Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe
Resource
win10v2004-20221111-en
General
-
Target
edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe
-
Size
562KB
-
MD5
9f10bbe235b379289d3d43eb6f16e9dc
-
SHA1
554f562a6b2ef9639a95fe01d59b0e69b823058b
-
SHA256
edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727
-
SHA512
4d1e2a232f60e3f52bc23d185a7859aa262ee9125e1fa6b10a72319c66e8af96e355c64c2c47da63229231a14360729a8079d7333012ae285a8e3bfbda55d618
-
SSDEEP
12288:dPRYzJbf+crv7AZUvZUoVCTgduum++YZDBmoTN9B/tcET799f:kz9frrv7XvZUKmgduuiYXmoTJWETR
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe -
Executes dropped EXE 5 IoCs
pid Process 1988 installd.exe 1880 nethtsrv.exe 1056 netupdsrv.exe 1660 nethtsrv.exe 468 netupdsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 1988 installd.exe 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 1880 nethtsrv.exe 1880 nethtsrv.exe 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 1660 nethtsrv.exe 1660 nethtsrv.exe 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfnapi.dll edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe File created C:\Windows\SysWOW64\hfpapi.dll edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe File created C:\Windows\SysWOW64\installd.exe edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe File created C:\Windows\SysWOW64\nethtsrv.exe edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe File created C:\Windows\SysWOW64\netupdsrv.exe edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1660 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 868 wrote to memory of 2032 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 27 PID 868 wrote to memory of 2032 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 27 PID 868 wrote to memory of 2032 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 27 PID 868 wrote to memory of 2032 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 27 PID 2032 wrote to memory of 1756 2032 net.exe 29 PID 2032 wrote to memory of 1756 2032 net.exe 29 PID 2032 wrote to memory of 1756 2032 net.exe 29 PID 2032 wrote to memory of 1756 2032 net.exe 29 PID 868 wrote to memory of 1904 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 30 PID 868 wrote to memory of 1904 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 30 PID 868 wrote to memory of 1904 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 30 PID 868 wrote to memory of 1904 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 30 PID 1904 wrote to memory of 1436 1904 net.exe 32 PID 1904 wrote to memory of 1436 1904 net.exe 32 PID 1904 wrote to memory of 1436 1904 net.exe 32 PID 1904 wrote to memory of 1436 1904 net.exe 32 PID 868 wrote to memory of 1988 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 33 PID 868 wrote to memory of 1988 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 33 PID 868 wrote to memory of 1988 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 33 PID 868 wrote to memory of 1988 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 33 PID 868 wrote to memory of 1988 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 33 PID 868 wrote to memory of 1988 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 33 PID 868 wrote to memory of 1988 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 33 PID 868 wrote to memory of 1880 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 35 PID 868 wrote to memory of 1880 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 35 PID 868 wrote to memory of 1880 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 