Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:29
Static task
static1
Behavioral task
behavioral1
Sample
37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe
Resource
win10v2004-20220812-en
General
-
Target
37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe
-
Size
602KB
-
MD5
07d3e4a252f5577d4cef4d7eeae6c2a6
-
SHA1
1897e45b79e8aeb7a3567f263ec8126fbdb29d81
-
SHA256
37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894
-
SHA512
b67e859d1418193b1c8a78ec7f3d3ca053f16f065c6b54c814545690bc813eca0e54f953cd5245bc7976fc76f08da18378119044d8ae951eb7a685a76119967c
-
SSDEEP
12288:PIny5DYTg1qe3kcwZ65kUR9kql/Hm6FzL/bAc:XUTg1XqvckqlP3Fzh
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exedescription ioc process File created C:\Windows\system32\drivers\nethfdrv.sys 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe -
Executes dropped EXE 5 IoCs
Processes:
installd.exenethtsrv.exenetupdsrv.exenethtsrv.exenetupdsrv.exepid process 1932 installd.exe 1308 nethtsrv.exe 1528 netupdsrv.exe 1620 nethtsrv.exe 1828 netupdsrv.exe -
Loads dropped DLL 13 IoCs
Processes:
37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exeinstalld.exenethtsrv.exenethtsrv.exepid process 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe 1932 installd.exe 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe 1308 nethtsrv.exe 1308 nethtsrv.exe 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe 1620 nethtsrv.exe 1620 nethtsrv.exe 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
Processes:
37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exedescription ioc process File created C:\Windows\SysWOW64\hfpapi.dll 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe File created C:\Windows\SysWOW64\installd.exe 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe File created C:\Windows\SysWOW64\nethtsrv.exe 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe File created C:\Windows\SysWOW64\netupdsrv.exe 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe File created C:\Windows\SysWOW64\hfnapi.dll 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe -
Drops file in Program Files directory 3 IoCs
Processes:
37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exedescription ioc process File created C:\Program Files (x86)\Common Files\Config\data.xml 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 464 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nethtsrv.exedescription pid process Token: SeDebugPrivilege 1620 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1884 wrote to memory of 1984 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe net.exe PID 1884 wrote to memory of 1984 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe net.exe PID 1884 wrote to memory of 1984 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe net.exe PID 1884 wrote to memory of 1984 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe net.exe PID 1984 wrote to memory of 1936 1984 net.exe net1.exe PID 1984 wrote to memory of 1936 1984 net.exe net1.exe PID 1984 wrote to memory of 1936 1984 net.exe net1.exe PID 1984 wrote to memory of 1936 1984 net.exe net1.exe PID 1884 wrote to memory of 1968 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe net.exe PID 1884 wrote to memory of 1968 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe net.exe PID 1884 wrote to memory of 1968 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe net.exe PID 1884 wrote to memory of 1968 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe net.exe PID 1968 wrote to memory of 1964 1968 net.exe net1.exe PID 1968 wrote to memory of 1964 1968 net.exe net1.exe PID 1968 wrote to memory of 1964 1968 net.exe net1.exe PID 1968 wrote to memory of 1964 1968 net.exe net1.exe PID 1884 wrote to memory of 1932 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe installd.exe PID 1884 wrote to memory of 1932 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe installd.exe PID 1884 wrote to memory of 1932 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe