Analysis
-
max time kernel
39s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 06:01
Static task
static1
Behavioral task
behavioral1
Sample
d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe
Resource
win10v2004-20221111-en
General
-
Target
d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe
-
Size
695KB
-
MD5
3ef432bbf8cf07c9211e2d782ea5a6b1
-
SHA1
e320f0a946261797d8da0a4bc540f619148d0271
-
SHA256
d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e
-
SHA512
708ebf43fd95c2cf5fa27b6726e37a4e5445990903e3e6af283f207911eb1e15fdf581eb5bd44cd02b8b176327857f2d2e1d9bfe6a87a1a2e049e05de8e672d0
-
SSDEEP
12288:8Abu3fQ+thk6Ezvbfo0TWNKuMu/sDj+nvnOfYrG0xVocIoMLJAFK4xhWt/:8AbuPPEzzf/puF/uynWmG0jzIb+pm
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe -
Executes dropped EXE 5 IoCs
pid Process 1704 installd.exe 1712 nethtsrv.exe 1652 netupdsrv.exe 1436 nethtsrv.exe 1408 netupdsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 1704 installd.exe 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 1712 nethtsrv.exe 1712 nethtsrv.exe 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 1436 nethtsrv.exe 1436 nethtsrv.exe 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfnapi.dll d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe File created C:\Windows\SysWOW64\hfpapi.dll d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe File created C:\Windows\SysWOW64\installd.exe d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe File created C:\Windows\SysWOW64\nethtsrv.exe d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe File created C:\Windows\SysWOW64\netupdsrv.exe d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1436 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1416 wrote to memory of 1500 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 26 PID 1416 wrote to memory of 1500 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 26 PID 1416 wrote to memory of 1500 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 26 PID 1416 wrote to memory of 1500 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 26 PID 1500 wrote to memory of 1960 1500 net.exe 28 PID 1500 wrote to memory of 1960 1500 net.exe 28 PID 1500 wrote to memory of 1960 1500 net.exe 28 PID 1500 wrote to memory of 1960 1500 net.exe 28 PID 1416 wrote to memory of 984 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 29 PID 1416 wrote to memory of 984 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 29 PID 1416 wrote to memory of 984 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 29 PID 1416 wrote to memory of 984 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 29 PID 984 wrote to memory of 1072 984 net.exe 31 PID 984 wrote to memory of 1072 984 net.exe 31 PID 984 wrote to memory of 1072 984 net.exe 31 PID 984 wrote to memory of 1072 984 net.exe 31 PID 1416 wrote to memory of 1704 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 32 PID 1416 wrote to memory of 1704 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 32 PID 1416 wrote to memory of 1704 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 32 PID 1416 wrote to memory of 1704 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 32 PID 1416 wrote to memory of 1704 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 32 PID 1416 wrote to memory of 1704 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 32 PID 1416 wrote to memory of 1704 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 32 PID 1416 wrote to memory of 1712 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 34 PID 1416 wrote to memory of 1712 