Analysis
-
max time kernel
59s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:30
Static task
static1
Behavioral task
behavioral1
Sample
2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe
Resource
win10v2004-20221111-en
General
-
Target
2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe
-
Size
602KB
-
MD5
32c80e6d71ac717d336d8b2d812227c5
-
SHA1
812a554c7f35ad7bdcbfd14c70b4ed4b0f976189
-
SHA256
2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68
-
SHA512
34cbfe640147cd0c061e224686546751e11af00b0ed50ac5db976ee570909575c546673ba4c83837feeed59b6786cc4b4043d8f79a02d7d3a7ed74f7c6b6f13a
-
SSDEEP
12288:2Iny5DYTgS0+z7NQprRSzS/fBpj46lV3mc1twk+ocPA3:4UTgS0Y7NQp3BJVWlE
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exedescription ioc process File created C:\Windows\system32\drivers\nethfdrv.sys 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe -
Executes dropped EXE 5 IoCs
Processes:
installd.exenethtsrv.exenetupdsrv.exenethtsrv.exenetupdsrv.exepid process 892 installd.exe 1660 nethtsrv.exe 756 netupdsrv.exe 1540 nethtsrv.exe 1820 netupdsrv.exe -
Loads dropped DLL 13 IoCs
Processes:
2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exeinstalld.exenethtsrv.exenethtsrv.exepid process 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe 892 installd.exe 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe 1660 nethtsrv.exe 1660 nethtsrv.exe 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe 1540 nethtsrv.exe 1540 nethtsrv.exe 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
Processes:
2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exedescription ioc process File created C:\Windows\SysWOW64\hfnapi.dll 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe File created C:\Windows\SysWOW64\hfpapi.dll 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe File created C:\Windows\SysWOW64\installd.exe 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe File created C:\Windows\SysWOW64\nethtsrv.exe 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe File created C:\Windows\SysWOW64\netupdsrv.exe 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe -
Drops file in Program Files directory 3 IoCs
Processes:
2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exedescription ioc process File created C:\Program Files (x86)\Common Files\Config\data.xml 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 464 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nethtsrv.exedescription pid process Token: SeDebugPrivilege 1540 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1348 wrote to memory of 472 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe net.exe PID 1348 wrote to memory of 472 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe net.exe PID 1348 wrote to memory of 472 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe net.exe PID 1348 wrote to memory of 472 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe net.exe PID 472 wrote to memory of 1220 472 net.exe net1.exe PID 472 wrote to memory of 1220 472 net.exe net1.exe PID 472 wrote to memory of 1220 472 net.exe net1.exe PID 472 wrote to memory of 1220 472 net.exe net1.exe PID 1348 wrote to memory of 652 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe net.exe PID 1348 wrote to memory of 652 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe net.exe PID 1348 wrote to memory of 652 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe net.exe PID 1348 wrote to memory of 652 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe net.exe PID 652 wrote to memory of 1196 652 net.exe net1.exe PID 652 wrote to memory of 1196 652 net.exe net1.exe PID 652 wrote to memory of 1196 652 net.exe net1.exe PID 652 wrote to memory of 1196 652 net.exe net1.exe PID 1348 wrote to memory of 892 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe installd.exe PID 1348 wrote to memory of 892 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe installd.exe PID 1348 wrote to memory of 892 