398b940ee539f6418ca84c225586
-
Filesize
158KB
MD5ac10436752d28588dfc61f97d79cc6f9
SHA18c5c4d90d48f06cba1564157b52304a11de2491e
SHA256e0398d2c8917f974e93126591648470ada27c61142eab1699d6ed11130ca0847
SHA512bd8542d5f7c018c26ef0148d9aa9823d89dc149741f9a8a2edc3fd77cd1accac6ecf7fd5fa178e6700a02446495715292f35398b940ee539f6418ca84c225586