Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
244s -
max time network
335s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 05:38
Static task
static1
Behavioral task
behavioral1
Sample
8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe
Resource
win10v2004-20221111-en
General
-
Target
8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe
-
Size
603KB
-
MD5
f28953625f1010302c29bd84106d8a04
-
SHA1
6e309986ae0aa6016ffd8d582e286a52ef3a4407
-
SHA256
8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3
-
SHA512
9cead0cebc0574040beded7c1751c59c4d07163a7b9fab4ca8be5583ebf1d6d4918977e2142de4c5d9a987d08b63d252f22e5295caa1e78f4948cf074f086460
-
SSDEEP
12288:UIny5DYTMIqrpTuivl6DlCxr18PmJgKBLRrUopV:SUTMVNuDDlEiPm7BL1J
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe -
Executes dropped EXE 3 IoCs
pid Process 1676 installd.exe 1900 nethtsrv.exe 1876 netupdsrv.exe -
Loads dropped DLL 9 IoCs
pid Process 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 1676 installd.exe 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 1900 nethtsrv.exe 1900 nethtsrv.exe 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\installd.exe 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe File created C:\Windows\SysWOW64\nethtsrv.exe 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe File created C:\Windows\SysWOW64\netupdsrv.exe 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe File created C:\Windows\SysWOW64\hfnapi.dll 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe File created C:\Windows\SysWOW64\hfpapi.dll 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\ver.xml 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe File created C:\Program Files (x86)\Common Files\Config\data.xml 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 852 wrote to memory of 1768 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 28 PID 852 wrote to memory of 1768 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 28 PID 852 wrote to memory of 1768 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 28 PID 852 wrote to memory of 1768 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 28 PID 1768 wrote to memory of 1584 1768 net.exe 30 PID 1768 wrote to memory of 1584 1768 net.exe 30 PID 1768 wrote to memory of 1584 1768 net.exe 30 PID 1768 wrote to memory of 1584 1768 net.exe 30 PID 852 wrote to memory of 576 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 31 PID 852 wrote to memory of 576 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 31 PID 852 wrote to memory of 576 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 31 PID 852 wrote to memory of 576 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 31 PID 576 wrote to memory of 1532 576 net.exe 33 PID 576 wrote to memory of 1532 576 net.exe 33 PID 576 wrote to memory of 1532 576 net.exe 33 PID 576 wrote to memory of 1532 576 net.exe 33 PID 852 wrote to memory of 1676 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 34 PID 852 wrote to memory of 1676 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 34 PID 852 wrote to memory of 1676 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 34 PID 852 wrote to memory of 1676 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 34 PID 852 wrote to memory of 1676 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 34 PID 852 wrote to memory of 1676 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 34 PID 852 wrote to memory of 1676 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 34 PID 852 wrote to memory of 1900 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 36 PID 852 wrote to memory of 1900 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 36 PID 852 wrote to memory of 1900 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 36 PID 852 wrote to memory of 1900 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 36 PID 852 wrote to memory of 1876 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 39 PID 852 wrote to memory of 1876 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 39 PID 852 wrote to memory of 1876 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 39 PID 852 wrote to memory of 1876 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 39 PID 852 wrote to memory of 1876 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 39 PID 852 wrote to memory of 1876 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 39 PID 852 wrote to memory of 1876 852 8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe"C:\Users\Admin\AppData\Local\Temp\8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1584
