Analysis
-
max time kernel
46s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 22:12
Static task
static1
Behavioral task
behavioral1
Sample
454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe
Resource
win10v2004-20220812-en
General
-
Target
454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe
-
Size
560KB
-
MD5
51f4115969d446ba5f91257f26775907
-
SHA1
9404318b0f4a724be161b31475666b88eed45ac8
-
SHA256
454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5
-
SHA512
8610b8f9ff915e2d7f56d4f9162d71d87e718773ce27cc300148685c3fc351a38794d573cfc4c79c784f9411898f2017c1a97a9a988b1922cf78e8038082ee23
-
SSDEEP
12288:fPRYzZbf19NdNO/Zemkv3oCWdG4lz3K8xm3b:SztfHHNO/ZemEoCuG4ljtm3b
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe -
Executes dropped EXE 5 IoCs
pid Process 744 installd.exe 1364 nethtsrv.exe 1508 netupdsrv.exe 1344 nethtsrv.exe 880 netupdsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 744 installd.exe 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 1364 nethtsrv.exe 1364 nethtsrv.exe 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 1344 nethtsrv.exe 1344 nethtsrv.exe 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\nethtsrv.exe 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe File created C:\Windows\SysWOW64\netupdsrv.exe 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe File created C:\Windows\SysWOW64\hfnapi.dll 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe File created C:\Windows\SysWOW64\hfpapi.dll 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe File created C:\Windows\SysWOW64\installd.exe 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1344 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1988 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 27 PID 1620 wrote to memory of 1988 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 27 PID 1620 wrote to memory of 1988 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 27 PID 1620 wrote to memory of 1988 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 27 PID 1988 wrote to memory of 1980 1988 net.exe 29 PID 1988 wrote to memory of 1980 1988 net.exe 29 PID 1988 wrote to memory of 1980 1988 net.exe 29 PID 1988 wrote to memory of 1980 1988 net.exe 29 PID 1620 wrote to memory of 2004 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 30 PID 1620 wrote to memory of 2004 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 30 PID 1620 wrote to memory of 2004 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 30 PID 1620 wrote to memory of 2004 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 30 PID 2004 wrote to memory of 1972 2004 net.exe 32 PID 2004 wrote to memory of 1972 2004 net.exe 32 PID 2004 wrote to memory of 1972 2004 net.exe 32 PID 2004 wrote to memory of 1972 2004 net.exe 32 PID 1620 wrote to memory of 744 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 33 PID 1620 wrote to memory of 744 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 33 PID 1620 wrote to memory of 744 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 33 PID 1620 wrote to memory of 744 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 33 PID 1620 wrote to memory of 744 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 33 PID 1620 wrote to memory of 744 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 33 PID 1620 wrote to memory of 744 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 33 PID 1620 wrote to memory of 1364 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 35 PID 1620 wrote to memory of 1364 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 