Analysis
-
max time kernel
13s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe
Resource
win10v2004-20221111-en
General
-
Target
4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe
-
Size
561KB
-
MD5
bdd571a8aa83528e248394dd79e23386
-
SHA1
fd7e435ceca61d7496147b8be633b29b68d2d638
-
SHA256
4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22
-
SHA512
8fc38d5bd7a2156cc31bd922a7038fc6db7df595c50badf88454493af9da39d42fcca56e617cfae37edd3ed317f3e6e5c0063d01897595de01b5d563b94544c5
-
SSDEEP
12288:tPRYzEbf45UlYlWI9Ly0d290U5GXKl5kS0j2noe61XvRq4QzkLU:0zwfKXbY0d9Unl5kSsPZ
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe -
Executes dropped EXE 5 IoCs
pid Process 388 installd.exe 828 nethtsrv.exe 1780 netupdsrv.exe 1508 nethtsrv.exe 1996 netupdsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 388 installd.exe 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 828 nethtsrv.exe 828 nethtsrv.exe 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 1508 nethtsrv.exe 1508 nethtsrv.exe 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfnapi.dll 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe File created C:\Windows\SysWOW64\hfpapi.dll 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe File created C:\Windows\SysWOW64\installd.exe 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe File created C:\Windows\SysWOW64\nethtsrv.exe 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe File created C:\Windows\SysWOW64\netupdsrv.exe 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1508 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 912 wrote to memory of 856 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 28 PID 912 wrote to memory of 856 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 28 PID 912 wrote to memory of 856 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 28 PID 912 wrote to memory of 856 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 28 PID 856 wrote to memory of 1268 856 net.exe 30 PID 856 wrote to memory of 1268 856 net.exe 30 PID 856 wrote to memory of 1268 856 net.exe 30 PID 856 wrote to memory of 1268 856 net.exe 30 PID 912 wrote to memory of 1324 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 31 PID 912 wrote to memory of 1324 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 31 PID 912 wrote to memory of 1324 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 31 PID 912 wrote to memory of 1324 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 31 PID 1324 wrote to memory of 1140 1324 net.exe 33 PID 1324 wrote to memory of 1140 1324 net.exe 33 PID 1324 wrote to memory of 1140 1324 net.exe 33 PID 1324 wrote to memory of 1140 1324 net.exe 33 PID 912 wrote to memory of 388 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 34 PID 912 wrote to memory of 388 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 34 PID 912 wrote to memory of 388 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 34 PID 912 wrote to memory of 388 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 34 PID 912 wrote to memory of 388 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 34 PID 912 wrote to memory of 388 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 34 PID 912 wrote to memory of 388 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 34 PID 912 wrote to memory of 828 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 36 PID 912 wrote to memory of 828 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 36 PID 912 wrote to memory of 828 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 