installd.exe PID 1884 wrote to memory of 1932 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe installd.exe PID 1884 wrote to memory of 1932 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe installd.exe PID 1884 wrote to memory of 1932 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe installd.exe PID 1884 wrote to memory of 1932 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe installd.exe PID 1884 wrote to memory of 1308 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe nethtsrv.exe PID 1884 wrote to memory of 1308 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe nethtsrv.exe PID 1884 wrote to memory of 1308 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe nethtsrv.exe PID 1884 wrote to memory of 1308 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe nethtsrv.exe PID 1884 wrote to memory of 1528 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe netupdsrv.exe PID 1884 wrote to memory of 1528 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe netupdsrv.exe PID 1884 wrote to memory of 1528 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe netupdsrv.exe PID 1884 wrote to memory of 1528 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe netupdsrv.exe PID 1884 wrote to memory of 1528 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe netupdsrv.exe PID 1884 wrote to memory of 1528 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe netupdsrv.exe PID 1884 wrote to memory of 1528 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe netupdsrv.exe PID 1884 wrote to memory of 1664 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe net.exe PID 1884 wrote to memory of 1664 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe net.exe PID 1884 wrote to memory of 1664 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe net.exe PID 1884 wrote to memory of 1664 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe net.exe PID 1664 wrote to memory of 1660 1664 net.exe net1.exe PID 1664 wrote to memory of 1660 1664 net.exe net1.exe PID 1664 wrote to memory of 1660 1664 net.exe net1.exe PID 1664 wrote to memory of 1660 1664 net.exe net1.exe PID 1884 wrote to memory of 880 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe net.exe PID 1884 wrote to memory of 880 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe net.exe PID 1884 wrote to memory of 880 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe net.exe PID 1884 wrote to memory of 880 1884 37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe net.exe PID 880 wrote to memory of 1712 880 net.exe net1.exe PID 880 wrote to memory of 1712 880 net.exe net1.exe PID 880 wrote to memory of 1712 880 net.exe net1.exe PID 880 wrote to memory of 1712 880 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe"C:\Users\Admin\AppData\Local\Temp\37980b4cb0d82bb016084e34d624dc37337911defb5691e84486b6db5e369894.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1936
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1964
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1932 -
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1308 -
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1528 -
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1660
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1712
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:1828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5f75e908cf18e922856d95a1dffaa8296
SHA1566a62c8ee0340561426fc08f526ea93f7c851c5
SHA2565f09b07d6cfe9dffe49d8b6c2513bc2bfe18a11aa58c486416b6f811ddf078a2
SHA512d61cae2960bb4b619d5fc6a724254fa789db20721b580e2ee6375cc5097aab196566d64d8376062a62007ebe9d9f5ba8aaf4b93a40c664379c75a5061b9e51f1
-
Filesize
241KB
MD5d4532de8244ebd4b67c1e0dfdf325e70
SHA196e88dd3718f1d5f0df9d80e3de3fd4b7e7ebede
SHA2567ee835682cacdc7e08f8169acb0e00b8a392637322bede01b8e8deff4ba66806
SHA51278409d31ea055130231961bb3b468c9843efa3bf21ba9ca8aae2c78be1a098e1bae9c61549f60780257a78a8e5b9d38b4ea616f8b6b4ef9fdf02c7eee64085b4
