Analysis
-
max time kernel
47s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
22/11/2022, 00:03
Static task
static1
Behavioral task
behavioral1
Sample
5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe
Resource
win10v2004-20221111-en
General
-
Target
5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe
-
Size
603KB
-
MD5
c13c5ce84ddc630f567cf8838ae407d4
-
SHA1
78370749860be3245f13046a1d3005e15434f316
-
SHA256
5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a
-
SHA512
ea20c3184544062eac4825fbbca07f81cc42c7cef808c4efaae951f869bc3449031a6170337d18feacc1cd5150d293c24999efe8d3174b7a618e1f7b690e9412
-
SSDEEP
12288:+Iny5DYTfIHQeHaIFKBdr9HPTZb1/u6dHBQLh9/B18gLLd9HvjZR:gUTfgraIFKTNdWH/vjL7
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe -
Executes dropped EXE 5 IoCs
pid Process 688 installd.exe 1388 nethtsrv.exe 664 netupdsrv.exe 1808 nethtsrv.exe 2028 netupdsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 688 installd.exe 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 1388 nethtsrv.exe 1388 nethtsrv.exe 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 1808 nethtsrv.exe 1808 nethtsrv.exe 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfnapi.dll 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe File created C:\Windows\SysWOW64\hfpapi.dll 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe File created C:\Windows\SysWOW64\installd.exe 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe File created C:\Windows\SysWOW64\nethtsrv.exe 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe File created C:\Windows\SysWOW64\netupdsrv.exe 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1808 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 852 wrote to memory of 308 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 27 PID 852 wrote to memory of 308 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 27 PID 852 wrote to memory of 308 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 27 PID 852 wrote to memory of 308 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 27 PID 308 wrote to memory of 1620 308 net.exe 29 PID 308 wrote to memory of 1620 308 net.exe 29 PID 308 wrote to memory of 1620 308 net.exe 29 PID 308 wrote to memory of 1620 308 net.exe 29 PID 852 wrote to memory of 1964 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 30 PID 852 wrote to memory of 1964 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 30 PID 852 wrote to memory of 1964 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 30 PID 852 wrote to memory of 1964 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 30 PID 1964 wrote to memory of 468 1964 net.exe 32 PID 1964 wrote to memory of 468 1964 net.exe 32 PID 1964 wrote to memory of 468 1964 net.exe 32 PID 1964 wrote to memory of 468 1964 net.exe 32 PID 852 wrote to memory of 688 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 33 PID 852 wrote to memory of 688 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 33 PID 852 wrote to memory of 688 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 33 PID 852 wrote to memory of 688 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 33 PID 852 wrote to memory of 688 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 33 PID 852 wrote to memory of 688 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 33 PID 852 wrote to memory of 688 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 33 PID 852 wrote to memory of 1388 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 35 PID 852 wrote to memory of 1388 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 