Analysis
-
max time kernel
46s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe
Resource
win10v2004-20220901-en
General
-
Target
bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe
-
Size
563KB
-
MD5
527598b9bfe494006bc1ec800acc4ad2
-
SHA1
5aafc25f54992d987423313e3ecb67cc652418dd
-
SHA256
bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425
-
SHA512
009591c2b575586fef27f7c49f33eef89dc151ad45bdbfbe4b92a4fd8d54c561063146d63d5b26fecd590a452771286f4f992447763c1c325b29a68a37083c11
-
SSDEEP
12288:WPRYzbbfbRVx4daF8KKlxLTppZPf9lH1FuoBPOwDVPz1:Lz3flVfytRfzVFuoxD91
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe -
Executes dropped EXE 5 IoCs
pid Process 1584 installd.exe 1204 nethtsrv.exe 744 netupdsrv.exe 772 nethtsrv.exe 1920 netupdsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 1584 installd.exe 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 1204 nethtsrv.exe 1204 nethtsrv.exe 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 772 nethtsrv.exe 772 nethtsrv.exe 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\installd.exe bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe File created C:\Windows\SysWOW64\nethtsrv.exe bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe File created C:\Windows\SysWOW64\netupdsrv.exe bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe File created C:\Windows\SysWOW64\hfnapi.dll bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe File created C:\Windows\SysWOW64\hfpapi.dll bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 772 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1716 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 27 PID 1768 wrote to memory of 1716 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 27 PID 1768 wrote to memory of 1716 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 27 PID 1768 wrote to memory of 1716 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 27 PID 1716 wrote to memory of 112 1716 net.exe 29 PID 1716 wrote to memory of 112 1716 net.exe 29 PID 1716 wrote to memory of 112 1716 net.exe 29 PID 1716 wrote to memory of 112 1716 net.exe 29 PID 1768 wrote to memory of 1316 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 30 PID 1768 wrote to memory of 1316 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 30 PID 1768 wrote to memory of 1316 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 30 PID 1768 wrote to memory of 1316 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 30 PID 1316 wrote to memory of 1616 1316 net.exe 32 PID 1316 wrote to memory of 1616 1316 net.exe 32 PID 1316 wrote to memory of 1616 1316 net.exe 32 PID 1316 wrote to memory of 1616 1316 net.exe 32 PID 1768 wrote to memory of 1584 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 33 PID 1768 wrote to memory of 1584 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 33 PID 1768 wrote to memory of 1584 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 33 PID 1768 wrote to memory of 1584 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 33 PID 1768 wrote to memory of 1584 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 33 PID 1768 wrote to memory of 1584 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 33 PID 1768 wrote to memory of 1584 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 33 PID 1768 wrote to memory of 1204 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 35 PID 1768 wrote to memory of 1204 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 35 PID 1768 wrote to memory of 1204 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 