Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 13:32
Static task
static1
Behavioral task
behavioral1
Sample
e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe
Resource
win10v2004-20220812-en
General
-
Target
e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe
-
Size
562KB
-
MD5
b7c49c06b9d8bf76d3bcb340d69e8b5e
-
SHA1
758dd7242e69847721c47439f841016a93a1c051
-
SHA256
e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218
-
SHA512
23c1df69203274c5b611aebef01e09b8f50b2da93c1b5a87b5b71bfd9d36145b790ceeb064a4172159e04c07bb5461eff137b06bb923f2565a5cc9c0d4085336
-
SSDEEP
12288:UPRYzJbfgAE3VSDhhLws+fm72Rpf9tIaxPfo2DORWhBbd:Fz9fy32hhLwK72nf96qoaKWL
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe -
Executes dropped EXE 5 IoCs
pid Process 1108 installd.exe 980 nethtsrv.exe 1476 netupdsrv.exe 776 nethtsrv.exe 924 netupdsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 1108 installd.exe 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 980 nethtsrv.exe 980 nethtsrv.exe 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 776 nethtsrv.exe 776 nethtsrv.exe 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\nethtsrv.exe e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe File created C:\Windows\SysWOW64\netupdsrv.exe e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe File created C:\Windows\SysWOW64\hfnapi.dll e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe File created C:\Windows\SysWOW64\hfpapi.dll e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe File created C:\Windows\SysWOW64\installd.exe e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 776 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1552 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 27 PID 1672 wrote to memory of 1552 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 27 PID 1672 wrote to memory of 1552 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 27 PID 1672 wrote to memory of 1552 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 27 PID 1552 wrote to memory of 520 1552 net.exe 29 PID 1552 wrote to memory of 520 1552 net.exe 29 PID 1552 wrote to memory of 520 1552 net.exe 29 PID 1552 wrote to memory of 520 1552 net.exe 29 PID 1672 wrote to memory of 560 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 30 PID 1672 wrote to memory of 560 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 30 PID 1672 wrote to memory of 560 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 30 PID 1672 wrote to memory of 560 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 30 PID 560 wrote to memory of 576 560 net.exe 32 PID 560 wrote to memory of 576 560 net.exe 32 PID 560 wrote to memory of 576 560 net.exe 32 PID 560 wrote to memory of 576 560 net.exe 32 PID 1672 wrote to memory of 1108 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 33 PID 1672 wrote to memory of 1108 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 33 PID 1672 wrote to memory of 1108 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 33 PID 1672 wrote to memory of 1108 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 33 PID 1672 wrote to memory of 1108 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 33 PID 1672 wrote to memory of 1108 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 33 PID 1672 wrote to memory of 1108 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 33 PID 1672 wrote to memory of 980 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 35 PID 1672 wrote to memory of 980 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 35 PID 1672 wrote to memory of 980 