Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    27s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    22/11/2022, 00:08 UTC

General

  • Target

    1082f15776d13df4315e1e806915e1c52d5144c3b823fb211bd06576642316fd.exe

  • Size

    603KB

  • MD5

    7e34f555b0d6bde70d2fba019072cf87

  • SHA1

    c05f68b0130e341b74fcb79e9e62d9bcd053abfb

  • SHA256

    1082f15776d13df4315e1e806915e1c52d5144c3b823fb211bd06576642316fd

  • SHA512

    c4f8280002eb2cd1dae60cc410714f357f2b564791e9981c97ef8416908659f639c1c53e5fb6c9968d4acc0177b00c5805bfd72944fc520ad8a174f20842e836

  • SSDEEP

    12288:cIny5DYTfImTAUx1W2GDg5TuySlyN23jf3QGYt8wUvASMOw:6UTfZTd1ceTuyS+tW

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1082f15776d13df4315e1e806915e1c52d5144c3b823fb211bd06576642316fd.exe
    "C:\Users\Admin\AppData\Local\Temp\1082f15776d13df4315e1e806915e1c52d5144c3b823fb211bd06576642316fd.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1100
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:944
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:592
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:1900
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1268
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:952
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:1668
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1292
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:1144
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1680
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:1064
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1960
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:1380

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            c34803bb3c2d52b7c86d1db30bc8df47

            SHA1

            13cacc0ac3f7baa96d0b0be0bbccef7029893608

            SHA256

            f3caafd4fd4757063212153d5bfea0bc1dcdcb75090afc4269a80bda73d65383

            SHA512

            0326f550da00c544c262f8fd4f35728565151f8ccb43a83bdf5cdd902837fa3aac1c303d10ed9eeeb3b9b76b02a5e17b09f15cba63e252dce9095ab9ea6950c4

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            20be1a186738799ee9f372fea55b3209

            SHA1

            22b867553f1da406a9118ce1b589eac9352211ce

            SHA256

            a10963827eb17965a7c1bbea4a23aae81de2a952d9d3a0a6dcf8445e1821a7df

            SHA512

            75bea4ff0b0274edf59476f48a420f63ecee6afba8e41b62cd1c5f475fc27ee11517b3ccc4f439cd63a02053b54968f916442c8a4541a715bea6885021947ac5

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            76ff76bc96caf6f22466c5a3e241d41d

            SHA1

            e3cc62c3ba112c753620493b7192f054f5483a80

            SHA256

            9d7b10fbc502e32292844c91ed63509ae345adae812deadd8d60c8a8240f270c

            SHA512

            bc7a1557e02c4d3c570cd2901d51ff7870f3c918fb14d311a6b04ddf0e6b13798d28199c55c2b798d79c4d4acef722ea6e7306a356d06e4e0afc09fc53886081

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            7a5465b1f17fcc1c5c2403ad2616c413

            SHA1

            d7f5e2acf04a3048e007e5bd5cb9692b3ede88cb

            SHA256

            0766c9d63b46d537af69aea587e0f89c6ad33b8e233afcbc2d5c4a7bbe44e468

            SHA512

            b2f5e788d4b182178874819df8d338afe47385ee169634cd26f2164a99c39144e469054497b18a8b4c5877fb37e8b2cac02a888224bddeb3948083347020b1b4

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            7a5465b1f17fcc1c5c2403ad2616c413

            SHA1

            d7f5e2acf04a3048e007e5bd5cb9692b3ede88cb

            SHA256

            0766c9d63b46d537af69aea587e0f89c6ad33b8e233afcbc2d5c4a7bbe44e468

            SHA512

            b2f5e788d4b182178874819df8d338afe47385ee169634cd26f2164a99c39144e469054497b18a8b4c5877fb37e8b2cac02a888224bddeb3948083347020b1b4

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            cb9bdedd0433d5cb38e22fd787de432d

            SHA1

            0c48f32779199502e16483810e83a1f57a3748d8

            SHA256

            8e1db541e52e111151eef4cef88f08ff80dc7bb69d0f834d72bd80a7056ec233

            SHA512

            e1e145ab4dbd225d5578f1bd967f30d57abdbc490e973a6ee34af3a105da83cd25552eebdad9e40f47877fe7ba4763bd177815bfb98698c7ca612757c036d972

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            cb9bdedd0433d5cb38e22fd787de432d

            SHA1

            0c48f32779199502e16483810e83a1f57a3748d8

            SHA256

            8e1db541e52e111151eef4cef88f08ff80dc7bb69d0f834d72bd80a7056ec233

            SHA512

            e1e145ab4dbd225d5578f1bd967f30d57abdbc490e973a6ee34af3a105da83cd25552eebdad9e40f47877fe7ba4763bd177815bfb98698c7ca612757c036d972