35 PID 868 wrote to memory of 1880 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 35 PID 868 wrote to memory of 1056 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 37 PID 868 wrote to memory of 1056 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 37 PID 868 wrote to memory of 1056 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 37 PID 868 wrote to memory of 1056 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 37 PID 868 wrote to memory of 1056 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 37 PID 868 wrote to memory of 1056 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 37 PID 868 wrote to memory of 1056 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 37 PID 868 wrote to memory of 1656 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 39 PID 868 wrote to memory of 1656 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 39 PID 868 wrote to memory of 1656 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 39 PID 868 wrote to memory of 1656 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 39 PID 1656 wrote to memory of 1528 1656 net.exe 41 PID 1656 wrote to memory of 1528 1656 net.exe 41 PID 1656 wrote to memory of 1528 1656 net.exe 41 PID 1656 wrote to memory of 1528 1656 net.exe 41 PID 868 wrote to memory of 1196 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 43 PID 868 wrote to memory of 1196 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 43 PID 868 wrote to memory of 1196 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 43 PID 868 wrote to memory of 1196 868 edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe 43 PID 1196 wrote to memory of 1028 1196 net.exe 45 PID 1196 wrote to memory of 1028 1196 net.exe 45 PID 1196 wrote to memory of 1028 1196 net.exe 45 PID 1196 wrote to memory of 1028 1196 net.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe"C:\Users\Admin\AppData\Local\Temp\edecfd141ec9272948155b6f5c633094e10600be33631d0220f6c69ef166f727.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1756
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1436
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1988
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1880
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1056
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1528
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1028
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:468
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5f7930d5549551c6dc3e116a9fe74fb40
SHA172284fffefc4ec987d5d3359ca6534615b06e5c4
SHA256fe067da6cea5c13bebdcfb1b1cdbbc963f421ad9d028274a4bb1a3750c4d5c07
SHA51270602519f43ff24898a7129be111d86fc70635a6681426f316e5df245bc93e6df16a6fd6295df0b5834b9047ce80d655b00d82c4a3cbe8e70bd9b4226b703ff7
-
Filesize
244KB
MD54fe2edcb7c94de058985f320c00bb26a
SHA177185828d83ec355890646d60ffe81778e53cde6
SHA2561030a66f0810c7187d4095176fa4a867f2b4ee26bb0c8139ddfd360a64ba6272
SHA5125f2bd90bfd52ed93a199e1f70767e423bc88fab7de24acadfaefff7cb659bb28991f0528f2e87ccedfaaebb44d8b651c1c380e724f9dc963fb4e0d6a826a7f92
-
Filesize
108KB
MD5ee444c583e74a0b219c91c3d3f079018
SHA1bd46133e59d77f654f6b5a46722bd52f0a990774
SHA256785c750e4f869d966a4f983a406bfe30b8e9e9f40732e13a4061965d8e60b0e5
SHA51253303dc50b74b17697371f77df83414f425b1fd965134ec3b2ec7b3332556cbcba20d8950f089bf03f32bbbbe7cbbfb16d6bfd4eade695e19d2806a592ebb9c5
-
Filesize
176KB
MD59f2b6a5fcac356475186e42300118905
SHA10ca9a8c7b034b37103908c71b0b8961696ffc110
SHA25627d1d2426904e3e509f67175fff93cdb67f94cc4543c1684ff2fc66966b535e9