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 35 PID 1672 wrote to memory of 980 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 35 PID 1672 wrote to memory of 1476 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 37 PID 1672 wrote to memory of 1476 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 37 PID 1672 wrote to memory of 1476 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 37 PID 1672 wrote to memory of 1476 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 37 PID 1672 wrote to memory of 1476 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 37 PID 1672 wrote to memory of 1476 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 37 PID 1672 wrote to memory of 1476 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 37 PID 1672 wrote to memory of 1272 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 39 PID 1672 wrote to memory of 1272 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 39 PID 1672 wrote to memory of 1272 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 39 PID 1672 wrote to memory of 1272 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 39 PID 1272 wrote to memory of 1604 1272 net.exe 41 PID 1272 wrote to memory of 1604 1272 net.exe 41 PID 1272 wrote to memory of 1604 1272 net.exe 41 PID 1272 wrote to memory of 1604 1272 net.exe 41 PID 1672 wrote to memory of 1384 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 43 PID 1672 wrote to memory of 1384 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 43 PID 1672 wrote to memory of 1384 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 43 PID 1672 wrote to memory of 1384 1672 e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe 43 PID 1384 wrote to memory of 656 1384 net.exe 45 PID 1384 wrote to memory of 656 1384 net.exe 45 PID 1384 wrote to memory of 656 1384 net.exe 45 PID 1384 wrote to memory of 656 1384 net.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe"C:\Users\Admin\AppData\Local\Temp\e3a91f20943b06fc50790b2410de1ce4ae5f5b1b64bf83d871b3e20c1265a218.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:520
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:576
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1108
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:980
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1476
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1604
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:656
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:776
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:924
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD585872423948102f1ee4a91f86e218503
SHA1c65b997406481ce5fe4a128611f47c09e296cc06
SHA256bd1c76c6442a254fe2b93b58daa6e27028ac9a621379851bc9d6404fcde511cd
SHA512cfa98b61dc596a2ab5135443a9802e098111fff25643a2427b59a163f27db782109fdf1b57c4d0985344cb40161c53388a9b44711c77d712ee7738d537d303c0
-
Filesize
244KB
MD509180d714bc028bc5c7a8819ec3bd8f4
SHA12dc82b887414644fb05dc245e52c825193f6105f
SHA256d6152c40967c755f4600c14bedb865411c82983e41ffd2a00708e57208e6f0a4
SHA51216c4ba0c59d303ae32338c0746bf52a33ac2747948ec0cb6675b8722cf8297bf1f73cc661cf470a193891be1f8355e2cb638cdf4d1ce2f5d9ab8be90c39e8821
-
Filesize
108KB
MD546e22eafc1c0bb38bd6e8595300d7037
SHA1ea2415b24a226a1dd5e5c9fe27f77292fd4f337e
SHA2563b15fb065617f1f6f364c83d08294acb769ed46f2e1de74e8857fadccb4f817b
SHA5128935a1d0c36428dd9320b175b41aac113289f81e3e0c259f1c7ee5d935f4a6cd36f5aa93987ea3d865dfffbffdec8e8bf92f322cf7f375c79190a4e09f98ce7a
-
Filesize
176KB
MD548cb3e5c9c677e72f59d76c464875e9a
SHA14bd3f3e80e2ad4e1617ed1e3262c123ce4d816fa