-
Filesize
108KB
MD5c9470ebfdc3c9ffecaab27aa6317c072
SHA1ddd35484095baa15a8bf1774776c0c5a0158a870
SHA256bbf737a68b16043d74df456b373f779f2619ac9dc44d2e8983192d52ca00b822
SHA512e2d80503b56697172889db08b38c497e0f9d39b20952b6d26f96c92c8468c4888f839e45835ffd0440f33b0c18a9ad3a37f5028f726669eadfc0c68c412ec6e5
-
Filesize
176KB
MD5f6cd33176b56f364710da423684946b7
SHA125e4d2e9956be48174a1d4b2f925e62d991d0467
SHA256ddb2ae6a7d334f9e98eacfce3dcfdccada0063db74a3442a17eb85bf0ef8e90d
SHA512dde01eb952253112d70253e41978c6b7736858eeb87ba3072031237825e6f42022250e9285ca7e71e550d0fdf5f4e12a8a39c94d3c942265736302d5f70b87d9
-
Filesize
176KB
MD5f6cd33176b56f364710da423684946b7
SHA125e4d2e9956be48174a1d4b2f925e62d991d0467
SHA256ddb2ae6a7d334f9e98eacfce3dcfdccada0063db74a3442a17eb85bf0ef8e90d
SHA512dde01eb952253112d70253e41978c6b7736858eeb87ba3072031237825e6f42022250e9285ca7e71e550d0fdf5f4e12a8a39c94d3c942265736302d5f70b87d9
-
Filesize
159KB
MD529a2a6998272140686c3646f8c30b4e4
SHA1fe07fa5cbbfd41cc3c4249587efa7dc5c3820fde
SHA256cff32c7036c661a716e4b9d082813d714785dca9a058dbd6db3e704d6cec7d6f
SHA5124109100081a3cf54408b944c64d8e4dd2b82482ebb17cfce699aae387bdd86047788ac98b6988819019dea6d823b47dbcd62927f484bfddefae3a77b0059be82
-
Filesize
159KB
MD529a2a6998272140686c3646f8c30b4e4
SHA1fe07fa5cbbfd41cc3c4249587efa7dc5c3820fde
SHA256cff32c7036c661a716e4b9d082813d714785dca9a058dbd6db3e704d6cec7d6f
SHA5124109100081a3cf54408b944c64d8e4dd2b82482ebb17cfce699aae387bdd86047788ac98b6988819019dea6d823b47dbcd62927f484bfddefae3a77b0059be82
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5f75e908cf18e922856d95a1dffaa8296
SHA1566a62c8ee0340561426fc08f526ea93f7c851c5
SHA2565f09b07d6cfe9dffe49d8b6c2513bc2bfe18a11aa58c486416b6f811ddf078a2
SHA512d61cae2960bb4b619d5fc6a724254fa789db20721b580e2ee6375cc5097aab196566d64d8376062a62007ebe9d9f5ba8aaf4b93a40c664379c75a5061b9e51f1
-
Filesize
106KB
MD5f75e908cf18e922856d95a1dffaa8296
SHA1566a62c8ee0340561426fc08f526ea93f7c851c5
SHA2565f09b07d6cfe9dffe49d8b6c2513bc2bfe18a11aa58c486416b6f811ddf078a2
SHA512d61cae2960bb4b619d5fc6a724254fa789db20721b580e2ee6375cc5097aab196566d64d8376062a62007ebe9d9f5ba8aaf4b93a40c664379c75a5061b9e51f1
-
Filesize
106KB
MD5f75e908cf18e922856d95a1dffaa8296
SHA1566a62c8ee0340561426fc08f526ea93f7c851c5
SHA2565f09b07d6cfe9dffe49d8b6c2513bc2bfe18a11aa58c486416b6f811ddf078a2
SHA512d61cae2960bb4b619d5fc6a724254fa789db20721b580e2ee6375cc5097aab196566d64d8376062a62007ebe9d9f5ba8aaf4b93a40c664379c75a5061b9e51f1
-
Filesize
241KB
MD5d4532de8244ebd4b67c1e0dfdf325e70
SHA196e88dd3718f1d5f0df9d80e3de3fd4b7e7ebede
SHA2567ee835682cacdc7e08f8169acb0e00b8a392637322bede01b8e8deff4ba66806
SHA51278409d31ea055130231961bb3b468c9843efa3bf21ba9ca8aae2c78be1a098e1bae9c61549f60780257a78a8e5b9d38b4ea616f8b6b4ef9fdf02c7eee64085b4
-
Filesize
241KB
MD5d4532de8244ebd4b67c1e0dfdf325e70
SHA196e88dd3718f1d5f0df9d80e3de3fd4b7e7ebede
SHA2567ee835682cacdc7e08f8169acb0e00b8a392637322bede01b8e8deff4ba66806
SHA51278409d31ea055130231961bb3b468c9843efa3bf21ba9ca8aae2c78be1a098e1bae9c61549f60780257a78a8e5b9d38b4ea616f8b6b4ef9fdf02c7eee64085b4
-
Filesize
108KB
MD5c9470ebfdc3c9ffecaab27aa6317c072
SHA1ddd35484095baa15a8bf1774776c0c5a0158a870
SHA256bbf737a68b16043d74df456b373f779f2619ac9dc44d2e8983192d52ca00b822
SHA512e2d80503b56697172889db08b38c497e0f9d39b20952b6d26f96c92c8468c4888f839e45835ffd0440f33b0c18a9ad3a37f5028f726669eadfc0c68c412ec6e5
-
Filesize
176KB
MD5f6cd33176b56f364710da423684946b7
SHA125e4d2e9956be48174a1d4b2f925e62d991d0467
SHA256ddb2ae6a7d334f9e98eacfce3dcfdccada0063db74a3442a17eb85bf0ef8e90d
SHA512dde01eb952253112d70253e41978c6b7736858eeb87ba3072031237825e6f42022250e9285ca7e71e550d0fdf5f4e12a8a39c94d3c942265736302d5f70b87d9
-
Filesize
159KB
MD529a2a6998272140686c3646f8c30b4e4
SHA1fe07fa5cbbfd41cc3c4249587efa7dc5c3820fde
SHA256cff32c7036c661a716e4b9d082813d714785dca9a058dbd6db3e704d6cec7d6f
SHA5124109100081a3cf54408b944c64d8e4dd2b82482ebb17cfce699aae387bdd86047788ac98b6988819019dea6d823b47dbcd62927f484bfddefae3a77b0059be82