35 PID 1620 wrote to memory of 1364 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 35 PID 1620 wrote to memory of 1364 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 35 PID 1620 wrote to memory of 1508 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 37 PID 1620 wrote to memory of 1508 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 37 PID 1620 wrote to memory of 1508 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 37 PID 1620 wrote to memory of 1508 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 37 PID 1620 wrote to memory of 1508 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 37 PID 1620 wrote to memory of 1508 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 37 PID 1620 wrote to memory of 1508 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 37 PID 1620 wrote to memory of 688 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 39 PID 1620 wrote to memory of 688 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 39 PID 1620 wrote to memory of 688 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 39 PID 1620 wrote to memory of 688 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 39 PID 688 wrote to memory of 808 688 net.exe 41 PID 688 wrote to memory of 808 688 net.exe 41 PID 688 wrote to memory of 808 688 net.exe 41 PID 688 wrote to memory of 808 688 net.exe 41 PID 1620 wrote to memory of 2000 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 43 PID 1620 wrote to memory of 2000 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 43 PID 1620 wrote to memory of 2000 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 43 PID 1620 wrote to memory of 2000 1620 454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe 43 PID 2000 wrote to memory of 1312 2000 net.exe 45 PID 2000 wrote to memory of 1312 2000 net.exe 45 PID 2000 wrote to memory of 1312 2000 net.exe 45 PID 2000 wrote to memory of 1312 2000 net.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe"C:\Users\Admin\AppData\Local\Temp\454234e9d1522fc7d0cb02807b7ffdac5915c1e76db32b2002a6029119fff4e5.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1980
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1972
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:744
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1364
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1508
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:808
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1312
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:880
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5be3714c57e3f3c817c97facd1545f780
SHA168ed1ebfc65f5a14852c14ecbcbc0a774a4bf55a
SHA2562ab5800730d288204e6d46e19461c8569b0676e7b320c5dbc3660edc52321df3
SHA5126933251aeecd24e36442e82d13b9c7c74e240003338dfa3f30b291aa6310368b921ec03239c32011aaf87b3c7addc2108f1470799851c2beb2eba4705f181f3d
-
Filesize
241KB
MD54c765c98492bab9794cac3847293f26b
SHA14b8e2c9a26631e4f2d7d950fd47cf938ca5fcb9d
SHA256f8a5f1df60fb3a8d4014c35979a9806290b187851e06bf09abfcbe120304970f
SHA512578b5011da4b4b20dc36dbdf6d988edeff4e11c02dd01047c79fd0628ae24a40db16f16943cc82787c70b2c73f2c0e99765649259c47b03289b6c1cc70896d8a
-
Filesize
108KB
MD5d593b232b5d25623b195a2cdfde5f7dc
SHA1ede6bfb4f3520f802a3ff61acad684310fa836d3
SHA256085b39cb9046037ad06e56917707becc2d2e73fd2dad9ac7594c7932e1e3fc8c
SHA5129836f651630759d5e6583bbffe8e58bfc82c159d96ce2c695b70cdc6f1faf162e51025774a8e00856da2a4e2ba4aa99ca688db0f90862bac922ef4554b3ddd70
-
Filesize
176KB
MD55a0d36c00e307cd40e6eae22cc80d17b
SHA1e10d567997f9115e8ecbbaa89eac2563b89257c9