35 PID 1768 wrote to memory of 1204 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 35 PID 1768 wrote to memory of 744 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 37 PID 1768 wrote to memory of 744 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 37 PID 1768 wrote to memory of 744 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 37 PID 1768 wrote to memory of 744 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 37 PID 1768 wrote to memory of 744 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 37 PID 1768 wrote to memory of 744 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 37 PID 1768 wrote to memory of 744 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 37 PID 1768 wrote to memory of 1656 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 40 PID 1768 wrote to memory of 1656 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 40 PID 1768 wrote to memory of 1656 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 40 PID 1768 wrote to memory of 1656 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 40 PID 1656 wrote to memory of 1552 1656 net.exe 41 PID 1656 wrote to memory of 1552 1656 net.exe 41 PID 1656 wrote to memory of 1552 1656 net.exe 41 PID 1656 wrote to memory of 1552 1656 net.exe 41 PID 1768 wrote to memory of 1004 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 43 PID 1768 wrote to memory of 1004 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 43 PID 1768 wrote to memory of 1004 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 43 PID 1768 wrote to memory of 1004 1768 bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe 43 PID 1004 wrote to memory of 1052 1004 net.exe 45 PID 1004 wrote to memory of 1052 1004 net.exe 45 PID 1004 wrote to memory of 1052 1004 net.exe 45 PID 1004 wrote to memory of 1052 1004 net.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe"C:\Users\Admin\AppData\Local\Temp\bbfe9eddbd371ab522587f6bf8aaaa68976c5faed85e21454f068b1f3ab8a425.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:112
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1616
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1584
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1204
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:744
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1552
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1052
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:772
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:1920
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5991d62a29efa29fe658df37bce9afb18
SHA1376f6e2cabd1549f207c39a558095386d7807888
SHA2568c0567377207fe70f08db8a53df59629a447430ba6a71a842d373bfa9887887f
SHA5125acb4c807a73f6173c8cefe1daed04d12552cc0b4018442a1326ac550c5d5777e2925eec0a53e42aec9bdaf5ff7ee0ac891e7d45b44223d4011e0d95e0988262
-
Filesize
244KB
MD5f8f47c1f4fb1029a3d9c97eb6042e1e6
SHA1f7b15878b319791a6b35319c1cf57052992b7673
SHA256830c89c9e632af654220428e7266cd1044ddf242d0d957d13cbe5d9730411f18
SHA512c39617ec1ea4c333ab00fccc0b3c2558917766ecc3722a34856b8ed5531c7e9a3177e7d515787c21af9dcff49c2bd82596518cd4d6d0e1fe3efcfa2943d881a1
-
Filesize
108KB
MD518cc692feb680698c7e5c4e96e81c071
SHA16154997283779a9bd72208c68874153f22fdfc74
SHA2565b8556df0dd9404b97b86cddda0e4a35ec6b812a0ccc0a99b01de24c86d93f08
SHA512eaa9ae3d0a8ac99a3beb967805e39c168b947da10f96935ae575658c9fa2c70f67b9a0f10c77ffe106c041ef6d14f1dc17c54e5c406312327f250c3ce73a6f1c
-
Filesize
176KB
MD5beb8036942155277fad5eb50b97b9461
SHA106932fc6608e4447e50e561ce599b18c4789dc42