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe installd.exe PID 1348 wrote to memory of 892 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe installd.exe PID 1348 wrote to memory of 892 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe installd.exe PID 1348 wrote to memory of 892 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe installd.exe PID 1348 wrote to memory of 892 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe installd.exe PID 1348 wrote to memory of 1660 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe nethtsrv.exe PID 1348 wrote to memory of 1660 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe nethtsrv.exe PID 1348 wrote to memory of 1660 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe nethtsrv.exe PID 1348 wrote to memory of 1660 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe nethtsrv.exe PID 1348 wrote to memory of 756 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe netupdsrv.exe PID 1348 wrote to memory of 756 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe netupdsrv.exe PID 1348 wrote to memory of 756 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe netupdsrv.exe PID 1348 wrote to memory of 756 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe netupdsrv.exe PID 1348 wrote to memory of 756 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe netupdsrv.exe PID 1348 wrote to memory of 756 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe netupdsrv.exe PID 1348 wrote to memory of 756 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe netupdsrv.exe PID 1348 wrote to memory of 596 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe net.exe PID 1348 wrote to memory of 596 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe net.exe PID 1348 wrote to memory of 596 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe net.exe PID 1348 wrote to memory of 596 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe net.exe PID 596 wrote to memory of 680 596 net.exe net1.exe PID 596 wrote to memory of 680 596 net.exe net1.exe PID 596 wrote to memory of 680 596 net.exe net1.exe PID 596 wrote to memory of 680 596 net.exe net1.exe PID 1348 wrote to memory of 872 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe net.exe PID 1348 wrote to memory of 872 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe net.exe PID 1348 wrote to memory of 872 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe net.exe PID 1348 wrote to memory of 872 1348 2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe net.exe PID 872 wrote to memory of 1436 872 net.exe net1.exe PID 872 wrote to memory of 1436 872 net.exe net1.exe PID 872 wrote to memory of 1436 872 net.exe net1.exe PID 872 wrote to memory of 1436 872 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe"C:\Users\Admin\AppData\Local\Temp\2a864926355cad45909dc78d924072804b48312756821b3421d4d0ffddd11a68.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1220
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1196
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:892 -
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1660 -
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:756 -
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:680
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1436
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:1820
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5902e77a4046d1b0734cab577a5cd2939
SHA169ace76845b2a4e2c0d38a7039d7817759eb87be
SHA25603f703c166b5a4c2ac37abecf9e6c767dc8dd16f103c3e9adc5eccfb69a2acee
SHA512afd64cfec9115561aecc1ac478615d586b4eb530f12fb6f70abd9673a2a391c8672c47c5f6be1772cd8b4b0ddc31ddac5b4786d59384aa4bc78cfe7ce60e0b75
-
Filesize
241KB
MD56fc5786af2c2f1a3a37728131eb8d43a
SHA184cc69b64bad0e67dc9b92b55d90033aa6339f7f
SHA25662aa067f5b6ddd67d841f9207d0ea617cc22fd614ebdff8c6548a02d916d5507
SHA512fede185dc55269f9b780e044f034546b8ce8754fc11814296ffcdc9ac084c9ca6307bc044aba69b501c68df53946648465fe80c34f9360823c5c5957b1b5f852