SHA256dd352e88d71bf2fedb2451cc7c2ebdc88bd8015a905a78d31c941edff3fefdfb
SHA512781924aaee1b058771d6c756217a84eeb650e0fc96186b790b94b1ef27366a6ef2676dc71eb6722ecc79668c0426802bb047ecbf064b807976ff73f306148838
-
Filesize
176KB
MD55a0d36c00e307cd40e6eae22cc80d17b
SHA1e10d567997f9115e8ecbbaa89eac2563b89257c9
SHA256dd352e88d71bf2fedb2451cc7c2ebdc88bd8015a905a78d31c941edff3fefdfb
SHA512781924aaee1b058771d6c756217a84eeb650e0fc96186b790b94b1ef27366a6ef2676dc71eb6722ecc79668c0426802bb047ecbf064b807976ff73f306148838
-
Filesize
158KB
MD502ddef5096b6b73d38b19ef512b2715d
SHA1c2efcfdd0a6fea5cf9881af470f62936056b1777
SHA256c2b2214b4126f3507108e10403909f08a6a47b541415166fb7b5a73d49535bdd
SHA512470bc43a3418978f948ad05ea024ef5aa3700d786d53c5713b6612a1b57d6955be283fdaf3d907145c3ddc21a8ac1889e8a87f474d6dc8112a210beb31726f02
-
Filesize
158KB
MD502ddef5096b6b73d38b19ef512b2715d
SHA1c2efcfdd0a6fea5cf9881af470f62936056b1777
SHA256c2b2214b4126f3507108e10403909f08a6a47b541415166fb7b5a73d49535bdd
SHA512470bc43a3418978f948ad05ea024ef5aa3700d786d53c5713b6612a1b57d6955be283fdaf3d907145c3ddc21a8ac1889e8a87f474d6dc8112a210beb31726f02
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5be3714c57e3f3c817c97facd1545f780
SHA168ed1ebfc65f5a14852c14ecbcbc0a774a4bf55a
SHA2562ab5800730d288204e6d46e19461c8569b0676e7b320c5dbc3660edc52321df3
SHA5126933251aeecd24e36442e82d13b9c7c74e240003338dfa3f30b291aa6310368b921ec03239c32011aaf87b3c7addc2108f1470799851c2beb2eba4705f181f3d
-
Filesize
106KB
MD5be3714c57e3f3c817c97facd1545f780
SHA168ed1ebfc65f5a14852c14ecbcbc0a774a4bf55a
SHA2562ab5800730d288204e6d46e19461c8569b0676e7b320c5dbc3660edc52321df3
SHA5126933251aeecd24e36442e82d13b9c7c74e240003338dfa3f30b291aa6310368b921ec03239c32011aaf87b3c7addc2108f1470799851c2beb2eba4705f181f3d
-
Filesize
106KB
MD5be3714c57e3f3c817c97facd1545f780
SHA168ed1ebfc65f5a14852c14ecbcbc0a774a4bf55a
SHA2562ab5800730d288204e6d46e19461c8569b0676e7b320c5dbc3660edc52321df3
SHA5126933251aeecd24e36442e82d13b9c7c74e240003338dfa3f30b291aa6310368b921ec03239c32011aaf87b3c7addc2108f1470799851c2beb2eba4705f181f3d
-
Filesize
241KB
MD54c765c98492bab9794cac3847293f26b
SHA14b8e2c9a26631e4f2d7d950fd47cf938ca5fcb9d
SHA256f8a5f1df60fb3a8d4014c35979a9806290b187851e06bf09abfcbe120304970f
SHA512578b5011da4b4b20dc36dbdf6d988edeff4e11c02dd01047c79fd0628ae24a40db16f16943cc82787c70b2c73f2c0e99765649259c47b03289b6c1cc70896d8a
-
Filesize
241KB
MD54c765c98492bab9794cac3847293f26b
SHA14b8e2c9a26631e4f2d7d950fd47cf938ca5fcb9d
SHA256f8a5f1df60fb3a8d4014c35979a9806290b187851e06bf09abfcbe120304970f
SHA512578b5011da4b4b20dc36dbdf6d988edeff4e11c02dd01047c79fd0628ae24a40db16f16943cc82787c70b2c73f2c0e99765649259c47b03289b6c1cc70896d8a
-
Filesize
108KB
MD5d593b232b5d25623b195a2cdfde5f7dc
SHA1ede6bfb4f3520f802a3ff61acad684310fa836d3
SHA256085b39cb9046037ad06e56917707becc2d2e73fd2dad9ac7594c7932e1e3fc8c
SHA5129836f651630759d5e6583bbffe8e58bfc82c159d96ce2c695b70cdc6f1faf162e51025774a8e00856da2a4e2ba4aa99ca688db0f90862bac922ef4554b3ddd70
-
Filesize
176KB
MD55a0d36c00e307cd40e6eae22cc80d17b
SHA1e10d567997f9115e8ecbbaa89eac2563b89257c9
SHA256dd352e88d71bf2fedb2451cc7c2ebdc88bd8015a905a78d31c941edff3fefdfb
SHA512781924aaee1b058771d6c756217a84eeb650e0fc96186b790b94b1ef27366a6ef2676dc71eb6722ecc79668c0426802bb047ecbf064b807976ff73f306148838
-
Filesize
158KB
MD502ddef5096b6b73d38b19ef512b2715d
SHA1c2efcfdd0a6fea5cf9881af470f62936056b1777
SHA256c2b2214b4126f3507108e10403909f08a6a47b541415166fb7b5a73d49535bdd
SHA512470bc43a3418978f948ad05ea024ef5aa3700d786d53c5713b6612a1b57d6955be283fdaf3d907145c3ddc21a8ac1889e8a87f474d6dc8112a210beb31726f02