35 PID 852 wrote to memory of 1388 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 35 PID 852 wrote to memory of 1388 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 35 PID 852 wrote to memory of 664 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 37 PID 852 wrote to memory of 664 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 37 PID 852 wrote to memory of 664 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 37 PID 852 wrote to memory of 664 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 37 PID 852 wrote to memory of 664 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 37 PID 852 wrote to memory of 664 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 37 PID 852 wrote to memory of 664 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 37 PID 852 wrote to memory of 1976 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 39 PID 852 wrote to memory of 1976 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 39 PID 852 wrote to memory of 1976 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 39 PID 852 wrote to memory of 1976 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 39 PID 1976 wrote to memory of 1108 1976 net.exe 41 PID 1976 wrote to memory of 1108 1976 net.exe 41 PID 1976 wrote to memory of 1108 1976 net.exe 41 PID 1976 wrote to memory of 1108 1976 net.exe 41 PID 852 wrote to memory of 1276 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 43 PID 852 wrote to memory of 1276 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 43 PID 852 wrote to memory of 1276 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 43 PID 852 wrote to memory of 1276 852 5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe 43 PID 1276 wrote to memory of 1508 1276 net.exe 45 PID 1276 wrote to memory of 1508 1276 net.exe 45 PID 1276 wrote to memory of 1508 1276 net.exe 45 PID 1276 wrote to memory of 1508 1276 net.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe"C:\Users\Admin\AppData\Local\Temp\5233bdd715a7606dd520b40f8c7ccb8e0f1f7b62738113a2234bea08643e0a8a.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1620
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:468
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:688
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1388
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:664
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1108
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1508
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:2028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD52376f6aadd26171c0f48dff0c43879e1
SHA11c001e844dce0b4a9e981823139d5927fa6932ac
SHA2566620f3b2917a2cde4621341351e836a9df0c9cf0aaed4c1cbd36f5ae3400075b
SHA51234192e1f1ac94d1bd8574905fefeeec14d5661839b317b957f5b384d4f956ed81fa5a627d29d63877790d291324196c50ede63899b0739fcf0ef04563e4bd699
-
Filesize
244KB
MD5d092d24cd907848dbe7d7b9ac624af1f
SHA16beef0716c6cf56c97e9623ed812525a996ece6a
SHA256f35d11002ea681f23e7fa8af80c2184156383245c2fe0f5b8100dd65d7678a21
SHA51262847dcf6737dfb0379e67f424e9d9bcfb03fc0b5ab2295b50a1d71008000735e19c1493889b765223f7e04f4dd170b682d4e2ae79ce9c760d8a1bee7191cf94
-
Filesize
108KB
MD58894281b6981f10c71472d61fe36cb76
SHA141ce3f8c2a105e80159ac1b090ec4034fd14b6b6
SHA256229580ef57d8dbe88b66332c390a391bcf1361bc07d5f57f13414cdd2a17bc14
SHA512e616c3e42d3585d7d374766d5b680840ed812b771da2c29b0afc79f217ac0e86ae855ccb4b0c7b38d66d97b09b37f02667e9d6b8f9c74374266b4023fa7bd6a3
-
Filesize
176KB
MD510349ff789916f70109626a6d7fc9fdb
SHA1b91000d5354269eed4c25e12696735d1a11f8492
