Analysis
-
max time kernel
98s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
22/11/2022, 00:25
Static task
static1
Behavioral task
behavioral1
Sample
32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe
Resource
win10v2004-20220812-en
General
-
Target
32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe
-
Size
695KB
-
MD5
43af0121b3b5ce65684c3745d2f70b74
-
SHA1
1fbf76ba2ee4bf2bc0c8553de914ee330af2785b
-
SHA256
32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8
-
SHA512
f3bb1af2b5a1586eb8d6ce82ea6097ba27b2de6cdef01752e641f7863bb0b186b73fd90d8287e35dfe7116f694e059c9ed6eeb00bd37cb411fd501e74534e873
-
SSDEEP
12288:VAbu3fQ+thk6EzmbfuY9/3JuNi5HSR+6BedCW18fWpfsqpLoCYE+:VAbuPPEzqfzfANi5HSR+Zo+dR1JvYE+
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe -
Executes dropped EXE 5 IoCs
pid Process 1928 installd.exe 600 nethtsrv.exe 780 netupdsrv.exe 1140 nethtsrv.exe 1688 netupdsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 1928 installd.exe 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 600 nethtsrv.exe 600 nethtsrv.exe 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 1140 nethtsrv.exe 1140 nethtsrv.exe 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\installd.exe 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe File created C:\Windows\SysWOW64\nethtsrv.exe 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe File created C:\Windows\SysWOW64\netupdsrv.exe 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe File created C:\Windows\SysWOW64\hfnapi.dll 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe File created C:\Windows\SysWOW64\hfpapi.dll 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1140 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 2044 wrote to memory of 556 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 28 PID 2044 wrote to memory of 556 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 28 PID 2044 wrote to memory of 556 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 28 PID 2044 wrote to memory of 556 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 28 PID 556 wrote to memory of 1388 556 net.exe 30 PID 556 wrote to memory of 1388 556 net.exe 30 PID 556 wrote to memory of 1388 556 net.exe 30 PID 556 wrote to memory of 1388 556 net.exe 30 PID 2044 wrote to memory of 664 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 31 PID 2044 wrote to memory of 664 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 31 PID 2044 wrote to memory of 664 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 31 PID 2044 wrote to memory of 664 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 31 PID 664 wrote to memory of 1524 664 net.exe 33 PID 664 wrote to memory of 1524 664 net.exe 33 PID 664 wrote to memory of 1524 664 net.exe 33 PID 664 wrote to memory of 1524 664 net.exe 33 PID 2044 wrote to memory of 1928 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 34 PID 2044 wrote to memory of 1928 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 34 PID 2044 wrote to memory of 1928 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 34 PID 2044 wrote to memory of 1928 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 34 PID 2044 wrote to memory of 1928 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 34 PID 2044 wrote to memory of 1928 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 34 PID 2044 wrote to memory of 1928 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 34 PID 2044 wrote to memory of 600 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 36 PID 2044 wrote to memory of 600 