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1532
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1676
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1900
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1876
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5a1017924b05c1cf49cce9d130235a8f3
SHA1ff5de0b9f29436decd9c74dfc4acfa958c3478f2
SHA256ffeeaaafbc328ae243f7397cf31bab89946e19b4c74dd6fc7962bff7304fc354
SHA512fe8c0b3100a321d1b982245f88dda336fad8c4ac37d122c2880fb8682051fb17bfdec2f8e613a547c7491192a2820c9ce8cbafe6d4ba5089074a8832ee92163e
-
Filesize
244KB
MD5c6323cf4c1e1f1fb3597ef294100c3c1
SHA1de4f819abe6efba835621d7b6d9c1ecd6641a105
SHA256496dab554c268a3f37e51cb51ec003ccf81c1b74cf9f8237762efc4a1bfb11ff
SHA51223fea86db806ea0d2f437295fd5929a63931b54d01b56de969749315850f29fe26b64630f56628d68b0323ab4d9fdf1a72eeccb4c0d7a5d71c38987ce56da9a4
-
Filesize
108KB
MD5d949064feb8875355864b60b488c3dc0
SHA11c9c339e3a1cbb15ca5f0d50c9cd4d8306a648fe
SHA256322e486ebda73c758710c766e2dce204af42eed98b2f3299edf4c12bc63fc842
SHA51251c5332d24c7b348a12ab4590ad7768baa1804c0852c8d0d84aebb903d6d0d5836a0e28c202a43771267aa1b82c5bfe007968d2d7d3be6869a3eb18b5d2f9ac9
-
Filesize
176KB
MD5c31a26f9271298bdeedcef92070d3f33
SHA1364a3d4e1956bcdfa4257f7ce015c123fa09779a
SHA25620488d4589b20b9897d354d0573b279021c004f6f4688c6372e492ded8ae6cbd
SHA512acce5e9c39c67a35a172d7ec901c78f2cf9eb9de4e8a5fa0c97767093b1ca47c624819f7a517574fbc0207329f18d75160a31aeffdccaa42183b995688c3d095
-
Filesize
158KB
MD590ad4d1e1f81a8f4cea82e58f0386b0e
SHA1e089c111bb2c88e681b4dd9f283199f2cbd8658c
SHA256b1f14c9ee5f650c3530b9129ff7bc5d29fb7b1b0b25bf14e3003993538deff39
SHA512760c87637b7e481ba512ae4286372633de7ee795282554f6a954f81ebcd2d38d0a03bbd8d33b9234a6372d7b4102f109cc4a8a9b0f550dbd074fcb410a46d2cb
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5a1017924b05c1cf49cce9d130235a8f3
SHA1ff5de0b9f29436decd9c74dfc4acfa958c3478f2
SHA256ffeeaaafbc328ae243f7397cf31bab89946e19b4c74dd6fc7962bff7304fc354
SHA512fe8c0b3100a321d1b982245f88dda336fad8c4ac37d122c2880fb8682051fb17bfdec2f8e613a547c7491192a2820c9ce8cbafe6d4ba5089074a8832ee92163e
-
Filesize
106KB
MD5a1017924b05c1cf49cce9d130235a8f3
SHA1ff5de0b9f29436decd9c74dfc4acfa958c3478f2
SHA256ffeeaaafbc328ae243f7397cf31bab89946e19b4c74dd6fc7962bff7304fc354
SHA512fe8c0b3100a321d1b982245f88dda336fad8c4ac37d122c2880fb8682051fb17bfdec2f8e613a547c7491192a2820c9ce8cbafe6d4ba5089074a8832ee92163e
-
Filesize
244KB
MD5c6323cf4c1e1f1fb3597ef294100c3c1
SHA1de4f819abe6efba835621d7b6d9c1ecd6641a105
SHA256496dab554c268a3f37e51cb51ec003ccf81c1b74cf9f8237762efc4a1bfb11ff
SHA51223fea86db806ea0d2f437295fd5929a63931b54d01b56de969749315850f29fe26b64630f56628d68b0323ab4d9fdf1a72eeccb4c0d7a5d71c38987ce56da9a4
-
Filesize
108KB
MD5d949064feb8875355864b60b488c3dc0
SHA11c9c339e3a1cbb15ca5f0d50c9cd4d8306a648fe
SHA256322e486ebda73c758710c766e2dce204af42eed98b2f3299edf4c12bc63fc842
SHA51251c5332d24c7b348a12ab4590ad7768baa1804c0852c8d0d84aebb903d6d0d5836a0e28c202a43771267aa1b82c5bfe007968d2d7d3be6869a3eb18b5d2f9ac9
-
Filesize
176KB
MD5c31a26f9271298bdeedcef92070d3f33
SHA1364a3d4e1956bcdfa4257f7ce015c123fa09779a
SHA25620488d4589b20b9897d354d0573b279021c004f6f4688c6372e492ded8ae6cbd
SHA512acce5e9c39c67a35a172d7ec901c78f2cf9eb9de4e8a5fa0c97767093b1ca47c624819f7a517574fbc0207329f18d75160a31aeffdccaa42183b995688c3d095
-
Filesize
158KB
MD590ad4d1e1f81a8f4cea82e58f0386b0e
SHA1e089c111bb2c88e681b4dd9f283199f2cbd8658c
SHA256b1f14c9ee5f650c3530b9129ff7bc5d29fb7b1b0b25bf14e3003993538deff39
SHA512760c87637b7e481ba512ae4286372633de7ee795282554f6a954f81ebcd2d38d0a03bbd8d33b9234a6372d7b4102f109cc4a8a9b0f550dbd074fcb410a46d2cb