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 34 PID 1416 wrote to memory of 1712 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 34 PID 1416 wrote to memory of 1712 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 34 PID 1416 wrote to memory of 1652 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 36 PID 1416 wrote to memory of 1652 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 36 PID 1416 wrote to memory of 1652 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 36 PID 1416 wrote to memory of 1652 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 36 PID 1416 wrote to memory of 1652 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 36 PID 1416 wrote to memory of 1652 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 36 PID 1416 wrote to memory of 1652 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 36 PID 1416 wrote to memory of 1840 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 38 PID 1416 wrote to memory of 1840 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 38 PID 1416 wrote to memory of 1840 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 38 PID 1416 wrote to memory of 1840 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 38 PID 1840 wrote to memory of 1724 1840 net.exe 40 PID 1840 wrote to memory of 1724 1840 net.exe 40 PID 1840 wrote to memory of 1724 1840 net.exe 40 PID 1840 wrote to memory of 1724 1840 net.exe 40 PID 1416 wrote to memory of 592 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 42 PID 1416 wrote to memory of 592 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 42 PID 1416 wrote to memory of 592 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 42 PID 1416 wrote to memory of 592 1416 d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe 42 PID 592 wrote to memory of 1480 592 net.exe 44 PID 592 wrote to memory of 1480 592 net.exe 44 PID 592 wrote to memory of 1480 592 net.exe 44 PID 592 wrote to memory of 1480 592 net.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe"C:\Users\Admin\AppData\Local\Temp\d42aeb9660f29723735b5104fcc71d90c2cde96b6bc2bab1777cda976747507e.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1960
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1072
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1704
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1712
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1652
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1724
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1480
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:1408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD57dd815f6ea982848a71866e967f031cc
SHA110038ac72bc6b26dc6fe819c0524e60eaab8e306
SHA256adc16d3cc6bd399cfe809957ad6d4b27b2421c805c009dfd0ac5de82772b31cd
SHA5124b5294e2b17b1812b2d1415a100fd99407d2c3ea31774dfbdd6943c553d5cb48a11cb6873a00c9f9eec34e472f2786ada7c08f23e3e8030eff24f81cbb04e008
-
Filesize
241KB
MD57163b4419c5c6f4ac8ea997b02772338
SHA1a2aebd63f37842bd47afb6ed5dd701fb6ee2f59c
SHA256dfc800c13c44ec9f076515a55c1382ac0f15e1410c0f53c79deac781f9a066b5
SHA512ab9e3627c12d1c6de9e19cff537c703a45c0b55ef28108c3f949e84c7139ceb7d78fb65fc0a07d07b77a49fe557d785c42aa66f38ec2cdaa00f5f9cfb78800e6
-
Filesize
108KB
MD5f6b33bd9c92672a535751aa95ef2fff2
SHA15b36fab4ac52705869d7cb7b4c8b990f84405168
SHA256326feac22ea4f8013422aa231f4b21216ca7fa38b499aa9543face4a3569c552
SHA512428e19a008ac5f82d40bdb1e7ecc6e840d1d7a2f0e89052c5e6b9e0d89d84694274101d1a95b95ee0953f99dae0a8cc3bcb02855c12893ad57a4a02677a6f1cf
-
Filesize
176KB
MD503cb1b626b043d78ba9b7adbfe91c0ad
SHA1a7da08b20776657c1b57b2c66e99ed05e9bf7fb7