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 36 PID 2044 wrote to memory of 600 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 36 PID 2044 wrote to memory of 600 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 36 PID 2044 wrote to memory of 780 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 38 PID 2044 wrote to memory of 780 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 38 PID 2044 wrote to memory of 780 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 38 PID 2044 wrote to memory of 780 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 38 PID 2044 wrote to memory of 780 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 38 PID 2044 wrote to memory of 780 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 38 PID 2044 wrote to memory of 780 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 38 PID 2044 wrote to memory of 1748 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 40 PID 2044 wrote to memory of 1748 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 40 PID 2044 wrote to memory of 1748 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 40 PID 2044 wrote to memory of 1748 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 40 PID 1748 wrote to memory of 1880 1748 net.exe 42 PID 1748 wrote to memory of 1880 1748 net.exe 42 PID 1748 wrote to memory of 1880 1748 net.exe 42 PID 1748 wrote to memory of 1880 1748 net.exe 42 PID 2044 wrote to memory of 896 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 44 PID 2044 wrote to memory of 896 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 44 PID 2044 wrote to memory of 896 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 44 PID 2044 wrote to memory of 896 2044 32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe 44 PID 896 wrote to memory of 1976 896 net.exe 46 PID 896 wrote to memory of 1976 896 net.exe 46 PID 896 wrote to memory of 1976 896 net.exe 46 PID 896 wrote to memory of 1976 896 net.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe"C:\Users\Admin\AppData\Local\Temp\32fb2daee97b4b4054c9df65f0488d7398211c68d6a314afd8310c4e7bb1f5f8.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1388
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1524
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1928
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:600
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:780
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1880
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1976
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:1688
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD564fddddd467d56dd947c29c206c09523
SHA11f3c0689614b1f171056b0d60c7c6d6b4bb3ac17
SHA2566a1ccb19f8978ebd7e621c07c7638deb59e3ebd105c5ee27ee87a19b4e6d54b2
SHA512e1ec7577d7e14569b6c33bca8a5f7121e795c0ae413f62f05e0aab095d29e30240a546718764a5dcb861c0febc1e1b2b91692d7835ada73157225a39ef99d900
-
Filesize
241KB
MD55f1ed2a7320cac324d36155debd9b01a
SHA140a5c73637d88b6093ff10eb69804f807cfb994b
SHA2562e3904b723f5825d449d77b0242a6783f2ac4913b35b1f71de813c25ed4c6d68
SHA512b055fbe8075ccb5d30280d67b0c79f46e852d5c4fd8fd9821a34c22cc0b8ff8ab09545808ac65632259dcfb072720af9df46080aff6c1dbf03c04fc8349d3b01
-
Filesize
108KB
MD5dfbd08f0326a49ef387d1fa24984da82
SHA1a928904d01b71090cb90548ebedffab0ccd14775
SHA256b01ed2df8f120711d3a42b38ed98c791dee136a15b3b6b0a2fc5c97f7d70acdb
SHA5121b9a993bf4813ca5b358f850699f71829f2df8cc2825cbc02e7d96d04501a024e3b4a9eccbe110c4ed7c2f5f6989bdb0d142bb391f3f7c720eee5d94cf7f5a3f
-
Filesize
176KB
MD55b8ca9a1cf18ce9fdcd26f6505f19d6c
SHA1f466cfaa42a02e00bab471b163ac9d46372d1820
