Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    244s
  • max time network
    335s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 05:38

General

  • Target

    8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe

  • Size

    603KB

  • MD5

    f28953625f1010302c29bd84106d8a04

  • SHA1

    6e309986ae0aa6016ffd8d582e286a52ef3a4407

  • SHA256

    8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3

  • SHA512

    9cead0cebc0574040beded7c1751c59c4d07163a7b9fab4ca8be5583ebf1d6d4918977e2142de4c5d9a987d08b63d252f22e5295caa1e78f4948cf074f086460

  • SSDEEP

    12288:UIny5DYTMIqrpTuivl6DlCxr18PmJgKBLRrUopV:SUTMVNuDDlEiPm7BL1J

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe
    "C:\Users\Admin\AppData\Local\Temp\8a2cb3ef6ff0a2b748dd6eb44a79a819fa74105e583952564b1e92c43a9a47e3.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:1584
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:576
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:1532
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1676
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1900
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:1876

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\hfnapi.dll

        Filesize

        106KB

        MD5

        a1017924b05c1cf49cce9d130235a8f3

        SHA1

        ff5de0b9f29436decd9c74dfc4acfa958c3478f2

        SHA256

        ffeeaaafbc328ae243f7397cf31bab89946e19b4c74dd6fc7962bff7304fc354

        SHA512

        fe8c0b3100a321d1b982245f88dda336fad8c4ac37d122c2880fb8682051fb17bfdec2f8e613a547c7491192a2820c9ce8cbafe6d4ba5089074a8832ee92163e

      • C:\Windows\SysWOW64\hfpapi.dll

        Filesize

        244KB

        MD5

        c6323cf4c1e1f1fb3597ef294100c3c1

        SHA1

        de4f819abe6efba835621d7b6d9c1ecd6641a105

        SHA256

        496dab554c268a3f37e51cb51ec003ccf81c1b74cf9f8237762efc4a1bfb11ff

        SHA512

        23fea86db806ea0d2f437295fd5929a63931b54d01b56de969749315850f29fe26b64630f56628d68b0323ab4d9fdf1a72eeccb4c0d7a5d71c38987ce56da9a4

      • C:\Windows\SysWOW64\installd.exe

        Filesize

        108KB

        MD5

        d949064feb8875355864b60b488c3dc0

        SHA1

        1c9c339e3a1cbb15ca5f0d50c9cd4d8306a648fe

        SHA256

        322e486ebda73c758710c766e2dce204af42eed98b2f3299edf4c12bc63fc842

        SHA512

        51c5332d24c7b348a12ab4590ad7768baa1804c0852c8d0d84aebb903d6d0d5836a0e28c202a43771267aa1b82c5bfe007968d2d7d3be6869a3eb18b5d2f9ac9

      • C:\Windows\SysWOW64\nethtsrv.exe

        Filesize

        176KB

        MD5

        c31a26f9271298bdeedcef92070d3f33

        SHA1

        364a3d4e1956bcdfa4257f7ce015c123fa09779a

        SHA256

        20488d4589b20b9897d354d0573b279021c004f6f4688c6372e492ded8ae6cbd

        SHA512

        acce5e9c39c67a35a172d7ec901c78f2cf9eb9de4e8a5fa0c97767093b1ca47c624819f7a517574fbc0207329f18d75160a31aeffdccaa42183b995688c3d095

      • C:\Windows\SysWOW64\netupdsrv.exe

        Filesize

        158KB

        MD5

        90ad4d1e1f81a8f4cea82e58f0386b0e

        SHA1

        e089c111bb2c88e681b4dd9f283199f2cbd8658c

        SHA256

        b1f14c9ee5f650c3530b9129ff7bc5d29fb7b1b0b25bf14e3003993538deff39

        SHA512

        760c87637b7e481ba512ae4286372633de7ee795282554f6a954f81ebcd2d38d0a03bbd8d33b9234a6372d7b4102f109cc4a8a9b0f550dbd074fcb410a46d2cb