SHA256be79841922f004a25a65445110142df90600771d2bfac342f952a8181e58f1be
SHA512b15afd6a132c8295e25036d3be71814e8e94f294a8b17e16c0ac4d29849052a89bc285f1403e7cf1319bbdf6be22eef9b2efa8cb413530fd6df02a66db113e07
-
Filesize
176KB
MD510349ff789916f70109626a6d7fc9fdb
SHA1b91000d5354269eed4c25e12696735d1a11f8492
SHA256be79841922f004a25a65445110142df90600771d2bfac342f952a8181e58f1be
SHA512b15afd6a132c8295e25036d3be71814e8e94f294a8b17e16c0ac4d29849052a89bc285f1403e7cf1319bbdf6be22eef9b2efa8cb413530fd6df02a66db113e07
-
Filesize
158KB
MD52c25fee20a9cf9e883c1a27c55f179cf
SHA188509886d92d8984951e90827e488141fff47ffb
SHA2568292c40badc7304431b97830a719e194d68cd2bdc1f863ef9edb9836e9655e5e
SHA512ceac0899813efc8b95d802488ea3dbe929c0955b57c6054887dee6a74aaeaa58e5f695778033fc83018ec3207b3eec3fa4de275e9453de4b3ad9837daad88ff0
-
Filesize
158KB
MD52c25fee20a9cf9e883c1a27c55f179cf
SHA188509886d92d8984951e90827e488141fff47ffb
SHA2568292c40badc7304431b97830a719e194d68cd2bdc1f863ef9edb9836e9655e5e
SHA512ceac0899813efc8b95d802488ea3dbe929c0955b57c6054887dee6a74aaeaa58e5f695778033fc83018ec3207b3eec3fa4de275e9453de4b3ad9837daad88ff0
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD52376f6aadd26171c0f48dff0c43879e1
SHA11c001e844dce0b4a9e981823139d5927fa6932ac
SHA2566620f3b2917a2cde4621341351e836a9df0c9cf0aaed4c1cbd36f5ae3400075b
SHA51234192e1f1ac94d1bd8574905fefeeec14d5661839b317b957f5b384d4f956ed81fa5a627d29d63877790d291324196c50ede63899b0739fcf0ef04563e4bd699
-
Filesize
106KB
MD52376f6aadd26171c0f48dff0c43879e1
SHA11c001e844dce0b4a9e981823139d5927fa6932ac
SHA2566620f3b2917a2cde4621341351e836a9df0c9cf0aaed4c1cbd36f5ae3400075b
SHA51234192e1f1ac94d1bd8574905fefeeec14d5661839b317b957f5b384d4f956ed81fa5a627d29d63877790d291324196c50ede63899b0739fcf0ef04563e4bd699
-
Filesize
106KB
MD52376f6aadd26171c0f48dff0c43879e1
SHA11c001e844dce0b4a9e981823139d5927fa6932ac
SHA2566620f3b2917a2cde4621341351e836a9df0c9cf0aaed4c1cbd36f5ae3400075b
SHA51234192e1f1ac94d1bd8574905fefeeec14d5661839b317b957f5b384d4f956ed81fa5a627d29d63877790d291324196c50ede63899b0739fcf0ef04563e4bd699
-
Filesize
244KB
MD5d092d24cd907848dbe7d7b9ac624af1f
SHA16beef0716c6cf56c97e9623ed812525a996ece6a
SHA256f35d11002ea681f23e7fa8af80c2184156383245c2fe0f5b8100dd65d7678a21
SHA51262847dcf6737dfb0379e67f424e9d9bcfb03fc0b5ab2295b50a1d71008000735e19c1493889b765223f7e04f4dd170b682d4e2ae79ce9c760d8a1bee7191cf94
-
Filesize
244KB
MD5d092d24cd907848dbe7d7b9ac624af1f
SHA16beef0716c6cf56c97e9623ed812525a996ece6a
SHA256f35d11002ea681f23e7fa8af80c2184156383245c2fe0f5b8100dd65d7678a21
SHA51262847dcf6737dfb0379e67f424e9d9bcfb03fc0b5ab2295b50a1d71008000735e19c1493889b765223f7e04f4dd170b682d4e2ae79ce9c760d8a1bee7191cf94
-
Filesize
108KB
MD58894281b6981f10c71472d61fe36cb76
SHA141ce3f8c2a105e80159ac1b090ec4034fd14b6b6
SHA256229580ef57d8dbe88b66332c390a391bcf1361bc07d5f57f13414cdd2a17bc14
SHA512e616c3e42d3585d7d374766d5b680840ed812b771da2c29b0afc79f217ac0e86ae855ccb4b0c7b38d66d97b09b37f02667e9d6b8f9c74374266b4023fa7bd6a3
-
Filesize
176KB
MD510349ff789916f70109626a6d7fc9fdb
SHA1b91000d5354269eed4c25e12696735d1a11f8492
SHA256be79841922f004a25a65445110142df90600771d2bfac342f952a8181e58f1be
SHA512b15afd6a132c8295e25036d3be71814e8e94f294a8b17e16c0ac4d29849052a89bc285f1403e7cf1319bbdf6be22eef9b2efa8cb413530fd6df02a66db113e07
-
Filesize
158KB
MD52c25fee20a9cf9e883c1a27c55f179cf
SHA188509886d92d8984951e90827e488141fff47ffb
SHA2568292c40badc7304431b97830a719e194d68cd2bdc1f863ef9edb9836e9655e5e
SHA512ceac0899813efc8b95d802488ea3dbe929c0955b57c6054887dee6a74aaeaa58e5f695778033fc83018ec3207b3eec3fa4de275e9453de4b3ad9837daad88ff0