-
Filesize
108KB
MD5cc54789b6adab8f7ea12f5ff21ac0dce
SHA120d010fdda52ff588e330cf09ec4aad811a3a5bd
SHA256db11a3e238a8adc9fe76b4c58532e33bf606f86461b52678daa1cce50ba990fb
SHA5127eb43dd7d8357a17efd9f7d5220f374b091f7ceefceffc6972ed3b9f7149a06a6d3b39f20b33b4cbba12161323f8feb9957ec71d8b3bff6b6dfcd292cfb134f8
-
Filesize
176KB
MD50e55521cfb32ed492ebdf48db32c9ff4
SHA11b0e178d792da93535597be7ae7cee36f72d0471
SHA256d36ef1a2e0e41de5e2a1cbc44e5a432412d07f85d1d3c3c6151de9c8f8de5e44
SHA51276f146ea9fdfc3bab600a02f0f292eddf81aadf431d0a1200baa4b4b7b657e6c5b5e6fe38fbc719938c425f5178db452901772534ce4cf7d0f3342fcf64e9304
-
Filesize
176KB
MD50e55521cfb32ed492ebdf48db32c9ff4
SHA11b0e178d792da93535597be7ae7cee36f72d0471
SHA256d36ef1a2e0e41de5e2a1cbc44e5a432412d07f85d1d3c3c6151de9c8f8de5e44
SHA51276f146ea9fdfc3bab600a02f0f292eddf81aadf431d0a1200baa4b4b7b657e6c5b5e6fe38fbc719938c425f5178db452901772534ce4cf7d0f3342fcf64e9304
-
Filesize
158KB
MD552d5a74e73601c5ef140d2055c3e147a
SHA1d9b0474574b9bc880587b1df33516944f4c3a34f
SHA25670a55268a36a2f3717f5091e0af94587a768b32305e7d39bef8cf59a3cf8163d
SHA5128ca97e3051b6296f9495832ca5321d3e5458abc5dbc86ff5d24758069b4c72d8a5874726da6fc1ca12539ad4c2cf2b0db57b978a442f42e8f344171f78991156
-
Filesize
158KB
MD552d5a74e73601c5ef140d2055c3e147a
SHA1d9b0474574b9bc880587b1df33516944f4c3a34f
SHA25670a55268a36a2f3717f5091e0af94587a768b32305e7d39bef8cf59a3cf8163d
SHA5128ca97e3051b6296f9495832ca5321d3e5458abc5dbc86ff5d24758069b4c72d8a5874726da6fc1ca12539ad4c2cf2b0db57b978a442f42e8f344171f78991156
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5902e77a4046d1b0734cab577a5cd2939
SHA169ace76845b2a4e2c0d38a7039d7817759eb87be
SHA25603f703c166b5a4c2ac37abecf9e6c767dc8dd16f103c3e9adc5eccfb69a2acee
SHA512afd64cfec9115561aecc1ac478615d586b4eb530f12fb6f70abd9673a2a391c8672c47c5f6be1772cd8b4b0ddc31ddac5b4786d59384aa4bc78cfe7ce60e0b75
-
Filesize
106KB
MD5902e77a4046d1b0734cab577a5cd2939
SHA169ace76845b2a4e2c0d38a7039d7817759eb87be
SHA25603f703c166b5a4c2ac37abecf9e6c767dc8dd16f103c3e9adc5eccfb69a2acee
SHA512afd64cfec9115561aecc1ac478615d586b4eb530f12fb6f70abd9673a2a391c8672c47c5f6be1772cd8b4b0ddc31ddac5b4786d59384aa4bc78cfe7ce60e0b75
-
Filesize
106KB
MD5902e77a4046d1b0734cab577a5cd2939
SHA169ace76845b2a4e2c0d38a7039d7817759eb87be
SHA25603f703c166b5a4c2ac37abecf9e6c767dc8dd16f103c3e9adc5eccfb69a2acee
SHA512afd64cfec9115561aecc1ac478615d586b4eb530f12fb6f70abd9673a2a391c8672c47c5f6be1772cd8b4b0ddc31ddac5b4786d59384aa4bc78cfe7ce60e0b75
-
Filesize
241KB
MD56fc5786af2c2f1a3a37728131eb8d43a
SHA184cc69b64bad0e67dc9b92b55d90033aa6339f7f
SHA25662aa067f5b6ddd67d841f9207d0ea617cc22fd614ebdff8c6548a02d916d5507
SHA512fede185dc55269f9b780e044f034546b8ce8754fc11814296ffcdc9ac084c9ca6307bc044aba69b501c68df53946648465fe80c34f9360823c5c5957b1b5f852
-
Filesize
241KB
MD56fc5786af2c2f1a3a37728131eb8d43a
SHA184cc69b64bad0e67dc9b92b55d90033aa6339f7f
SHA25662aa067f5b6ddd67d841f9207d0ea617cc22fd614ebdff8c6548a02d916d5507
SHA512fede185dc55269f9b780e044f034546b8ce8754fc11814296ffcdc9ac084c9ca6307bc044aba69b501c68df53946648465fe80c34f9360823c5c5957b1b5f852
-
Filesize
108KB
MD5cc54789b6adab8f7ea12f5ff21ac0dce
SHA120d010fdda52ff588e330cf09ec4aad811a3a5bd
SHA256db11a3e238a8adc9fe76b4c58532e33bf606f86461b52678daa1cce50ba990fb
SHA5127eb43dd7d8357a17efd9f7d5220f374b091f7ceefceffc6972ed3b9f7149a06a6d3b39f20b33b4cbba12161323f8feb9957ec71d8b3bff6b6dfcd292cfb134f8
-
Filesize
176KB
MD50e55521cfb32ed492ebdf48db32c9ff4
SHA11b0e178d792da93535597be7ae7cee36f72d0471
SHA256d36ef1a2e0e41de5e2a1cbc44e5a432412d07f85d1d3c3c6151de9c8f8de5e44
SHA51276f146ea9fdfc3bab600a02f0f292eddf81aadf431d0a1200baa4b4b7b657e6c5b5e6fe38fbc719938c425f5178db452901772534ce4cf7d0f3342fcf64e9304
-
Filesize
158KB
MD552d5a74e73601c5ef140d2055c3e147a
SHA1d9b0474574b9bc880587b1df33516944f4c3a34f
SHA25670a55268a36a2f3717f5091e0af94587a768b32305e7d39bef8cf59a3cf8163d
SHA5128ca97e3051b6296f9495832ca5321d3e5458abc5dbc86ff5d24758069b4c72d8a5874726da6fc1ca12539ad4c2cf2b0db57b978a442f42e8f344171f78991156