      • \Users\Admin\AppData\Local\Temp\nsk6442.tmp\System.dll

        Filesize

        11KB

        MD5

        c17103ae9072a06da581dec998343fc1

        SHA1

        b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

        SHA256

        dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

        SHA512

        d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

      • \Users\Admin\AppData\Local\Temp\nsk6442.tmp\nsExec.dll

        Filesize

        6KB

        MD5

        acc2b699edfea5bf5aae45aba3a41e96

        SHA1

        d2accf4d494e43ceb2cff69abe4dd17147d29cc2

        SHA256

        168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

        SHA512

        e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

      • \Users\Admin\AppData\Local\Temp\nsk6442.tmp\nsExec.dll

        Filesize

        6KB

        MD5

        acc2b699edfea5bf5aae45aba3a41e96

        SHA1

        d2accf4d494e43ceb2cff69abe4dd17147d29cc2

        SHA256

        168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

        SHA512

        e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

      • \Windows\SysWOW64\hfnapi.dll

        Filesize

        106KB

        MD5

        a1017924b05c1cf49cce9d130235a8f3

        SHA1

        ff5de0b9f29436decd9c74dfc4acfa958c3478f2

        SHA256

        ffeeaaafbc328ae243f7397cf31bab89946e19b4c74dd6fc7962bff7304fc354

        SHA512

        fe8c0b3100a321d1b982245f88dda336fad8c4ac37d122c2880fb8682051fb17bfdec2f8e613a547c7491192a2820c9ce8cbafe6d4ba5089074a8832ee92163e

      • \Windows\SysWOW64\hfnapi.dll

        Filesize

        106KB

        MD5

        a1017924b05c1cf49cce9d130235a8f3

        SHA1

        ff5de0b9f29436decd9c74dfc4acfa958c3478f2

        SHA256

        ffeeaaafbc328ae243f7397cf31bab89946e19b4c74dd6fc7962bff7304fc354

        SHA512

        fe8c0b3100a321d1b982245f88dda336fad8c4ac37d122c2880fb8682051fb17bfdec2f8e613a547c7491192a2820c9ce8cbafe6d4ba5089074a8832ee92163e

      • \Windows\SysWOW64\hfpapi.dll

        Filesize

        244KB

        MD5

        c6323cf4c1e1f1fb3597ef294100c3c1

        SHA1

        de4f819abe6efba835621d7b6d9c1ecd6641a105

        SHA256

        496dab554c268a3f37e51cb51ec003ccf81c1b74cf9f8237762efc4a1bfb11ff

        SHA512

        23fea86db806ea0d2f437295fd5929a63931b54d01b56de969749315850f29fe26b64630f56628d68b0323ab4d9fdf1a72eeccb4c0d7a5d71c38987ce56da9a4

      • \Windows\SysWOW64\installd.exe

        Filesize

        108KB

        MD5

        d949064feb8875355864b60b488c3dc0

        SHA1

        1c9c339e3a1cbb15ca5f0d50c9cd4d8306a648fe

        SHA256

        322e486ebda73c758710c766e2dce204af42eed98b2f3299edf4c12bc63fc842

        SHA512

        51c5332d24c7b348a12ab4590ad7768baa1804c0852c8d0d84aebb903d6d0d5836a0e28c202a43771267aa1b82c5bfe007968d2d7d3be6869a3eb18b5d2f9ac9

      • \Windows\SysWOW64\nethtsrv.exe

        Filesize

        176KB

        MD5

        c31a26f9271298bdeedcef92070d3f33

        SHA1

        364a3d4e1956bcdfa4257f7ce015c123fa09779a

        SHA256

        20488d4589b20b9897d354d0573b279021c004f6f4688c6372e492ded8ae6cbd

        SHA512

        acce5e9c39c67a35a172d7ec901c78f2cf9eb9de4e8a5fa0c97767093b1ca47c624819f7a517574fbc0207329f18d75160a31aeffdccaa42183b995688c3d095

      • \Windows\SysWOW64\netupdsrv.exe

        Filesize

        158KB

        MD5

        90ad4d1e1f81a8f4cea82e58f0386b0e

        SHA1

        e089c111bb2c88e681b4dd9f283199f2cbd8658c

        SHA256

        b1f14c9ee5f650c3530b9129ff7bc5d29fb7b1b0b25bf14e3003993538deff39

        SHA512

        760c87637b7e481ba512ae4286372633de7ee795282554f6a954f81ebcd2d38d0a03bbd8d33b9234a6372d7b4102f109cc4a8a9b0f550dbd074fcb410a46d2cb

      • memory/852-69-0x0000000000360000-0x00000000007BE000-memory.dmp

        Filesize

        4.4MB

      • memory/852-56-0x0000000000360000-0x00000000007BE000-memory.dmp

        Filesize

        4.4MB

      • memory/852-54-0x0000000075E01000-0x0000000075E03000-memory.dmp

        Filesize

        8KB