          • \Users\Admin\AppData\Local\Temp\nsy11EE.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • \Users\Admin\AppData\Local\Temp\nsy11EE.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsy11EE.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsy11EE.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Users\Admin\AppData\Local\Temp\nsy11EE.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            c34803bb3c2d52b7c86d1db30bc8df47

            SHA1

            13cacc0ac3f7baa96d0b0be0bbccef7029893608

            SHA256

            f3caafd4fd4757063212153d5bfea0bc1dcdcb75090afc4269a80bda73d65383

            SHA512

            0326f550da00c544c262f8fd4f35728565151f8ccb43a83bdf5cdd902837fa3aac1c303d10ed9eeeb3b9b76b02a5e17b09f15cba63e252dce9095ab9ea6950c4

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            c34803bb3c2d52b7c86d1db30bc8df47

            SHA1

            13cacc0ac3f7baa96d0b0be0bbccef7029893608

            SHA256

            f3caafd4fd4757063212153d5bfea0bc1dcdcb75090afc4269a80bda73d65383

            SHA512

            0326f550da00c544c262f8fd4f35728565151f8ccb43a83bdf5cdd902837fa3aac1c303d10ed9eeeb3b9b76b02a5e17b09f15cba63e252dce9095ab9ea6950c4

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            c34803bb3c2d52b7c86d1db30bc8df47

            SHA1

            13cacc0ac3f7baa96d0b0be0bbccef7029893608

            SHA256

            f3caafd4fd4757063212153d5bfea0bc1dcdcb75090afc4269a80bda73d65383

            SHA512

            0326f550da00c544c262f8fd4f35728565151f8ccb43a83bdf5cdd902837fa3aac1c303d10ed9eeeb3b9b76b02a5e17b09f15cba63e252dce9095ab9ea6950c4

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            20be1a186738799ee9f372fea55b3209

            SHA1

            22b867553f1da406a9118ce1b589eac9352211ce

            SHA256

            a10963827eb17965a7c1bbea4a23aae81de2a952d9d3a0a6dcf8445e1821a7df

            SHA512

            75bea4ff0b0274edf59476f48a420f63ecee6afba8e41b62cd1c5f475fc27ee11517b3ccc4f439cd63a02053b54968f916442c8a4541a715bea6885021947ac5

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            20be1a186738799ee9f372fea55b3209

            SHA1

            22b867553f1da406a9118ce1b589eac9352211ce

            SHA256

            a10963827eb17965a7c1bbea4a23aae81de2a952d9d3a0a6dcf8445e1821a7df

            SHA512

            75bea4ff0b0274edf59476f48a420f63ecee6afba8e41b62cd1c5f475fc27ee11517b3ccc4f439cd63a02053b54968f916442c8a4541a715bea6885021947ac5

          • \Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            76ff76bc96caf6f22466c5a3e241d41d

            SHA1

            e3cc62c3ba112c753620493b7192f054f5483a80

            SHA256

            9d7b10fbc502e32292844c91ed63509ae345adae812deadd8d60c8a8240f270c

            SHA512

            bc7a1557e02c4d3c570cd2901d51ff7870f3c918fb14d311a6b04ddf0e6b13798d28199c55c2b798d79c4d4acef722ea6e7306a356d06e4e0afc09fc53886081

          • \Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            7a5465b1f17fcc1c5c2403ad2616c413

            SHA1

            d7f5e2acf04a3048e007e5bd5cb9692b3ede88cb

            SHA256

            0766c9d63b46d537af69aea587e0f89c6ad33b8e233afcbc2d5c4a7bbe44e468

            SHA512

            b2f5e788d4b182178874819df8d338afe47385ee169634cd26f2164a99c39144e469054497b18a8b4c5877fb37e8b2cac02a888224bddeb3948083347020b1b4

          • \Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            cb9bdedd0433d5cb38e22fd787de432d

            SHA1

            0c48f32779199502e16483810e83a1f57a3748d8

            SHA256

            8e1db541e52e111151eef4cef88f08ff80dc7bb69d0f834d72bd80a7056ec233

            SHA512

            e1e145ab4dbd225d5578f1bd967f30d57abdbc490e973a6ee34af3a105da83cd25552eebdad9e40f47877fe7ba4763bd177815bfb98698c7ca612757c036d972

          • memory/2012-54-0x00000000761E1000-0x00000000761E3000-memory.dmp

            Filesize

            8KB

          • memory/2012-59-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          • memory/2012-90-0x0000000000360000-0x00000000007BE000-memory.dmp

            Filesize

            4.4MB

          We care about your privacy.

          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.