SHA256076f3181c4d56c728d453e1695fa4ee3054b459b7eddc46419edb075596a9692
SHA5124a50b67d1ebff7b6f6eea0b8e3fd4bd12f97d5bc48bdbf0e34d52c1188259e1866658a2dda64fe5433d78418d70ca256065d247cacc88816d8242c0bae27c3f0
-
Filesize
176KB
MD55b8ca9a1cf18ce9fdcd26f6505f19d6c
SHA1f466cfaa42a02e00bab471b163ac9d46372d1820
SHA256076f3181c4d56c728d453e1695fa4ee3054b459b7eddc46419edb075596a9692
SHA5124a50b67d1ebff7b6f6eea0b8e3fd4bd12f97d5bc48bdbf0e34d52c1188259e1866658a2dda64fe5433d78418d70ca256065d247cacc88816d8242c0bae27c3f0
-
Filesize
158KB
MD570e2a1c67548da22bc1df490ab7e88c8
SHA11d0e57b1177a81d4d6db8f880b1c00a50ff01496
SHA256889893b83603f45086c6a03d36435d3fda31ed590d6cf4109df6486517f49cfa
SHA512599de779b800edbea1dd7039128607a3361d29c18d162e0a5aefe0dda38797d0046f2e87d1ac572313a45bff714367fe09a8972d933798c5b5eb5acacc154415
-
Filesize
158KB
MD570e2a1c67548da22bc1df490ab7e88c8
SHA11d0e57b1177a81d4d6db8f880b1c00a50ff01496
SHA256889893b83603f45086c6a03d36435d3fda31ed590d6cf4109df6486517f49cfa
SHA512599de779b800edbea1dd7039128607a3361d29c18d162e0a5aefe0dda38797d0046f2e87d1ac572313a45bff714367fe09a8972d933798c5b5eb5acacc154415
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD564fddddd467d56dd947c29c206c09523
SHA11f3c0689614b1f171056b0d60c7c6d6b4bb3ac17
SHA2566a1ccb19f8978ebd7e621c07c7638deb59e3ebd105c5ee27ee87a19b4e6d54b2
SHA512e1ec7577d7e14569b6c33bca8a5f7121e795c0ae413f62f05e0aab095d29e30240a546718764a5dcb861c0febc1e1b2b91692d7835ada73157225a39ef99d900
-
Filesize
106KB
MD564fddddd467d56dd947c29c206c09523
SHA11f3c0689614b1f171056b0d60c7c6d6b4bb3ac17
SHA2566a1ccb19f8978ebd7e621c07c7638deb59e3ebd105c5ee27ee87a19b4e6d54b2
SHA512e1ec7577d7e14569b6c33bca8a5f7121e795c0ae413f62f05e0aab095d29e30240a546718764a5dcb861c0febc1e1b2b91692d7835ada73157225a39ef99d900
-
Filesize
106KB
MD564fddddd467d56dd947c29c206c09523
SHA11f3c0689614b1f171056b0d60c7c6d6b4bb3ac17
SHA2566a1ccb19f8978ebd7e621c07c7638deb59e3ebd105c5ee27ee87a19b4e6d54b2
SHA512e1ec7577d7e14569b6c33bca8a5f7121e795c0ae413f62f05e0aab095d29e30240a546718764a5dcb861c0febc1e1b2b91692d7835ada73157225a39ef99d900
-
Filesize
241KB
MD55f1ed2a7320cac324d36155debd9b01a
SHA140a5c73637d88b6093ff10eb69804f807cfb994b
SHA2562e3904b723f5825d449d77b0242a6783f2ac4913b35b1f71de813c25ed4c6d68
SHA512b055fbe8075ccb5d30280d67b0c79f46e852d5c4fd8fd9821a34c22cc0b8ff8ab09545808ac65632259dcfb072720af9df46080aff6c1dbf03c04fc8349d3b01
-
Filesize
241KB
MD55f1ed2a7320cac324d36155debd9b01a
SHA140a5c73637d88b6093ff10eb69804f807cfb994b
SHA2562e3904b723f5825d449d77b0242a6783f2ac4913b35b1f71de813c25ed4c6d68
SHA512b055fbe8075ccb5d30280d67b0c79f46e852d5c4fd8fd9821a34c22cc0b8ff8ab09545808ac65632259dcfb072720af9df46080aff6c1dbf03c04fc8349d3b01
-
Filesize
108KB
MD5dfbd08f0326a49ef387d1fa24984da82
SHA1a928904d01b71090cb90548ebedffab0ccd14775
SHA256b01ed2df8f120711d3a42b38ed98c791dee136a15b3b6b0a2fc5c97f7d70acdb
SHA5121b9a993bf4813ca5b358f850699f71829f2df8cc2825cbc02e7d96d04501a024e3b4a9eccbe110c4ed7c2f5f6989bdb0d142bb391f3f7c720eee5d94cf7f5a3f
-
Filesize
176KB
MD55b8ca9a1cf18ce9fdcd26f6505f19d6c
SHA1f466cfaa42a02e00bab471b163ac9d46372d1820
SHA256076f3181c4d56c728d453e1695fa4ee3054b459b7eddc46419edb075596a9692
SHA5124a50b67d1ebff7b6f6eea0b8e3fd4bd12f97d5bc48bdbf0e34d52c1188259e1866658a2dda64fe5433d78418d70ca256065d247cacc88816d8242c0bae27c3f0
-
Filesize
158KB
MD570e2a1c67548da22bc1df490ab7e88c8
SHA11d0e57b1177a81d4d6db8f880b1c00a50ff01496
SHA256889893b83603f45086c6a03d36435d3fda31ed590d6cf4109df6486517f49cfa
SHA512599de779b800edbea1dd7039128607a3361d29c18d162e0a5aefe0dda38797d0046f2e87d1ac572313a45bff714367fe09a8972d933798c5b5eb5acacc154415