Analysis
-
max time kernel
34s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 05:35
Static task
static1
Behavioral task
behavioral1
Sample
d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe
Resource
win10v2004-20220812-en
General
-
Target
d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe
-
Size
602KB
-
MD5
3a78bf413a1d9f7eb84eb66bc279d42b
-
SHA1
212ac1ac91809fe3bbbccfb4947357dd0e17c36e
-
SHA256
d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df
-
SHA512
526a76004145a7bf38b9c3540e3db03f9c58125e68370d40f617a09f8cd08e8c40a9fecc37483e0d5334d98dabe1b7609e65c764d67bf836ffe5652154f09411
-
SSDEEP
12288:ZIny5DYT5dczamQ0MhqjrBaCSYqOnID2qj+YZRS7LFM:VUTrcG6mqjrBb9qOk2q1Paa
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe -
Executes dropped EXE 5 IoCs
pid Process 1988 installd.exe 556 nethtsrv.exe 1348 netupdsrv.exe 1732 nethtsrv.exe 628 netupdsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 1988 installd.exe 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 556 nethtsrv.exe 556 nethtsrv.exe 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 1732 nethtsrv.exe 1732 nethtsrv.exe 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfnapi.dll d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe File created C:\Windows\SysWOW64\hfpapi.dll d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe File created C:\Windows\SysWOW64\installd.exe d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe File created C:\Windows\SysWOW64\nethtsrv.exe d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe File created C:\Windows\SysWOW64\netupdsrv.exe d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1732 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 984 wrote to memory of 2040 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 27 PID 984 wrote to memory of 2040 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 27 PID 984 wrote to memory of 2040 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 27 PID 984 wrote to memory of 2040 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 27 PID 2040 wrote to memory of 1724 2040 net.exe 29 PID 2040 wrote to memory of 1724 2040 net.exe 29 PID 2040 wrote to memory of 1724 2040 net.exe 29 PID 2040 wrote to memory of 1724 2040 net.exe 29 PID 984 wrote to memory of 2008 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 30 PID 984 wrote to memory of 2008 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 30 PID 984 wrote to memory of 2008 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 30 PID 984 wrote to memory of 2008 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 30 PID 2008 wrote to memory of 1488 2008 net.exe 32 PID 2008 wrote to memory of 1488 2008 net.exe 32 PID 2008 wrote to memory of 1488 2008 net.exe 32 PID 2008 wrote to memory of 1488 2008 net.exe 32 PID 984 wrote to memory of 1988 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 33 PID 984 wrote to memory of 1988 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 33 PID 984 wrote to memory of 1988 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 33 PID 984 wrote to memory of 1988 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 33 PID 984 wrote to memory of 1988 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 33 PID 984 wrote to memory of 1988 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 33 PID 984 wrote to memory of 1988 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 33 PID 984 wrote to memory of 556 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 35 PID 984 wrote to memory of 556 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 