Analysis
-
max time kernel
47s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 09:16
Static task
static1
Behavioral task
behavioral1
Sample
b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe
Resource
win10v2004-20221111-en
General
-
Target
b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe
-
Size
673KB
-
MD5
c97334e38e985e05e047607deeea0d3c
-
SHA1
f2662f751a391ab3e121a531194c313bc64b60ed
-
SHA256
b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7
-
SHA512
0901a9d9414e3551428c3cf561622188b4af1557403cbb7347a4f43f68d88725cf6fea55f747d9002e97e1efd36f410e3b4fcf1427e1f0c5e81c7f593d4eac22
-
SSDEEP
12288:f+1VlCxzXBInIv+iZXStVTKh3D8hX15yaOSB59mpRdqTZyC:UVIxy0hS/ToeX1Jn5ARAE
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe -
Executes dropped EXE 5 IoCs
pid Process 544 installd.exe 1068 nethtsrv.exe 1360 netupdsrv.exe 2004 nethtsrv.exe 1300 netupdsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 544 installd.exe 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 1068 nethtsrv.exe 1068 nethtsrv.exe 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 2004 nethtsrv.exe 2004 nethtsrv.exe 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\netupdsrv.exe b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe File created C:\Windows\SysWOW64\hfnapi.dll b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe File created C:\Windows\SysWOW64\hfpapi.dll b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe File created C:\Windows\SysWOW64\installd.exe b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe File created C:\Windows\SysWOW64\nethtsrv.exe b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2004 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1364 wrote to memory of 1232 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 26 PID 1364 wrote to memory of 1232 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 26 PID 1364 wrote to memory of 1232 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 26 PID 1364 wrote to memory of 1232 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 26 PID 1232 wrote to memory of 996 1232 net.exe 28 PID 1232 wrote to memory of 996 1232 net.exe 28 PID 1232 wrote to memory of 996 1232 net.exe 28 PID 1232 wrote to memory of 996 1232 net.exe 28 PID 1364 wrote to memory of 1732 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 29 PID 1364 wrote to memory of 1732 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 29 PID 1364 wrote to memory of 1732 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 29 PID 1364 wrote to memory of 1732 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 29 PID 1732 wrote to memory of 660 1732 net.exe 31 PID 1732 wrote to memory of 660 1732 net.exe 31 PID 1732 wrote to memory of 660 1732 net.exe 31 PID 1732 wrote to memory of 660 1732 net.exe 31 PID 1364 wrote to memory of 544 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 32 PID 1364 wrote to memory of 544 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 32 PID 1364 wrote to memory of 544 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 32 PID 1364 wrote to memory of 544 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 32 PID 1364 wrote to memory of 544 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 32 PID 1364 wrote to memory of 544 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 32 PID 1364 wrote to memory of 544 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 32 PID 1364 wrote to memory of 1068 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 34 PID 1364 wrote to memory of 1068 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 