Analysis
-
max time kernel
91s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 23:09
Static task
static1
Behavioral task
behavioral1
Sample
7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe
Resource
win10v2004-20220812-en
General
-
Target
7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe
-
Size
561KB
-
MD5
480d68f9adca17db4fc686cbf3d932b1
-
SHA1
8d165cafeb0cc7626968425421ee88161b2d394b
-
SHA256
7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c
-
SHA512
1050bb6b2b766d7bf624404b0715c487990cadf39a189ca662a88cb0031b39274b1fff77fd29daf0a0254f50a03ee1067e976a29ebb417e8d258cf4d9659983f
-
SSDEEP
12288:cPRYzebfosAzDVeIfEaSUygPBvZnRi5peD75GTPDti:tzyfJwcaXrPJZI5SlyJ
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe -
Executes dropped EXE 5 IoCs
pid Process 1280 installd.exe 864 nethtsrv.exe 2952 netupdsrv.exe 4460 nethtsrv.exe 636 netupdsrv.exe -
Loads dropped DLL 14 IoCs
pid Process 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 1280 installd.exe 864 nethtsrv.exe 864 nethtsrv.exe 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 4460 nethtsrv.exe 4460 nethtsrv.exe 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfnapi.dll 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe File created C:\Windows\SysWOW64\hfpapi.dll 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe File created C:\Windows\SysWOW64\installd.exe 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe File created C:\Windows\SysWOW64\nethtsrv.exe 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe File created C:\Windows\SysWOW64\netupdsrv.exe 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4460 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4024 wrote to memory of 3504 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 78 PID 4024 wrote to memory of 3504 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 78 PID 4024 wrote to memory of 3504 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 78 PID 3504 wrote to memory of 4864 3504 net.exe 80 PID 3504 wrote to memory of 4864 3504 net.exe 80 PID 3504 wrote to memory of 4864 3504 net.exe 80 PID 4024 wrote to memory of 4808 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 81 PID 4024 wrote to memory of 4808 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 81 PID 4024 wrote to memory of 4808 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 81 PID 4808 wrote to memory of 5000 4808 net.exe 83 PID 4808 wrote to memory of 5000 4808 net.exe 83 PID 4808 wrote to memory of 5000 4808 net.exe 83 PID 4024 wrote to memory of 1280 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 84 PID 4024 wrote to memory of 1280 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 84 PID 4024 wrote to memory of 1280 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 84 PID 4024 wrote to memory of 864 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 86 PID 4024 wrote to memory of 864 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 86 PID 4024 wrote to memory of 864 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 86 PID 4024 wrote to memory of 2952 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 88 PID 4024 wrote to memory of 2952 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 88 PID 4024 wrote to memory of 2952 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 88 PID 4024 wrote to memory of 2800 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 90 PID 4024 wrote to memory of 2800 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 90 PID 4024 wrote to memory of 2800 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 90 PID 2800 wrote to memory of 1308 2800 net.exe 92 PID 2800 wrote to memory of 1308 2800 net.exe 92 PID 2800 wrote to memory of 1308 2800 net.exe 92 PID 4024 wrote to memory of 2956 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 96 PID 4024 wrote to memory of 2956 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 96 PID 4024 wrote to memory of 2956 4024 7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe 96 PID 2956 wrote to memory of 1300 2956 net.exe 98 PID 2956 wrote to memory of 1300 2956 net.exe 98 PID 2956 wrote to memory of 1300 2956 net.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe"C:\Users\Admin\AppData\Local\Temp\7a0439d13135de24d22217c6c14e65b38a9a04d4fd4b3265703db380a1cc088c.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:4864
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:5000
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1280
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:864
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:2952
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1308