35 PID 984 wrote to memory of 556 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 35 PID 984 wrote to memory of 556 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 35 PID 984 wrote to memory of 1348 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 37 PID 984 wrote to memory of 1348 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 37 PID 984 wrote to memory of 1348 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 37 PID 984 wrote to memory of 1348 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 37 PID 984 wrote to memory of 1348 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 37 PID 984 wrote to memory of 1348 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 37 PID 984 wrote to memory of 1348 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 37 PID 984 wrote to memory of 1948 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 39 PID 984 wrote to memory of 1948 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 39 PID 984 wrote to memory of 1948 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 39 PID 984 wrote to memory of 1948 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 39 PID 1948 wrote to memory of 1912 1948 net.exe 41 PID 1948 wrote to memory of 1912 1948 net.exe 41 PID 1948 wrote to memory of 1912 1948 net.exe 41 PID 1948 wrote to memory of 1912 1948 net.exe 41 PID 984 wrote to memory of 2000 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 43 PID 984 wrote to memory of 2000 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 43 PID 984 wrote to memory of 2000 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 43 PID 984 wrote to memory of 2000 984 d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe 43 PID 2000 wrote to memory of 1332 2000 net.exe 45 PID 2000 wrote to memory of 1332 2000 net.exe 45 PID 2000 wrote to memory of 1332 2000 net.exe 45 PID 2000 wrote to memory of 1332 2000 net.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe"C:\Users\Admin\AppData\Local\Temp\d445382dfb73d46774ae077f9937bd43cb5cee081d6fe646ddd18b580834a4df.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1724
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1488
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1988
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:556
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1348
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1912
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1332
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:628
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5b2c8ac54ffd2fcbfc1bdff5fafe971db
SHA1ef6120a297c1c86b5a9299b6bf8704187e6d7267
SHA256490c63f451489504040a16c176717013e4289a8d22e089e9f9af690f6d6db6d5
SHA512c3f1df0b6f04b289e43e16f5ac526824391260ce0aa9baabe9cfb9ea463dfaad408a2918e277584624f2a7971e97d88c1758523de0d36588fd1f36b6d3682d06
-
Filesize
244KB
MD5307c0bbbaa029c1c66afd4e97ccf93b4
SHA1cbbcb0f4b4f8277ee6d47e8b35389149ac1d0865
SHA2569bb44432fdb564bf231f32132d624257505c87b2cf679bccdb96b2a0a86a7d84
SHA512c630b8b5fdee1fcf5d6d773670a7b20a137c9d1a9ab34a24e856dbdb2200b0138c6eab43e6712389be11d5317ba821265987800fd4aef41647f3fa16d01547aa
-
Filesize
108KB
MD562f98031a58b61213568e29e8ee23aed
SHA1f2bc7a7270d9a7fde0fdc8786a4775a2bb7dc7e5
SHA25635f23311c0d5d27d2e94722cc03e184d3be9d714c3defd3dce70447bd8c62050
SHA512b9b421becd1e81b56bbfa7c96624dc5d4dbd28c1c8d7cca05ba9d069eba7aa816d8f59d2eb2a3b2789802c2ba638d127b6a5aedd673d889d3f95f9d99a837dae
-
Filesize
176KB
MD5b1d3b3120bde818371659d8c48000e4a
SHA195230ff170083f946c1ffbd63d41070221e2abb5