SHA256bad06609b50688766cd0ce3b168b12b10c67cb3fadf42e1e0fdaa5c15ae08c3e
SHA5127a98da9abf80620d2de7d2ccfa1ff9cb5a79fd960df5421b4282a73d3d2049e887d6d451b08b4dab36fda8f3913663fa98418b204d5eaca041a7e19dc60b939b
-
Filesize
176KB
MD503cb1b626b043d78ba9b7adbfe91c0ad
SHA1a7da08b20776657c1b57b2c66e99ed05e9bf7fb7
SHA256bad06609b50688766cd0ce3b168b12b10c67cb3fadf42e1e0fdaa5c15ae08c3e
SHA5127a98da9abf80620d2de7d2ccfa1ff9cb5a79fd960df5421b4282a73d3d2049e887d6d451b08b4dab36fda8f3913663fa98418b204d5eaca041a7e19dc60b939b
-
Filesize
158KB
MD548289d05bf82288e34b67fb4d1cc14f0
SHA143ab3bbb39548177b015a7b3e60ac2d1d730dbd9
SHA2560c75b922c152b3fd14516c9cdacc03bde8d2357c07a427bb2831c180b117fc9c
SHA512d3ff730ded22d89c565bc39b55e39b506e46eca3c754f3ccdb1994f658982a56ffa792a7f9c15a6d5cee07404889db5ee6c73888e10b916f8def6916eeeec97a
-
Filesize
158KB
MD548289d05bf82288e34b67fb4d1cc14f0
SHA143ab3bbb39548177b015a7b3e60ac2d1d730dbd9
SHA2560c75b922c152b3fd14516c9cdacc03bde8d2357c07a427bb2831c180b117fc9c
SHA512d3ff730ded22d89c565bc39b55e39b506e46eca3c754f3ccdb1994f658982a56ffa792a7f9c15a6d5cee07404889db5ee6c73888e10b916f8def6916eeeec97a
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD57dd815f6ea982848a71866e967f031cc
SHA110038ac72bc6b26dc6fe819c0524e60eaab8e306
SHA256adc16d3cc6bd399cfe809957ad6d4b27b2421c805c009dfd0ac5de82772b31cd
SHA5124b5294e2b17b1812b2d1415a100fd99407d2c3ea31774dfbdd6943c553d5cb48a11cb6873a00c9f9eec34e472f2786ada7c08f23e3e8030eff24f81cbb04e008
-
Filesize
106KB
MD57dd815f6ea982848a71866e967f031cc
SHA110038ac72bc6b26dc6fe819c0524e60eaab8e306
SHA256adc16d3cc6bd399cfe809957ad6d4b27b2421c805c009dfd0ac5de82772b31cd
SHA5124b5294e2b17b1812b2d1415a100fd99407d2c3ea31774dfbdd6943c553d5cb48a11cb6873a00c9f9eec34e472f2786ada7c08f23e3e8030eff24f81cbb04e008
-
Filesize
106KB
MD57dd815f6ea982848a71866e967f031cc
SHA110038ac72bc6b26dc6fe819c0524e60eaab8e306
SHA256adc16d3cc6bd399cfe809957ad6d4b27b2421c805c009dfd0ac5de82772b31cd
SHA5124b5294e2b17b1812b2d1415a100fd99407d2c3ea31774dfbdd6943c553d5cb48a11cb6873a00c9f9eec34e472f2786ada7c08f23e3e8030eff24f81cbb04e008
-
Filesize
241KB
MD57163b4419c5c6f4ac8ea997b02772338
SHA1a2aebd63f37842bd47afb6ed5dd701fb6ee2f59c
SHA256dfc800c13c44ec9f076515a55c1382ac0f15e1410c0f53c79deac781f9a066b5
SHA512ab9e3627c12d1c6de9e19cff537c703a45c0b55ef28108c3f949e84c7139ceb7d78fb65fc0a07d07b77a49fe557d785c42aa66f38ec2cdaa00f5f9cfb78800e6
-
Filesize
241KB
MD57163b4419c5c6f4ac8ea997b02772338
SHA1a2aebd63f37842bd47afb6ed5dd701fb6ee2f59c
SHA256dfc800c13c44ec9f076515a55c1382ac0f15e1410c0f53c79deac781f9a066b5
SHA512ab9e3627c12d1c6de9e19cff537c703a45c0b55ef28108c3f949e84c7139ceb7d78fb65fc0a07d07b77a49fe557d785c42aa66f38ec2cdaa00f5f9cfb78800e6
-
Filesize
108KB
MD5f6b33bd9c92672a535751aa95ef2fff2
SHA15b36fab4ac52705869d7cb7b4c8b990f84405168
SHA256326feac22ea4f8013422aa231f4b21216ca7fa38b499aa9543face4a3569c552
SHA512428e19a008ac5f82d40bdb1e7ecc6e840d1d7a2f0e89052c5e6b9e0d89d84694274101d1a95b95ee0953f99dae0a8cc3bcb02855c12893ad57a4a02677a6f1cf
-
Filesize
176KB
MD503cb1b626b043d78ba9b7adbfe91c0ad
SHA1a7da08b20776657c1b57b2c66e99ed05e9bf7fb7
SHA256bad06609b50688766cd0ce3b168b12b10c67cb3fadf42e1e0fdaa5c15ae08c3e
SHA5127a98da9abf80620d2de7d2ccfa1ff9cb5a79fd960df5421b4282a73d3d2049e887d6d451b08b4dab36fda8f3913663fa98418b204d5eaca041a7e19dc60b939b
-
Filesize
158KB
MD548289d05bf82288e34b67fb4d1cc14f0
SHA143ab3bbb39548177b015a7b3e60ac2d1d730dbd9
SHA2560c75b922c152b3fd14516c9cdacc03bde8d2357c07a427bb2831c180b117fc9c
SHA512d3ff730ded22d89c565bc39b55e39b506e46eca3c754f3ccdb1994f658982a56ffa792a7f9c15a6d5cee07404889db5ee6c73888e10b916f8def6916eeeec97a