Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22/11/2022, 00:28
Static task
static1
Behavioral task
behavioral1
Sample
aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe
Resource
win10v2004-20221111-en
General
-
Target
aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe
-
Size
446KB
-
MD5
67f10882aa675e4edc0869900190e687
-
SHA1
6593d26153482da2d5ee2831c6283e4132c78d86
-
SHA256
aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287
-
SHA512
418308de280697be40790e72c35a829c390b93056c868765c3faf2b024f253df43bff48553800138c0d83ce2c9dd2cef84f1a07420626e52274b9a33441ab56b
-
SSDEEP
12288:dMpk1GkBKHHQ7CHJjLv++EZNm78C4pmIi2m0EsDy:d3YgKHHQ6JfIo78Tni2m0EsW
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe -
Executes dropped EXE 5 IoCs
pid Process 1192 installd.exe 1756 nethtsrv.exe 1552 netupdsrv.exe 1968 nethtsrv.exe 764 netupdsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 1192 installd.exe 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 1756 nethtsrv.exe 1756 nethtsrv.exe 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 1968 nethtsrv.exe 1968 nethtsrv.exe 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfpapi.dll aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe File created C:\Windows\SysWOW64\installd.exe aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe File created C:\Windows\SysWOW64\nethtsrv.exe aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe File created C:\Windows\SysWOW64\netupdsrv.exe aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe File created C:\Windows\SysWOW64\hfnapi.dll aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1968 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1088 wrote to memory of 848 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 27 PID 1088 wrote to memory of 848 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 27 PID 1088 wrote to memory of 848 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 27 PID 1088 wrote to memory of 848 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 27 PID 848 wrote to memory of 1388 848 net.exe 29 PID 848 wrote to memory of 1388 848 net.exe 29 PID 848 wrote to memory of 1388 848 net.exe 29 PID 848 wrote to memory of 1388 848 net.exe 29 PID 1088 wrote to memory of 1900 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 30 PID 1088 wrote to memory of 1900 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 30 PID 1088 wrote to memory of 1900 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 30 PID 1088 wrote to memory of 1900 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 30 PID 1900 wrote to memory of 1376 1900 net.exe 32 PID 1900 wrote to memory of 1376 1900 net.exe 32 PID 1900 wrote to memory of 1376 1900 net.exe 32 PID 1900 wrote to memory of 1376 1900 net.exe 32 PID 1088 wrote to memory of 1192 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 33 PID 1088 wrote to memory of 1192 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 33 PID 1088 wrote to memory of 1192 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 33 PID 1088 wrote to memory of 1192 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 33 PID 1088 wrote to memory of 1192 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 33 PID 1088 wrote to memory of 1192 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 33 PID 1088 wrote to memory of 1192 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 33 PID 1088 wrote to memory of 1756 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 35 PID 1088 wrote to memory of 1756 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 