SHA2568a4fba8f70c1153da082d38828f5f6de820f21a44f9b6068dc9957ac40480a4e
SHA5129ead5a36b8c7353a9291b4ebae65906b201c13eb51e063b22e816ce262d5bf18be0ddeb0ead55f8234e9e099f3bd2ffa2b01697b8e1d132c4303625d327ca37d
-
Filesize
176KB
MD5b1d3b3120bde818371659d8c48000e4a
SHA195230ff170083f946c1ffbd63d41070221e2abb5
SHA2568a4fba8f70c1153da082d38828f5f6de820f21a44f9b6068dc9957ac40480a4e
SHA5129ead5a36b8c7353a9291b4ebae65906b201c13eb51e063b22e816ce262d5bf18be0ddeb0ead55f8234e9e099f3bd2ffa2b01697b8e1d132c4303625d327ca37d
-
Filesize
159KB
MD5eb302eedf104eedc91f33173b6f0b5c1
SHA11ced1df11ca5b5981b88d9009537106190ee46b6
SHA25673b3bdd797235ce93e78ac2d83c5661f7092ed62376014f39b7fbdc2874ecfb1
SHA512b151a4aee88d0e9647b94e1a8097c58a94f91727fbd5066a8ddd3230ac59d83c90a674e64b86d8892d239e0a639b1e219689363b34022d809ae4a0a755f56c1b
-
Filesize
159KB
MD5eb302eedf104eedc91f33173b6f0b5c1
SHA11ced1df11ca5b5981b88d9009537106190ee46b6
SHA25673b3bdd797235ce93e78ac2d83c5661f7092ed62376014f39b7fbdc2874ecfb1
SHA512b151a4aee88d0e9647b94e1a8097c58a94f91727fbd5066a8ddd3230ac59d83c90a674e64b86d8892d239e0a639b1e219689363b34022d809ae4a0a755f56c1b
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5b2c8ac54ffd2fcbfc1bdff5fafe971db
SHA1ef6120a297c1c86b5a9299b6bf8704187e6d7267
SHA256490c63f451489504040a16c176717013e4289a8d22e089e9f9af690f6d6db6d5
SHA512c3f1df0b6f04b289e43e16f5ac526824391260ce0aa9baabe9cfb9ea463dfaad408a2918e277584624f2a7971e97d88c1758523de0d36588fd1f36b6d3682d06
-
Filesize
106KB
MD5b2c8ac54ffd2fcbfc1bdff5fafe971db
SHA1ef6120a297c1c86b5a9299b6bf8704187e6d7267
SHA256490c63f451489504040a16c176717013e4289a8d22e089e9f9af690f6d6db6d5
SHA512c3f1df0b6f04b289e43e16f5ac526824391260ce0aa9baabe9cfb9ea463dfaad408a2918e277584624f2a7971e97d88c1758523de0d36588fd1f36b6d3682d06
-
Filesize
106KB
MD5b2c8ac54ffd2fcbfc1bdff5fafe971db
SHA1ef6120a297c1c86b5a9299b6bf8704187e6d7267
SHA256490c63f451489504040a16c176717013e4289a8d22e089e9f9af690f6d6db6d5
SHA512c3f1df0b6f04b289e43e16f5ac526824391260ce0aa9baabe9cfb9ea463dfaad408a2918e277584624f2a7971e97d88c1758523de0d36588fd1f36b6d3682d06
-
Filesize
244KB
MD5307c0bbbaa029c1c66afd4e97ccf93b4
SHA1cbbcb0f4b4f8277ee6d47e8b35389149ac1d0865
SHA2569bb44432fdb564bf231f32132d624257505c87b2cf679bccdb96b2a0a86a7d84
SHA512c630b8b5fdee1fcf5d6d773670a7b20a137c9d1a9ab34a24e856dbdb2200b0138c6eab43e6712389be11d5317ba821265987800fd4aef41647f3fa16d01547aa
-
Filesize
244KB
MD5307c0bbbaa029c1c66afd4e97ccf93b4
SHA1cbbcb0f4b4f8277ee6d47e8b35389149ac1d0865
SHA2569bb44432fdb564bf231f32132d624257505c87b2cf679bccdb96b2a0a86a7d84
SHA512c630b8b5fdee1fcf5d6d773670a7b20a137c9d1a9ab34a24e856dbdb2200b0138c6eab43e6712389be11d5317ba821265987800fd4aef41647f3fa16d01547aa
-
Filesize
108KB
MD562f98031a58b61213568e29e8ee23aed
SHA1f2bc7a7270d9a7fde0fdc8786a4775a2bb7dc7e5
SHA25635f23311c0d5d27d2e94722cc03e184d3be9d714c3defd3dce70447bd8c62050
SHA512b9b421becd1e81b56bbfa7c96624dc5d4dbd28c1c8d7cca05ba9d069eba7aa816d8f59d2eb2a3b2789802c2ba638d127b6a5aedd673d889d3f95f9d99a837dae
-
Filesize
176KB
MD5b1d3b3120bde818371659d8c48000e4a
SHA195230ff170083f946c1ffbd63d41070221e2abb5
SHA2568a4fba8f70c1153da082d38828f5f6de820f21a44f9b6068dc9957ac40480a4e
SHA5129ead5a36b8c7353a9291b4ebae65906b201c13eb51e063b22e816ce262d5bf18be0ddeb0ead55f8234e9e099f3bd2ffa2b01697b8e1d132c4303625d327ca37d
-
Filesize
159KB
MD5eb302eedf104eedc91f33173b6f0b5c1
SHA11ced1df11ca5b5981b88d9009537106190ee46b6
SHA25673b3bdd797235ce93e78ac2d83c5661f7092ed62376014f39b7fbdc2874ecfb1
SHA512b151a4aee88d0e9647b94e1a8097c58a94f91727fbd5066a8ddd3230ac59d83c90a674e64b86d8892d239e0a639b1e219689363b34022d809ae4a0a755f56c1b