SHA512269426732372fce6067174d4dfb7d099f76769ef7f525399e214048126a894186efb5e3294b44401d0880d9ee4df7560e6754640b29bd9a740ad76f332dd3e30
-
Filesize
176KB
MD59f2b6a5fcac356475186e42300118905
SHA10ca9a8c7b034b37103908c71b0b8961696ffc110
SHA25627d1d2426904e3e509f67175fff93cdb67f94cc4543c1684ff2fc66966b535e9
SHA512269426732372fce6067174d4dfb7d099f76769ef7f525399e214048126a894186efb5e3294b44401d0880d9ee4df7560e6754640b29bd9a740ad76f332dd3e30
-
Filesize
158KB
MD5be9df6ac1a87691694d25f95c9a03e81
SHA1a70a170b3437ea7cb8ddea6b59416310c4574485
SHA25638573ff71291b37672d336640f8c1ea54907b937a3ba9f96775e5ad74f55492b
SHA512403b78187fb6e7480ad336a0f7f1f0a23f04e98dfd423e1c79c08787c5ffd8c1de0db4aded538d3431f601c6dc688ebf4de21f2b2a895b57c1921a60cb1d4016
-
Filesize
158KB
MD5be9df6ac1a87691694d25f95c9a03e81
SHA1a70a170b3437ea7cb8ddea6b59416310c4574485
SHA25638573ff71291b37672d336640f8c1ea54907b937a3ba9f96775e5ad74f55492b
SHA512403b78187fb6e7480ad336a0f7f1f0a23f04e98dfd423e1c79c08787c5ffd8c1de0db4aded538d3431f601c6dc688ebf4de21f2b2a895b57c1921a60cb1d4016
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5f7930d5549551c6dc3e116a9fe74fb40
SHA172284fffefc4ec987d5d3359ca6534615b06e5c4
SHA256fe067da6cea5c13bebdcfb1b1cdbbc963f421ad9d028274a4bb1a3750c4d5c07
SHA51270602519f43ff24898a7129be111d86fc70635a6681426f316e5df245bc93e6df16a6fd6295df0b5834b9047ce80d655b00d82c4a3cbe8e70bd9b4226b703ff7
-
Filesize
106KB
MD5f7930d5549551c6dc3e116a9fe74fb40
SHA172284fffefc4ec987d5d3359ca6534615b06e5c4
SHA256fe067da6cea5c13bebdcfb1b1cdbbc963f421ad9d028274a4bb1a3750c4d5c07
SHA51270602519f43ff24898a7129be111d86fc70635a6681426f316e5df245bc93e6df16a6fd6295df0b5834b9047ce80d655b00d82c4a3cbe8e70bd9b4226b703ff7
-
Filesize
106KB
MD5f7930d5549551c6dc3e116a9fe74fb40
SHA172284fffefc4ec987d5d3359ca6534615b06e5c4
SHA256fe067da6cea5c13bebdcfb1b1cdbbc963f421ad9d028274a4bb1a3750c4d5c07
SHA51270602519f43ff24898a7129be111d86fc70635a6681426f316e5df245bc93e6df16a6fd6295df0b5834b9047ce80d655b00d82c4a3cbe8e70bd9b4226b703ff7
-
Filesize
244KB
MD54fe2edcb7c94de058985f320c00bb26a
SHA177185828d83ec355890646d60ffe81778e53cde6
SHA2561030a66f0810c7187d4095176fa4a867f2b4ee26bb0c8139ddfd360a64ba6272
SHA5125f2bd90bfd52ed93a199e1f70767e423bc88fab7de24acadfaefff7cb659bb28991f0528f2e87ccedfaaebb44d8b651c1c380e724f9dc963fb4e0d6a826a7f92
-
Filesize
244KB
MD54fe2edcb7c94de058985f320c00bb26a
SHA177185828d83ec355890646d60ffe81778e53cde6
SHA2561030a66f0810c7187d4095176fa4a867f2b4ee26bb0c8139ddfd360a64ba6272
SHA5125f2bd90bfd52ed93a199e1f70767e423bc88fab7de24acadfaefff7cb659bb28991f0528f2e87ccedfaaebb44d8b651c1c380e724f9dc963fb4e0d6a826a7f92
-
Filesize
108KB
MD5ee444c583e74a0b219c91c3d3f079018
SHA1bd46133e59d77f654f6b5a46722bd52f0a990774
SHA256785c750e4f869d966a4f983a406bfe30b8e9e9f40732e13a4061965d8e60b0e5
SHA51253303dc50b74b17697371f77df83414f425b1fd965134ec3b2ec7b3332556cbcba20d8950f089bf03f32bbbbe7cbbfb16d6bfd4eade695e19d2806a592ebb9c5
-
Filesize
176KB
MD59f2b6a5fcac356475186e42300118905
SHA10ca9a8c7b034b37103908c71b0b8961696ffc110
SHA25627d1d2426904e3e509f67175fff93cdb67f94cc4543c1684ff2fc66966b535e9
SHA512269426732372fce6067174d4dfb7d099f76769ef7f525399e214048126a894186efb5e3294b44401d0880d9ee4df7560e6754640b29bd9a740ad76f332dd3e30
-
Filesize
158KB
MD5be9df6ac1a87691694d25f95c9a03e81
SHA1a70a170b3437ea7cb8ddea6b59416310c4574485
SHA25638573ff71291b37672d336640f8c1ea54907b937a3ba9f96775e5ad74f55492b
SHA512403b78187fb6e7480ad336a0f7f1f0a23f04e98dfd423e1c79c08787c5ffd8c1de0db4aded538d3431f601c6dc688ebf4de21f2b2a895b57c1921a60cb1d4016