SHA256f18c1b87307e357d94bea78666ae9935ff140ece60741c683bffdb27d49ad584
SHA5128cb1a001546740cac457deefccf7c039d2417650dc931d258c83f2a16ef5d55c74212a7b3019349369d9d3edb12ad32e0ea16bf156ffc8f3af855a18b10bddd2
-
Filesize
176KB
MD548cb3e5c9c677e72f59d76c464875e9a
SHA14bd3f3e80e2ad4e1617ed1e3262c123ce4d816fa
SHA256f18c1b87307e357d94bea78666ae9935ff140ece60741c683bffdb27d49ad584
SHA5128cb1a001546740cac457deefccf7c039d2417650dc931d258c83f2a16ef5d55c74212a7b3019349369d9d3edb12ad32e0ea16bf156ffc8f3af855a18b10bddd2
-
Filesize
158KB
MD5eebe3adf8f8d6238a1d4f48ece90c77c
SHA19e63c480d5c967317f0a91679042f2ce457336ae
SHA256977ba9ec4bb99795f63d423d077fc37ba8c4a9a53f94509bbd1f94a74f4d8283
SHA5125f8b7fd1b85a1c50bbd45c972665373d5b81e67c6a770e465f9accf46eddc08419bf40165da7cb520291ebe92e6c40ba90d2ae4bf646a0b6b1039097d7e822bc
-
Filesize
158KB
MD5eebe3adf8f8d6238a1d4f48ece90c77c
SHA19e63c480d5c967317f0a91679042f2ce457336ae
SHA256977ba9ec4bb99795f63d423d077fc37ba8c4a9a53f94509bbd1f94a74f4d8283
SHA5125f8b7fd1b85a1c50bbd45c972665373d5b81e67c6a770e465f9accf46eddc08419bf40165da7cb520291ebe92e6c40ba90d2ae4bf646a0b6b1039097d7e822bc
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD585872423948102f1ee4a91f86e218503
SHA1c65b997406481ce5fe4a128611f47c09e296cc06
SHA256bd1c76c6442a254fe2b93b58daa6e27028ac9a621379851bc9d6404fcde511cd
SHA512cfa98b61dc596a2ab5135443a9802e098111fff25643a2427b59a163f27db782109fdf1b57c4d0985344cb40161c53388a9b44711c77d712ee7738d537d303c0
-
Filesize
106KB
MD585872423948102f1ee4a91f86e218503
SHA1c65b997406481ce5fe4a128611f47c09e296cc06
SHA256bd1c76c6442a254fe2b93b58daa6e27028ac9a621379851bc9d6404fcde511cd
SHA512cfa98b61dc596a2ab5135443a9802e098111fff25643a2427b59a163f27db782109fdf1b57c4d0985344cb40161c53388a9b44711c77d712ee7738d537d303c0
-
Filesize
106KB
MD585872423948102f1ee4a91f86e218503
SHA1c65b997406481ce5fe4a128611f47c09e296cc06
SHA256bd1c76c6442a254fe2b93b58daa6e27028ac9a621379851bc9d6404fcde511cd
SHA512cfa98b61dc596a2ab5135443a9802e098111fff25643a2427b59a163f27db782109fdf1b57c4d0985344cb40161c53388a9b44711c77d712ee7738d537d303c0
-
Filesize
244KB
MD509180d714bc028bc5c7a8819ec3bd8f4
SHA12dc82b887414644fb05dc245e52c825193f6105f
SHA256d6152c40967c755f4600c14bedb865411c82983e41ffd2a00708e57208e6f0a4
SHA51216c4ba0c59d303ae32338c0746bf52a33ac2747948ec0cb6675b8722cf8297bf1f73cc661cf470a193891be1f8355e2cb638cdf4d1ce2f5d9ab8be90c39e8821
-
Filesize
244KB
MD509180d714bc028bc5c7a8819ec3bd8f4
SHA12dc82b887414644fb05dc245e52c825193f6105f
SHA256d6152c40967c755f4600c14bedb865411c82983e41ffd2a00708e57208e6f0a4
SHA51216c4ba0c59d303ae32338c0746bf52a33ac2747948ec0cb6675b8722cf8297bf1f73cc661cf470a193891be1f8355e2cb638cdf4d1ce2f5d9ab8be90c39e8821
-
Filesize
108KB
MD546e22eafc1c0bb38bd6e8595300d7037
SHA1ea2415b24a226a1dd5e5c9fe27f77292fd4f337e
SHA2563b15fb065617f1f6f364c83d08294acb769ed46f2e1de74e8857fadccb4f817b
SHA5128935a1d0c36428dd9320b175b41aac113289f81e3e0c259f1c7ee5d935f4a6cd36f5aa93987ea3d865dfffbffdec8e8bf92f322cf7f375c79190a4e09f98ce7a
-
Filesize
176KB
MD548cb3e5c9c677e72f59d76c464875e9a
SHA14bd3f3e80e2ad4e1617ed1e3262c123ce4d816fa
SHA256f18c1b87307e357d94bea78666ae9935ff140ece60741c683bffdb27d49ad584
SHA5128cb1a001546740cac457deefccf7c039d2417650dc931d258c83f2a16ef5d55c74212a7b3019349369d9d3edb12ad32e0ea16bf156ffc8f3af855a18b10bddd2
-
Filesize
158KB
MD5eebe3adf8f8d6238a1d4f48ece90c77c
SHA19e63c480d5c967317f0a91679042f2ce457336ae
SHA256977ba9ec4bb99795f63d423d077fc37ba8c4a9a53f94509bbd1f94a74f4d8283
SHA5125f8b7fd1b85a1c50bbd45c972665373d5b81e67c6a770e465f9accf46eddc08419bf40165da7cb520291ebe92e6c40ba90d2ae4bf646a0b6b1039097d7e822bc