SHA256be83f1a28f6dac6856a99ae1d9c4ec2e8892c61daa7c666c4316e01c1762e9b0
SHA51219d8d07c737854a9b1d03aa88d82b965980daa7df4f5cc3fddf4b1e27b4ab1b62616a38d51c576e24b987714dc3640455cfb3c11af3ca37da72572e185cf803b
-
Filesize
176KB
MD5beb8036942155277fad5eb50b97b9461
SHA106932fc6608e4447e50e561ce599b18c4789dc42
SHA256be83f1a28f6dac6856a99ae1d9c4ec2e8892c61daa7c666c4316e01c1762e9b0
SHA51219d8d07c737854a9b1d03aa88d82b965980daa7df4f5cc3fddf4b1e27b4ab1b62616a38d51c576e24b987714dc3640455cfb3c11af3ca37da72572e185cf803b
-
Filesize
158KB
MD54a565d5cd1ab95792d64053f7c95a83e
SHA13d22fd5322cdc8274fe411a29e9bd5308dc1ec01
SHA2561770ac0be5bdecdb01b06391e35be6f787283da13bbcecf1e68fb7f20e40d4e4
SHA512a2ddec1f81afca18f75a388f492040ef8b51d3e9705cee11e1e2147dae8e99d7d2bb484399cac5903235ccd516e3dcc4db56416c9d381699c03194138ec26525
-
Filesize
158KB
MD54a565d5cd1ab95792d64053f7c95a83e
SHA13d22fd5322cdc8274fe411a29e9bd5308dc1ec01
SHA2561770ac0be5bdecdb01b06391e35be6f787283da13bbcecf1e68fb7f20e40d4e4
SHA512a2ddec1f81afca18f75a388f492040ef8b51d3e9705cee11e1e2147dae8e99d7d2bb484399cac5903235ccd516e3dcc4db56416c9d381699c03194138ec26525
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5991d62a29efa29fe658df37bce9afb18
SHA1376f6e2cabd1549f207c39a558095386d7807888
SHA2568c0567377207fe70f08db8a53df59629a447430ba6a71a842d373bfa9887887f
SHA5125acb4c807a73f6173c8cefe1daed04d12552cc0b4018442a1326ac550c5d5777e2925eec0a53e42aec9bdaf5ff7ee0ac891e7d45b44223d4011e0d95e0988262
-
Filesize
106KB
MD5991d62a29efa29fe658df37bce9afb18
SHA1376f6e2cabd1549f207c39a558095386d7807888
SHA2568c0567377207fe70f08db8a53df59629a447430ba6a71a842d373bfa9887887f
SHA5125acb4c807a73f6173c8cefe1daed04d12552cc0b4018442a1326ac550c5d5777e2925eec0a53e42aec9bdaf5ff7ee0ac891e7d45b44223d4011e0d95e0988262
-
Filesize
106KB
MD5991d62a29efa29fe658df37bce9afb18
SHA1376f6e2cabd1549f207c39a558095386d7807888
SHA2568c0567377207fe70f08db8a53df59629a447430ba6a71a842d373bfa9887887f
SHA5125acb4c807a73f6173c8cefe1daed04d12552cc0b4018442a1326ac550c5d5777e2925eec0a53e42aec9bdaf5ff7ee0ac891e7d45b44223d4011e0d95e0988262
-
Filesize
244KB
MD5f8f47c1f4fb1029a3d9c97eb6042e1e6
SHA1f7b15878b319791a6b35319c1cf57052992b7673
SHA256830c89c9e632af654220428e7266cd1044ddf242d0d957d13cbe5d9730411f18
SHA512c39617ec1ea4c333ab00fccc0b3c2558917766ecc3722a34856b8ed5531c7e9a3177e7d515787c21af9dcff49c2bd82596518cd4d6d0e1fe3efcfa2943d881a1
-
Filesize
244KB
MD5f8f47c1f4fb1029a3d9c97eb6042e1e6
SHA1f7b15878b319791a6b35319c1cf57052992b7673
SHA256830c89c9e632af654220428e7266cd1044ddf242d0d957d13cbe5d9730411f18
SHA512c39617ec1ea4c333ab00fccc0b3c2558917766ecc3722a34856b8ed5531c7e9a3177e7d515787c21af9dcff49c2bd82596518cd4d6d0e1fe3efcfa2943d881a1
-
Filesize
108KB
MD518cc692feb680698c7e5c4e96e81c071
SHA16154997283779a9bd72208c68874153f22fdfc74
SHA2565b8556df0dd9404b97b86cddda0e4a35ec6b812a0ccc0a99b01de24c86d93f08
SHA512eaa9ae3d0a8ac99a3beb967805e39c168b947da10f96935ae575658c9fa2c70f67b9a0f10c77ffe106c041ef6d14f1dc17c54e5c406312327f250c3ce73a6f1c
-
Filesize
176KB
MD5beb8036942155277fad5eb50b97b9461
SHA106932fc6608e4447e50e561ce599b18c4789dc42
SHA256be83f1a28f6dac6856a99ae1d9c4ec2e8892c61daa7c666c4316e01c1762e9b0
SHA51219d8d07c737854a9b1d03aa88d82b965980daa7df4f5cc3fddf4b1e27b4ab1b62616a38d51c576e24b987714dc3640455cfb3c11af3ca37da72572e185cf803b
-
Filesize
158KB
MD54a565d5cd1ab95792d64053f7c95a83e
SHA13d22fd5322cdc8274fe411a29e9bd5308dc1ec01
SHA2561770ac0be5bdecdb01b06391e35be6f787283da13bbcecf1e68fb7f20e40d4e4
SHA512a2ddec1f81afca18f75a388f492040ef8b51d3e9705cee11e1e2147dae8e99d7d2bb484399cac5903235ccd516e3dcc4db56416c9d381699c03194138ec26525