Analysis
-
max time kernel
220s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:31
Static task
static1
Behavioral task
behavioral1
Sample
1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe
Resource
win10v2004-20221111-en
General
-
Target
1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe
-
Size
601KB
-
MD5
461bb904393f3443a5fcb2c43a85409a
-
SHA1
55cae7f126dc743252e7ca1d9cebba9d0e387a41
-
SHA256
1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846
-
SHA512
5ba1758449d3dd997f9ff7a6bd1aaebd42aed77c0406b71f97c71722c915bcd1a12a1f305fa5184379355670d54eec6781c8423ac08bf3683c9294285578ccb4
-
SSDEEP
12288:vIny5DYTtEt8UINTpTZUpU+McCrPhnXex65UfCSuB0KZGCW:3UTtE+UgTzMU+q05fzuB0RC
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exedescription ioc process File created C:\Windows\system32\drivers\nethfdrv.sys 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe -
Executes dropped EXE 3 IoCs
Processes:
installd.exenethtsrv.exenetupdsrv.exepid process 900 installd.exe 1224 nethtsrv.exe 932 netupdsrv.exe -
Loads dropped DLL 9 IoCs
Processes:
1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exeinstalld.exenethtsrv.exepid process 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe 900 installd.exe 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe 1224 nethtsrv.exe 1224 nethtsrv.exe 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
Processes:
1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exedescription ioc process File created C:\Windows\SysWOW64\hfnapi.dll 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe File created C:\Windows\SysWOW64\hfpapi.dll 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe File created C:\Windows\SysWOW64\installd.exe 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe File created C:\Windows\SysWOW64\nethtsrv.exe 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe File created C:\Windows\SysWOW64\netupdsrv.exe 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe -
Drops file in Program Files directory 3 IoCs
Processes:
1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exedescription ioc process File created C:\Program Files (x86)\Common Files\Config\data.xml 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 464 -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exenet.exenet.exedescription pid process target process PID 472 wrote to memory of 436 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe net.exe PID 472 wrote to memory of 436 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe net.exe PID 472 wrote to memory of 436 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe net.exe PID 472 wrote to memory of 436 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe net.exe PID 436 wrote to memory of 1844 436 net.exe net1.exe PID 436 wrote to memory of 1844 436 net.exe net1.exe PID 436 wrote to memory of 1844 436 net.exe net1.exe PID 436 wrote to memory of 1844 436 net.exe net1.exe PID 472 wrote to memory of 832 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe net.exe PID 472 wrote to memory of 832 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe net.exe PID 472 wrote to memory of 832 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe net.exe PID 472 wrote to memory of 832 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe net.exe PID 832 wrote to memory of 1788 832 net.exe net1.exe PID 832 wrote to memory of 1788 832 net.exe net1.exe PID 832 wrote to memory of 1788 832 net.exe net1.exe PID 832 wrote to memory of 1788 832 net.exe net1.exe PID 472 wrote to memory of 900 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe installd.exe PID 472 wrote to memory of 900 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe installd.exe PID 472 wrote to memory of 900 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe installd.exe PID 472 wrote to memory of 900 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe installd.exe PID 472 wrote to memory of 900 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe installd.exe PID 472 wrote to memory of 900 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe installd.exe PID 472 wrote to memory of 900 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe installd.exe PID 472 wrote to memory of 1224 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe nethtsrv.exe PID 472 wrote to memory of 1224 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe nethtsrv.exe PID 472 wrote to memory of 1224 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe nethtsrv.exe PID 472 wrote to memory of 1224 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe nethtsrv.exe PID 472 wrote to memory of 932 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe netupdsrv.exe PID 472 wrote to memory of 932 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe netupdsrv.exe PID 472 wrote to memory of 932 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe netupdsrv.exe PID 472 wrote to memory of 932 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe netupdsrv.exe PID 472 wrote to memory of 932 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe netupdsrv.exe PID 472 wrote to memory of 932 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe netupdsrv.exe PID 472 wrote to memory of 932 472 1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe netupdsrv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe"C:\Users\Admin\AppData\Local\Temp\1f93b6ac48af0680767be4635faf335d46556d3a3cb3e7b2cdf452bd49793846.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1844
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1788
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:900 -
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1224 -
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:932
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD50cad97764e0d3d7780f76375543daf04
SHA1532b3c7b7109ee445fac4fac8753e5628abe9506
SHA256c4244c36a0e6310c3061a8fd0588f353ba5110a854d0d4bf831b81f20ff42ec9
SHA5128ef771ed8b70d2b7d1c276261a6e1489d2d04e41ba3d3903c049626af9fe365dd1adca77485b34a469f288cd9ea8b841ea3cd0d74a9fca57db7f5eab8afcad75
-
Filesize
241KB
MD5dcbcd9d472f34f1816897d7a0b24f38f
SHA14116fba5356df3b35b25a683267de3d067ac5ee9
SHA25692b159fd2312d55d5f4cf1d414fbce179a9a971b38ca292012fdb4ee7e94d882
SHA51236136f961359b6e362f75f45c35e2add00f6b767cc9db293772b83492eee307969917873df75dc3e976e39a472906697fb0e1a5f1494e0550bd546d833827e23
-
Filesize
108KB
MD5fd5b9934773bfe005539d09f9e7ec997
SHA169a9fe766ac232f46b505309ad32dfa6a7d07dba
SHA256be4e661412dc075247cc41c8756009b85028ed1cf5124624078bf38675f56486
SHA51253d1271a819e43ff57322d0d1acfd463b3878f66ddf0fa8726f08589d91755ee53bfabc8de0595a2936bcf4e884e47902cfb9c9c1218ca3166cd0dccc3307e89
-
Filesize
176KB
MD547959d43ae6c14fc0fb49b1931c03cf2
SHA193e0942efc61d79f5c30febc0ddf419e86bc4291
SHA25639cd573fa6a9e1705705bcccafffb521d1b0ae83341fb2680fbee95882b8ab93
SHA512c42565659b2056aaab19a8076da82e4f960f1bf8eb90f7efef53192678ffa47ff3be956cfea13369c95ee8d2a529569f86835722232ac350c17fd3119e29c9c5
-
Filesize
158KB
MD56d92662470fa2d2eb844422f2fc09bd0
SHA1daf0c84199be15c3d82dcf50ad52b1fa1cf35561
SHA256967f065642443edd3b4cb9b4334d309895167372d9159d9df72b9427dabea8f5
SHA512192f124e795c48a2d82819e5f368c9dad6ab708b70cb83266b403b0f449bc9356ece75f91e1a98b02add6a1a93e42997878303e857ce4cf6856e52142842c1c4
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD50cad97764e0d3d7780f76375543daf04
SHA1532b3c7b7109ee445fac4fac8753e5628abe9506
SHA256c4244c36a0e6310c3061a8fd0588f353ba5110a854d0d4bf831b81f20ff42ec9
SHA5128ef771ed8b70d2b7d1c276261a6e1489d2d04e41ba3d3903c049626af9fe365dd1adca77485b34a469f288cd9ea8b841ea3cd0d74a9fca57db7f5eab8afcad75
-
Filesize
106KB
MD50cad97764e0d3d7780f76375543daf04
SHA1532b3c7b7109ee445fac4fac8753e5628abe9506
SHA256c4244c36a0e6310c3061a8fd0588f353ba5110a854d0d4bf831b81f20ff42ec9
SHA5128ef771ed8b70d2b7d1c276261a6e1489d2d04e41ba3d3903c049626af9fe365dd1adca77485b34a469f288cd9ea8b841ea3cd0d74a9fca57db7f5eab8afcad75
-
Filesize
241KB
MD5dcbcd9d472f34f1816897d7a0b24f38f
SHA14116fba5356df3b35b25a683267de3d067ac5ee9
SHA25692b159fd2312d55d5f4cf1d414fbce179a9a971b38ca292012fdb4ee7e94d882
SHA51236136f961359b6e362f75f45c35e2add00f6b767cc9db293772b83492eee307969917873df75dc3e976e39a472906697fb0e1a5f1494e0550bd546d833827e23
-
Filesize
108KB
MD5fd5b9934773bfe005539d09f9e7ec997
SHA169a9fe766ac232f46b505309ad32dfa6a7d07dba
SHA256be4e661412dc075247cc41c8756009b85028ed1cf5124624078bf38675f56486
SHA51253d1271a819e43ff57322d0d1acfd463b3878f66ddf0fa8726f08589d91755ee53bfabc8de0595a2936bcf4e884e47902cfb9c9c1218ca3166cd0dccc3307e89
-
Filesize
176KB
MD547959d43ae6c14fc0fb49b1931c03cf2
SHA193e0942efc61d79f5c30febc0ddf419e86bc4291
SHA25639cd573fa6a9e1705705bcccafffb521d1b0ae83341fb2680fbee95882b8ab93
SHA512c42565659b2056aaab19a8076da82e4f960f1bf8eb90f7efef53192678ffa47ff3be956cfea13369c95ee8d2a529569f86835722232ac350c17fd3119e29c9c5
-
Filesize
158KB
MD56d92662470fa2d2eb844422f2fc09bd0
SHA1daf0c84199be15c3d82dcf50ad52b1fa1cf35561
SHA256967f065642443edd3b4cb9b4334d309895167372d9159d9df72b9427dabea8f5
SHA512192f124e795c48a2d82819e5f368c9dad6ab708b70cb83266b403b0f449bc9356ece75f91e1a98b02add6a1a93e42997878303e857ce4cf6856e52142842c1c4