36 PID 912 wrote to memory of 828 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 36 PID 912 wrote to memory of 1780 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 38 PID 912 wrote to memory of 1780 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 38 PID 912 wrote to memory of 1780 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 38 PID 912 wrote to memory of 1780 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 38 PID 912 wrote to memory of 1780 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 38 PID 912 wrote to memory of 1780 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 38 PID 912 wrote to memory of 1780 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 38 PID 912 wrote to memory of 1496 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 40 PID 912 wrote to memory of 1496 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 40 PID 912 wrote to memory of 1496 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 40 PID 912 wrote to memory of 1496 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 40 PID 1496 wrote to memory of 1736 1496 net.exe 42 PID 1496 wrote to memory of 1736 1496 net.exe 42 PID 1496 wrote to memory of 1736 1496 net.exe 42 PID 1496 wrote to memory of 1736 1496 net.exe 42 PID 912 wrote to memory of 1364 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 44 PID 912 wrote to memory of 1364 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 44 PID 912 wrote to memory of 1364 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 44 PID 912 wrote to memory of 1364 912 4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe 44 PID 1364 wrote to memory of 1560 1364 net.exe 46 PID 1364 wrote to memory of 1560 1364 net.exe 46 PID 1364 wrote to memory of 1560 1364 net.exe 46 PID 1364 wrote to memory of 1560 1364 net.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe"C:\Users\Admin\AppData\Local\Temp\4353b5a5033fc2a0be4d08f6a56e0bcfe7eadf4b01c811b2622b4b816121ab22.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1268
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1140
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:388
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:828
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1780
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1736
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1560
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:1996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD502c6123ac8cc2605e7ebd89533411788
SHA1dfd001a7d490ba9a86aea080f17354555727eda8
SHA256897ea3f760a09435040e196b2691cb312469531faca3a8f24327d0ad679b2067
SHA51241582dee05f82fe138fd5228ded68c4ab6758922534bd2744753940f000f0e9d9567bc1926e645660ec27c4a0b832725d1f055b16019d37e677a32d7e328639b
-
Filesize
241KB
MD565c8e506858e54ee3101d01d9d40a3a3
SHA1f227ffe4aef8acd0b36c4141631bab812d83268c
SHA2568454710f0f3f9f2bdb29052aae687286ec1870b5a6729060b1d8814af1303074
SHA512f6719f222fdc18025b5aaeae532b82b1fef70cef4014c9cb38f4775b622818d5d7565ff0e3523cefd71709fc2c45ace73884bb5871d197e869e704eff01f5287
-
Filesize
108KB
MD5b0e701f4183291368ecb93af0fac9472
SHA1128f7a29c79950ffa00df818b19ff10ca675a26d
SHA256977e95c3080697109e169d80deaa70b51aa77bd68d59d6a4055dacdb5dbf3bb4
SHA51287b8cc0b41ea117e8c4792971d05e213771d691ce6254dbc70a7bde8f0ddba716e766f3c7b1c4fac45b0f7c8e14040ba238244aa50c63db155dcc832ba7dc164
-
Filesize
176KB
MD5b620d7e10404e7b6ef1df970736be0cc
SHA17e04e9eaac644b6ab944647c03d045229190f3ad
SHA2569f38388c2e8255417f3713baf3f9e168774706d6513324f417fcb8c0d2d97067