34 PID 1364 wrote to memory of 1068 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 34 PID 1364 wrote to memory of 1068 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 34 PID 1364 wrote to memory of 1360 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 36 PID 1364 wrote to memory of 1360 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 36 PID 1364 wrote to memory of 1360 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 36 PID 1364 wrote to memory of 1360 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 36 PID 1364 wrote to memory of 1360 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 36 PID 1364 wrote to memory of 1360 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 36 PID 1364 wrote to memory of 1360 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 36 PID 1364 wrote to memory of 1900 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 38 PID 1364 wrote to memory of 1900 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 38 PID 1364 wrote to memory of 1900 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 38 PID 1364 wrote to memory of 1900 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 38 PID 1900 wrote to memory of 2000 1900 net.exe 40 PID 1900 wrote to memory of 2000 1900 net.exe 40 PID 1900 wrote to memory of 2000 1900 net.exe 40 PID 1900 wrote to memory of 2000 1900 net.exe 40 PID 1364 wrote to memory of 1688 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 42 PID 1364 wrote to memory of 1688 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 42 PID 1364 wrote to memory of 1688 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 42 PID 1364 wrote to memory of 1688 1364 b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe 42 PID 1688 wrote to memory of 1908 1688 net.exe 44 PID 1688 wrote to memory of 1908 1688 net.exe 44 PID 1688 wrote to memory of 1908 1688 net.exe 44 PID 1688 wrote to memory of 1908 1688 net.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe"C:\Users\Admin\AppData\Local\Temp\b6be1e56ed176921196cec5ef7163175177504c1a640f3e05f228fd2a50276b7.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:996
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:660
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:544
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1068
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1360
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:2000
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1908
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:1300
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5bcb70128aceb1b35983de0af899f2238
SHA17eff608697407439286af6ee64e822313921074b
SHA256adf8a08b13608e3c65118d6b2f471f98e90362a366819b90fe21bfb1ac071cb9
SHA5128ea67218c03a097910720ee68b6ec74b03f3ab3034bcb65836f0e15f2213105fd086d39728f3c91b602d6f78934f9b912ad451a815f8898f7635bcc238ef81d8
-
Filesize
244KB
MD5d47433c266f348244f3e9fcf5067b70f
SHA1a351892eb6a4b537d2310d0055f73adce06ec7af
SHA256ba433c9f5b6dc0b871016d68d69d63b18ba6c8fd966f85f81dc8d677d2b3192b
SHA512fd7b3bda760b5b84ecb352203ed9c92a77303eb7c7c3d4043d98462e45f11b1987b8e487b0de63fd6b50c841fb2bc5073b9d77c66911c70c669d2356bd1067b3
-
Filesize
108KB
MD51f08976c2aca2ddb95333154f9a4f13f
SHA1d07d6fd692bcd43f80cacef3b4dd230b1e67fd54
SHA256c33192a202ac61bdb286764f741803d7b9c311194ae292b5cacb128c3b25b83a
SHA51244555b3f67fa40e1a2e64d3a8c76943697f58ad74b27bce914d15576c7410f42148a877c841e8b068dc9370814892e4318ce00cda0e117cfa1dd94ddf5999155
-
Filesize
176KB
MD5fd628310f4e7c6dc42f555a98ee6a44b
SHA13c169146da546ed5b329aae2d3c41b6f26707e37