35 PID 1088 wrote to memory of 1756 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 35 PID 1088 wrote to memory of 1756 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 35 PID 1088 wrote to memory of 1552 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 37 PID 1088 wrote to memory of 1552 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 37 PID 1088 wrote to memory of 1552 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 37 PID 1088 wrote to memory of 1552 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 37 PID 1088 wrote to memory of 1552 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 37 PID 1088 wrote to memory of 1552 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 37 PID 1088 wrote to memory of 1552 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 37 PID 1088 wrote to memory of 1428 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 39 PID 1088 wrote to memory of 1428 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 39 PID 1088 wrote to memory of 1428 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 39 PID 1088 wrote to memory of 1428 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 39 PID 1428 wrote to memory of 1964 1428 net.exe 41 PID 1428 wrote to memory of 1964 1428 net.exe 41 PID 1428 wrote to memory of 1964 1428 net.exe 41 PID 1428 wrote to memory of 1964 1428 net.exe 41 PID 1088 wrote to memory of 876 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 43 PID 1088 wrote to memory of 876 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 43 PID 1088 wrote to memory of 876 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 43 PID 1088 wrote to memory of 876 1088 aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe 43 PID 876 wrote to memory of 1300 876 net.exe 45 PID 876 wrote to memory of 1300 876 net.exe 45 PID 876 wrote to memory of 1300 876 net.exe 45 PID 876 wrote to memory of 1300 876 net.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe"C:\Users\Admin\AppData\Local\Temp\aa4c8acc081cecc7a66a93af36a72837f6d52818589b948c6b3cd655cd946287.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1388
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1376
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1192
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1756
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1552
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1964
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1300
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:764
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD51160b90baab892bf9e7f4823114e7ed3
SHA1463214beebf89f225997010ad4a2f2a180d575c1
SHA25693bc2e02ce66d7764256fec0558addd7331ce35f0009cbc46e79ba14f58b1856
SHA512a196bfbb63a8f14c643b83c90c31c9ecb302d8e194752ab48209bc92325ea6ccc344c7505622fc1eaab2ac6923b1269f1799281d04db635a59f762d712a89794
-
Filesize
241KB
MD57193df5c38f9b829094cc6547929c489
SHA146d3fcbb14a07986c0624db393391cdd730c17da
SHA2568109b60c96a0adfa663bb01722707e96d0db9f2f19aa30122fc68534993d769e
SHA512a80d595bb1c5c63e641ad9f7813bb6bcd817858c2cd912b6f8575dbbe3b5a6c622bd847a69fddc3d3f71d93f4bfc65f7bc707d3e4e79c067834e869b209a8a92
-
Filesize
108KB
MD502d5d35f0c39f31839376234b07aab6b
SHA1bb8bb9e4cfa38eb4ed3acee780209da7bcdbf85a
SHA2566d8b3ca5b65c62ef9c20884bf5700a0097f0f9253e323fb14bee7767f5260297
SHA512233f7eee2c10026741e653dc5522300f500ec2682b437e7ab28f6b870b7ef91e4d680e47cb6747603213e7ec64b8e936b99ff57b30670e263071101a5c3fcae4
-
Filesize
176KB
MD5ceb204423f02fd9b17db4b55bd66c898
SHA135ea09e8cf8e83652132d51dd43d1b98402c3f9c