SHA512c0602eeca9864edd059c170c9297c55d8c3809ca1cfa54598bf4bf10ca4ec95a05b85a68ba4702d11bb0376f50166177b5470bc78b8086dcf693e486a49b2988
-
Filesize
176KB
MD5b620d7e10404e7b6ef1df970736be0cc
SHA17e04e9eaac644b6ab944647c03d045229190f3ad
SHA2569f38388c2e8255417f3713baf3f9e168774706d6513324f417fcb8c0d2d97067
SHA512c0602eeca9864edd059c170c9297c55d8c3809ca1cfa54598bf4bf10ca4ec95a05b85a68ba4702d11bb0376f50166177b5470bc78b8086dcf693e486a49b2988
-
Filesize
158KB
MD5c024873f77de93e21de7192f02b0cce8
SHA13115dd3b82057d78b792355ee50f8b5f942fc7f0
SHA256616fc4deb48ff0aa51dca6ccf32fbf0eb5e31090c0d57c7369f8c1c08b6f92a6
SHA5120acc5275e488db5fa002b6179c43b8d6babbd1655f7ba74092f738abce654c6c89a92cc75de72ea2c6214361f5f4e67c1a9f0dcfd774c6becd830108fb9f8e1c
-
Filesize
158KB
MD5c024873f77de93e21de7192f02b0cce8
SHA13115dd3b82057d78b792355ee50f8b5f942fc7f0
SHA256616fc4deb48ff0aa51dca6ccf32fbf0eb5e31090c0d57c7369f8c1c08b6f92a6
SHA5120acc5275e488db5fa002b6179c43b8d6babbd1655f7ba74092f738abce654c6c89a92cc75de72ea2c6214361f5f4e67c1a9f0dcfd774c6becd830108fb9f8e1c
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD502c6123ac8cc2605e7ebd89533411788
SHA1dfd001a7d490ba9a86aea080f17354555727eda8
SHA256897ea3f760a09435040e196b2691cb312469531faca3a8f24327d0ad679b2067
SHA51241582dee05f82fe138fd5228ded68c4ab6758922534bd2744753940f000f0e9d9567bc1926e645660ec27c4a0b832725d1f055b16019d37e677a32d7e328639b
-
Filesize
106KB
MD502c6123ac8cc2605e7ebd89533411788
SHA1dfd001a7d490ba9a86aea080f17354555727eda8
SHA256897ea3f760a09435040e196b2691cb312469531faca3a8f24327d0ad679b2067
SHA51241582dee05f82fe138fd5228ded68c4ab6758922534bd2744753940f000f0e9d9567bc1926e645660ec27c4a0b832725d1f055b16019d37e677a32d7e328639b
-
Filesize
106KB
MD502c6123ac8cc2605e7ebd89533411788
SHA1dfd001a7d490ba9a86aea080f17354555727eda8
SHA256897ea3f760a09435040e196b2691cb312469531faca3a8f24327d0ad679b2067
SHA51241582dee05f82fe138fd5228ded68c4ab6758922534bd2744753940f000f0e9d9567bc1926e645660ec27c4a0b832725d1f055b16019d37e677a32d7e328639b
-
Filesize
241KB
MD565c8e506858e54ee3101d01d9d40a3a3
SHA1f227ffe4aef8acd0b36c4141631bab812d83268c
SHA2568454710f0f3f9f2bdb29052aae687286ec1870b5a6729060b1d8814af1303074
SHA512f6719f222fdc18025b5aaeae532b82b1fef70cef4014c9cb38f4775b622818d5d7565ff0e3523cefd71709fc2c45ace73884bb5871d197e869e704eff01f5287
-
Filesize
241KB
MD565c8e506858e54ee3101d01d9d40a3a3
SHA1f227ffe4aef8acd0b36c4141631bab812d83268c
SHA2568454710f0f3f9f2bdb29052aae687286ec1870b5a6729060b1d8814af1303074
SHA512f6719f222fdc18025b5aaeae532b82b1fef70cef4014c9cb38f4775b622818d5d7565ff0e3523cefd71709fc2c45ace73884bb5871d197e869e704eff01f5287
-
Filesize
108KB
MD5b0e701f4183291368ecb93af0fac9472
SHA1128f7a29c79950ffa00df818b19ff10ca675a26d
SHA256977e95c3080697109e169d80deaa70b51aa77bd68d59d6a4055dacdb5dbf3bb4
SHA51287b8cc0b41ea117e8c4792971d05e213771d691ce6254dbc70a7bde8f0ddba716e766f3c7b1c4fac45b0f7c8e14040ba238244aa50c63db155dcc832ba7dc164
-
Filesize
176KB
MD5b620d7e10404e7b6ef1df970736be0cc
SHA17e04e9eaac644b6ab944647c03d045229190f3ad
SHA2569f38388c2e8255417f3713baf3f9e168774706d6513324f417fcb8c0d2d97067
SHA512c0602eeca9864edd059c170c9297c55d8c3809ca1cfa54598bf4bf10ca4ec95a05b85a68ba4702d11bb0376f50166177b5470bc78b8086dcf693e486a49b2988
-
Filesize
158KB
MD5c024873f77de93e21de7192f02b0cce8
SHA13115dd3b82057d78b792355ee50f8b5f942fc7f0
SHA256616fc4deb48ff0aa51dca6ccf32fbf0eb5e31090c0d57c7369f8c1c08b6f92a6
SHA5120acc5275e488db5fa002b6179c43b8d6babbd1655f7ba74092f738abce654c6c89a92cc75de72ea2c6214361f5f4e67c1a9f0dcfd774c6becd830108fb9f8e1c