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1300
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:636
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD55a55ae4e2457f718f3a52438ecea9c28
SHA1dae5c597d7daecfe9fc7db4bdd8fa9b847b81c76
SHA25669c9f0c4dbca0d2da79cbd85e75c9dd6033088347f6ee530181ac2f0e0d3fa02
SHA51266b2db84b68264cb85096f1c64bab18e7f8bfcb4d03b2d919e3ae1132290f015108542b722954ca88901269c091b85e2624ef83c85ab76efd5fe89cbe9f15f34
-
Filesize
106KB
MD55a55ae4e2457f718f3a52438ecea9c28
SHA1dae5c597d7daecfe9fc7db4bdd8fa9b847b81c76
SHA25669c9f0c4dbca0d2da79cbd85e75c9dd6033088347f6ee530181ac2f0e0d3fa02
SHA51266b2db84b68264cb85096f1c64bab18e7f8bfcb4d03b2d919e3ae1132290f015108542b722954ca88901269c091b85e2624ef83c85ab76efd5fe89cbe9f15f34
-
Filesize
106KB
MD55a55ae4e2457f718f3a52438ecea9c28
SHA1dae5c597d7daecfe9fc7db4bdd8fa9b847b81c76
SHA25669c9f0c4dbca0d2da79cbd85e75c9dd6033088347f6ee530181ac2f0e0d3fa02
SHA51266b2db84b68264cb85096f1c64bab18e7f8bfcb4d03b2d919e3ae1132290f015108542b722954ca88901269c091b85e2624ef83c85ab76efd5fe89cbe9f15f34
-
Filesize
106KB
MD55a55ae4e2457f718f3a52438ecea9c28
SHA1dae5c597d7daecfe9fc7db4bdd8fa9b847b81c76
SHA25669c9f0c4dbca0d2da79cbd85e75c9dd6033088347f6ee530181ac2f0e0d3fa02
SHA51266b2db84b68264cb85096f1c64bab18e7f8bfcb4d03b2d919e3ae1132290f015108542b722954ca88901269c091b85e2624ef83c85ab76efd5fe89cbe9f15f34
-
Filesize
241KB
MD5b18aeaedce0726eae2452c3caee3d3c1
SHA1c0908458cbf9f075a73d282ce80e4960276aa099
SHA256697465f89d43964279229609103ef39dffeb4db2d9da2e664bd39c2cc6a32c2f
SHA51234cb4b8f0f6f14836a6f356550119a01e16b9551edc74128860efb6608ce1477e5b980de9e5f395de4b84707978cdaeeca00d63f3adf298ce7e97d56176c27cd
-
Filesize
241KB
MD5b18aeaedce0726eae2452c3caee3d3c1
SHA1c0908458cbf9f075a73d282ce80e4960276aa099
SHA256697465f89d43964279229609103ef39dffeb4db2d9da2e664bd39c2cc6a32c2f
SHA51234cb4b8f0f6f14836a6f356550119a01e16b9551edc74128860efb6608ce1477e5b980de9e5f395de4b84707978cdaeeca00d63f3adf298ce7e97d56176c27cd
-
Filesize
241KB
MD5b18aeaedce0726eae2452c3caee3d3c1
SHA1c0908458cbf9f075a73d282ce80e4960276aa099
SHA256697465f89d43964279229609103ef39dffeb4db2d9da2e664bd39c2cc6a32c2f
SHA51234cb4b8f0f6f14836a6f356550119a01e16b9551edc74128860efb6608ce1477e5b980de9e5f395de4b84707978cdaeeca00d63f3adf298ce7e97d56176c27cd
-
Filesize
108KB
MD599ea080e908de8e6c80a46e39dc1f2c3
SHA10a0f683a77423bbd0447968575e786f1416e0390
SHA2564a99f98f541c1c2e9adf7d36cc9c801dfcaaaa7a064bd035e63605dbb639a30e
SHA512f75786a3882c9eed95875fef358436a325907a2b66f2a0566a9453f568ab4b2abc244fba937ba0bbfe8b6938b00c6e25103c2bd310d00c1a0cc715b28457ee3a
-
Filesize
108KB
MD599ea080e908de8e6c80a46e39dc1f2c3
SHA10a0f683a77423bbd0447968575e786f1416e0390
SHA2564a99f98f541c1c2e9adf7d36cc9c801dfcaaaa7a064bd035e63605dbb639a30e
SHA512f75786a3882c9eed95875fef358436a325907a2b66f2a0566a9453f568ab4b2abc244fba937ba0bbfe8b6938b00c6e25103c2bd310d00c1a0cc715b28457ee3a
-
Filesize
176KB
MD5fd67ee50edfaa261936826c6a4682698
SHA128585ee33a3190d4ed40f7850dd223ae8b356411
SHA2563896e9d2021ef29b43ff52d984a65fbeaf89fa3c273cb24e401ed76488c148d9
SHA512d0d2806235ba8a1623afd22a13c5056698107e0d464755d920722b052f1d765640f1c7d0ae177f8221c8756bc970f66cb8da18ecc22e9c8e7796843859053959
-
Filesize
176KB
MD5fd67ee50edfaa261936826c6a4682698
SHA128585ee33a3190d4ed40f7850dd223ae8b356411
SHA2563896e9d2021ef29b43ff52d984a65fbeaf89fa3c273cb24e401ed76488c148d9
SHA512d0d2806235ba8a1623afd22a13c5056698107e0d464755d920722b052f1d765640f1c7d0ae177f8221c8756bc970f66cb8da18ecc22e9c8e7796843859053959
-
Filesize
176KB
MD5fd67ee50edfaa261936826c6a4682698
SHA128585ee33a3190d4ed40f7850dd223ae8b356411
SHA2563896e9d2021ef29b43ff52d984a65fbeaf89fa3c273cb24e401ed76488c148d9
SHA512d0d2806235ba8a1623afd22a13c5056698107e0d464755d920722b052f1d765640f1c7d0ae177f8221c8756bc970f66cb8da18ecc22e9c8e7796843859053959
-
Filesize
158KB
MD527c0caf899484ebf0cc61e2baa9847c7
SHA1928c0cc667bee62e83d43890e0f21d6322c369ce
SHA256a0604b714e3768a81df8bd721cbd338e7df1f5bcfce92e5b07edee96b65f8c74
SHA5120e7fef32dbab41e603c7376a9b6337e14651f7c4f1aad4c45b9bfa05a98812696dd4387cfe714a76f101d3feca349430dfe2c1f0971ea4eb6e66013e8b524311
-
Filesize
158KB
MD527c0caf899484ebf0cc61e2baa9847c7
SHA1928c0cc667bee62e83d43890e0f21d6322c369ce
SHA256a0604b714e3768a81df8bd721cbd338e7df1f5bcfce92e5b07edee96b65f8c74
SHA5120e7fef32dbab41e603c7376a9b6337e14651f7c4f1aad4c45b9bfa05a98812696dd4387cfe714a76f101d3feca349430dfe2c1f0971ea4eb6e66013e8b524311
-
Filesize
158KB
MD527c0caf899484ebf0cc61e2baa9847c7
SHA1928c0cc667bee62e83d43890e0f21d6322c369ce
SHA256a0604b714e3768a81df8bd721cbd338e7df1f5bcfce92e5b07edee96b65f8c74
SHA5120e7fef32dbab41e603c7376a9b6337e14651f7c4f1aad4c45b9bfa05a98812696dd4387cfe714a76f101d3feca349430dfe2c1f0971ea4eb6e66013e8b524311