SHA256bd57b409b1bc159850e4d9a9af2384caf87f53d6b02dffed7f0172625e19e077
SHA512b14f7f48713a56d98604149f1e505189a70821ddb8c2c2864368236168646657a0f7b8111cb5ee90424303f55eea6d4e8b3035e0c055d32d24d20310a2fbb374
-
Filesize
176KB
MD5ceb204423f02fd9b17db4b55bd66c898
SHA135ea09e8cf8e83652132d51dd43d1b98402c3f9c
SHA256bd57b409b1bc159850e4d9a9af2384caf87f53d6b02dffed7f0172625e19e077
SHA512b14f7f48713a56d98604149f1e505189a70821ddb8c2c2864368236168646657a0f7b8111cb5ee90424303f55eea6d4e8b3035e0c055d32d24d20310a2fbb374
-
Filesize
158KB
MD5710fe54ec104f6ec3bf09a782a111686
SHA1cd45a0fb6aca64def6afdac07ed3dfe92f03b928
SHA256684bad5cd2ca906a9781f38adca5bb5ea41e2cf53c81a3642ab7fad2ea004d7c
SHA5123be3f423f403cc1706d71be62071282aea6321a62996594e32081aa842406595255b783276df8de74fa721d33a218531d621ae5ababcb2085d2deada6e8ee638
-
Filesize
158KB
MD5710fe54ec104f6ec3bf09a782a111686
SHA1cd45a0fb6aca64def6afdac07ed3dfe92f03b928
SHA256684bad5cd2ca906a9781f38adca5bb5ea41e2cf53c81a3642ab7fad2ea004d7c
SHA5123be3f423f403cc1706d71be62071282aea6321a62996594e32081aa842406595255b783276df8de74fa721d33a218531d621ae5ababcb2085d2deada6e8ee638
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD51160b90baab892bf9e7f4823114e7ed3
SHA1463214beebf89f225997010ad4a2f2a180d575c1
SHA25693bc2e02ce66d7764256fec0558addd7331ce35f0009cbc46e79ba14f58b1856
SHA512a196bfbb63a8f14c643b83c90c31c9ecb302d8e194752ab48209bc92325ea6ccc344c7505622fc1eaab2ac6923b1269f1799281d04db635a59f762d712a89794
-
Filesize
106KB
MD51160b90baab892bf9e7f4823114e7ed3
SHA1463214beebf89f225997010ad4a2f2a180d575c1
SHA25693bc2e02ce66d7764256fec0558addd7331ce35f0009cbc46e79ba14f58b1856
SHA512a196bfbb63a8f14c643b83c90c31c9ecb302d8e194752ab48209bc92325ea6ccc344c7505622fc1eaab2ac6923b1269f1799281d04db635a59f762d712a89794
-
Filesize
106KB
MD51160b90baab892bf9e7f4823114e7ed3
SHA1463214beebf89f225997010ad4a2f2a180d575c1
SHA25693bc2e02ce66d7764256fec0558addd7331ce35f0009cbc46e79ba14f58b1856
SHA512a196bfbb63a8f14c643b83c90c31c9ecb302d8e194752ab48209bc92325ea6ccc344c7505622fc1eaab2ac6923b1269f1799281d04db635a59f762d712a89794
-
Filesize
241KB
MD57193df5c38f9b829094cc6547929c489
SHA146d3fcbb14a07986c0624db393391cdd730c17da
SHA2568109b60c96a0adfa663bb01722707e96d0db9f2f19aa30122fc68534993d769e
SHA512a80d595bb1c5c63e641ad9f7813bb6bcd817858c2cd912b6f8575dbbe3b5a6c622bd847a69fddc3d3f71d93f4bfc65f7bc707d3e4e79c067834e869b209a8a92
-
Filesize
241KB
MD57193df5c38f9b829094cc6547929c489
SHA146d3fcbb14a07986c0624db393391cdd730c17da
SHA2568109b60c96a0adfa663bb01722707e96d0db9f2f19aa30122fc68534993d769e
SHA512a80d595bb1c5c63e641ad9f7813bb6bcd817858c2cd912b6f8575dbbe3b5a6c622bd847a69fddc3d3f71d93f4bfc65f7bc707d3e4e79c067834e869b209a8a92
-
Filesize
108KB
MD502d5d35f0c39f31839376234b07aab6b
SHA1bb8bb9e4cfa38eb4ed3acee780209da7bcdbf85a
SHA2566d8b3ca5b65c62ef9c20884bf5700a0097f0f9253e323fb14bee7767f5260297
SHA512233f7eee2c10026741e653dc5522300f500ec2682b437e7ab28f6b870b7ef91e4d680e47cb6747603213e7ec64b8e936b99ff57b30670e263071101a5c3fcae4
-
Filesize
176KB
MD5ceb204423f02fd9b17db4b55bd66c898
SHA135ea09e8cf8e83652132d51dd43d1b98402c3f9c
SHA256bd57b409b1bc159850e4d9a9af2384caf87f53d6b02dffed7f0172625e19e077
SHA512b14f7f48713a56d98604149f1e505189a70821ddb8c2c2864368236168646657a0f7b8111cb5ee90424303f55eea6d4e8b3035e0c055d32d24d20310a2fbb374
-
Filesize
158KB
MD5710fe54ec104f6ec3bf09a782a111686
SHA1cd45a0fb6aca64def6afdac07ed3dfe92f03b928
SHA256684bad5cd2ca906a9781f38adca5bb5ea41e2cf53c81a3642ab7fad2ea004d7c
SHA5123be3f423f403cc1706d71be62071282aea6321a62996594e32081aa842406595255b783276df8de74fa721d33a218531d621ae5ababcb2085d2deada6e8ee638