SHA256040c14b97229701e6753747cd2f3f69dfb399cef0ab42e21ae569cad85e9a5d5
SHA5128a538164edbf60443726a5a52e7435ba709272f5fb8960f6f0d71f548f5de0b81b1329cb1066bd5af7c78dcc3a6ee2ec08b00e9f9c4d22862fee5b16714b4736
-
Filesize
176KB
MD5fd628310f4e7c6dc42f555a98ee6a44b
SHA13c169146da546ed5b329aae2d3c41b6f26707e37
SHA256040c14b97229701e6753747cd2f3f69dfb399cef0ab42e21ae569cad85e9a5d5
SHA5128a538164edbf60443726a5a52e7435ba709272f5fb8960f6f0d71f548f5de0b81b1329cb1066bd5af7c78dcc3a6ee2ec08b00e9f9c4d22862fee5b16714b4736
-
Filesize
158KB
MD533cfca94255c4824384fce678616a239
SHA1adfdb269c12405972debf09d8769364678c7b9b9
SHA256f6fca7dbe082d43eb628b2203961103615c6e6fbd16b04b8f0c09f5262c7c606
SHA5126fc81b172a55c9dfd546819d3f6fb8f0289a32a939c2ea3b8cca2be8b38cf97d1bce943f446feba3e1de47f04a0de645981cb0fb4004c1f4a488d910f2f0154a
-
Filesize
158KB
MD533cfca94255c4824384fce678616a239
SHA1adfdb269c12405972debf09d8769364678c7b9b9
SHA256f6fca7dbe082d43eb628b2203961103615c6e6fbd16b04b8f0c09f5262c7c606
SHA5126fc81b172a55c9dfd546819d3f6fb8f0289a32a939c2ea3b8cca2be8b38cf97d1bce943f446feba3e1de47f04a0de645981cb0fb4004c1f4a488d910f2f0154a
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5bcb70128aceb1b35983de0af899f2238
SHA17eff608697407439286af6ee64e822313921074b
SHA256adf8a08b13608e3c65118d6b2f471f98e90362a366819b90fe21bfb1ac071cb9
SHA5128ea67218c03a097910720ee68b6ec74b03f3ab3034bcb65836f0e15f2213105fd086d39728f3c91b602d6f78934f9b912ad451a815f8898f7635bcc238ef81d8
-
Filesize
106KB
MD5bcb70128aceb1b35983de0af899f2238
SHA17eff608697407439286af6ee64e822313921074b
SHA256adf8a08b13608e3c65118d6b2f471f98e90362a366819b90fe21bfb1ac071cb9
SHA5128ea67218c03a097910720ee68b6ec74b03f3ab3034bcb65836f0e15f2213105fd086d39728f3c91b602d6f78934f9b912ad451a815f8898f7635bcc238ef81d8
-
Filesize
106KB
MD5bcb70128aceb1b35983de0af899f2238
SHA17eff608697407439286af6ee64e822313921074b
SHA256adf8a08b13608e3c65118d6b2f471f98e90362a366819b90fe21bfb1ac071cb9
SHA5128ea67218c03a097910720ee68b6ec74b03f3ab3034bcb65836f0e15f2213105fd086d39728f3c91b602d6f78934f9b912ad451a815f8898f7635bcc238ef81d8
-
Filesize
244KB
MD5d47433c266f348244f3e9fcf5067b70f
SHA1a351892eb6a4b537d2310d0055f73adce06ec7af
SHA256ba433c9f5b6dc0b871016d68d69d63b18ba6c8fd966f85f81dc8d677d2b3192b
SHA512fd7b3bda760b5b84ecb352203ed9c92a77303eb7c7c3d4043d98462e45f11b1987b8e487b0de63fd6b50c841fb2bc5073b9d77c66911c70c669d2356bd1067b3
-
Filesize
244KB
MD5d47433c266f348244f3e9fcf5067b70f
SHA1a351892eb6a4b537d2310d0055f73adce06ec7af
SHA256ba433c9f5b6dc0b871016d68d69d63b18ba6c8fd966f85f81dc8d677d2b3192b
SHA512fd7b3bda760b5b84ecb352203ed9c92a77303eb7c7c3d4043d98462e45f11b1987b8e487b0de63fd6b50c841fb2bc5073b9d77c66911c70c669d2356bd1067b3
-
Filesize
108KB
MD51f08976c2aca2ddb95333154f9a4f13f
SHA1d07d6fd692bcd43f80cacef3b4dd230b1e67fd54
SHA256c33192a202ac61bdb286764f741803d7b9c311194ae292b5cacb128c3b25b83a
SHA51244555b3f67fa40e1a2e64d3a8c76943697f58ad74b27bce914d15576c7410f42148a877c841e8b068dc9370814892e4318ce00cda0e117cfa1dd94ddf5999155
-
Filesize
176KB
MD5fd628310f4e7c6dc42f555a98ee6a44b
SHA13c169146da546ed5b329aae2d3c41b6f26707e37
SHA256040c14b97229701e6753747cd2f3f69dfb399cef0ab42e21ae569cad85e9a5d5
SHA5128a538164edbf60443726a5a52e7435ba709272f5fb8960f6f0d71f548f5de0b81b1329cb1066bd5af7c78dcc3a6ee2ec08b00e9f9c4d22862fee5b16714b4736
-
Filesize
158KB
MD533cfca94255c4824384fce678616a239
SHA1adfdb269c12405972debf09d8769364678c7b9b9
SHA256f6fca7dbe082d43eb628b2203961103615c6e6fbd16b04b8f0c09f5262c7c606
SHA5126fc81b172a55c9dfd546819d3f6fb8f0289a32a939c2ea3b8cca2be8b38cf97d1bce943f446feba3e1de47f04a0de645981cb0fb4004c1f4a488d910f2f0154a