Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 13:34
Static task
static1
Behavioral task
behavioral1
Sample
e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe
Resource
win10v2004-20221111-en
General
-
Target
e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe
-
Size
561KB
-
MD5
031860ce2deda979147194025ae6c831
-
SHA1
e7fa19037f2b55538c2d25ac20c657ac21f8f933
-
SHA256
e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d
-
SHA512
fe2f6dea1761d54fe5800e21afde444ab3cf89d021d0fb04b71bc30a4fca8a336418e3f456176496736da045c352568e40c168f481a01279ad7f0448a20b416c
-
SSDEEP
12288:6PRYzebfl1oUt/Macwzc2LBfOMVIP7f3C5dAZp7wVT5wzgq:nzyf79IwzfLBGQMbC5dAZWVTQgq
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe -
Executes dropped EXE 5 IoCs
pid Process 560 installd.exe 1452 nethtsrv.exe 596 netupdsrv.exe 1740 nethtsrv.exe 432 netupdsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 560 installd.exe 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 1452 nethtsrv.exe 1452 nethtsrv.exe 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 1740 nethtsrv.exe 1740 nethtsrv.exe 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfnapi.dll e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe File created C:\Windows\SysWOW64\hfpapi.dll e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe File created C:\Windows\SysWOW64\installd.exe e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe File created C:\Windows\SysWOW64\nethtsrv.exe e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe File created C:\Windows\SysWOW64\netupdsrv.exe e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1740 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1688 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 27 PID 2032 wrote to memory of 1688 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 27 PID 2032 wrote to memory of 1688 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 27 PID 2032 wrote to memory of 1688 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 27 PID 1688 wrote to memory of 1552 1688 net.exe 29 PID 1688 wrote to memory of 1552 1688 net.exe 29 PID 1688 wrote to memory of 1552 1688 net.exe 29 PID 1688 wrote to memory of 1552 1688 net.exe 29 PID 2032 wrote to memory of 976 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 30 PID 2032 wrote to memory of 976 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 30 PID 2032 wrote to memory of 976 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 30 PID 2032 wrote to memory of 976 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 30 PID 976 wrote to memory of 1880 976 net.exe 32 PID 976 wrote to memory of 1880 976 net.exe 32 PID 976 wrote to memory of 1880 976 net.exe 32 PID 976 wrote to memory of 1880 976 net.exe 32 PID 2032 wrote to memory of 560 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 33 PID 2032 wrote to memory of 560 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 33 PID 2032 wrote to memory of 560 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 33 PID 2032 wrote to memory of 560 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 33 PID 2032 wrote to memory of 560 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 33 PID 2032 wrote to memory of 560 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 33 PID 2032 wrote to memory of 560 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 33 PID 2032 wrote to memory of 1452 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 35 PID 2032 wrote to memory of 1452 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 35 PID 2032 wrote to memory of 1452 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 35 PID 2032 wrote to memory of 1452 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 35 PID 2032 wrote to memory of 596 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 37 PID 2032 wrote to memory of 596 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 37 PID 2032 wrote to memory of 596 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 37 PID 2032 wrote to memory of 596 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 37 PID 2032 wrote to memory of 596 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 37 PID 2032 wrote to memory of 596 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 37 PID 2032 wrote to memory of 596 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 37 PID 2032 wrote to memory of 2000 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 39 PID 2032 wrote to memory of 2000 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 39 PID 2032 wrote to memory of 2000 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 39 PID 2032 wrote to memory of 2000 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 39 PID 2000 wrote to memory of 1912 2000 net.exe 41 PID 2000 wrote to memory of 1912 2000 net.exe 41 PID 2000 wrote to memory of 1912 2000 net.exe 41 PID 2000 wrote to memory of 1912 2000 net.exe 41 PID 2032 wrote to memory of 860 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 43 PID 2032 wrote to memory of 860 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 43 PID 2032 wrote to memory of 860 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 43 PID 2032 wrote to memory of 860 2032 e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe 43 PID 860 wrote to memory of 1952 860 net.exe 45 PID 860 wrote to memory of 1952 860 net.exe 45 PID 860 wrote to memory of 1952 860 net.exe 45 PID 860 wrote to memory of 1952 860 net.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe"C:\Users\Admin\AppData\Local\Temp\e0b582a3a4246df2f78dcd091a33c4c3c82225f19e174789c8b400954916174d.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1552
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1880
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:560
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1452
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:596
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1912
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1952
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:432
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD53cd0ec27ff02bc0d80454f6a5693eb01
SHA1e7dba86a27e582244174b57856d6609e62fd0fbc
SHA2568c3344e815a66f2f0f2a088b4efa01013c42e32a67cefe531513a415619ee847
SHA51239ddfeff3b06ab76478a5e328720b90459419d73e30470bc016078451065cf8aff88dd887dcc2104d7da9ab31c1ededf14e7c780d2114592331efab93f77c10c
-
Filesize
241KB
MD502f212fc80a17d2ccbc2f5d9d8f3c454
SHA136999267a8d269c67fbf87a0c4f6c87a6e8b3520
SHA2560102200e8e25237e5865b85053f0cf2d641571875e4ad20374cb6cd4e4df7e14
SHA512739954aa3219f259aa7435b630c742603b9a196f845961b1517c917f8a77b3fc8d3295669cdd5492cef477060114bbe3ea134090b786bb3c0840df801d51bc0e
-
Filesize
108KB
MD5ef418bd3447225914ddcf1653ec2582a
SHA1bdd4e3e76bb4a2345835067eecd5b7c1965d64e8
SHA25655cb5715cb8bda6d3e0b6adf31b13328709842de5b58b3f21f686df3bc07b75a
SHA51276977d5be4b82beead3eca25b317a5df2854770584f3e541f0c4f53aaac9be88bde8fcd8950c099b4f17e6e79aefab2cb057d8375c96abcb9bb990fc9dc6e2c8
-
Filesize
176KB
MD5708c05db5802a1d963ae3760b1d616d4
SHA1958aa25818f0d5f43f0965144a46621177000200
SHA256ce34df2b7d6f93698190963c001939f80b3e777c4eeb4449190929da0222673e
SHA512945e3ad8c24d287dff29956d7a7d05f8f3f3d52554395bb3f5a8fccd0d9f6b5245851aebd2b1615b0614930d6e1ffd985c8a4c6dad5c078fb4c5afb44e29f30c
-
Filesize
176KB
MD5708c05db5802a1d963ae3760b1d616d4
SHA1958aa25818f0d5f43f0965144a46621177000200
SHA256ce34df2b7d6f93698190963c001939f80b3e777c4eeb4449190929da0222673e
SHA512945e3ad8c24d287dff29956d7a7d05f8f3f3d52554395bb3f5a8fccd0d9f6b5245851aebd2b1615b0614930d6e1ffd985c8a4c6dad5c078fb4c5afb44e29f30c
-
Filesize
159KB
MD520a61a7cb9a947aa8c297a9182fdc1af
SHA186c7b496cfbd7123623d2a5e0d4dc44a406b0f06
SHA25620c9280e05b71ee1e5da69f9e8bad227edef216bae81d85e86936d112128b8f4
SHA51206dc046b95e8ed23e161d30b7b3bbc55d6823bc10bc84e3d4766d83178adfc45fb096a99dfaf6d5abb02467e1109cb3b9294e18bcbe8992ddde5b809a2fa3cbc
-
Filesize
159KB
MD520a61a7cb9a947aa8c297a9182fdc1af
SHA186c7b496cfbd7123623d2a5e0d4dc44a406b0f06
SHA25620c9280e05b71ee1e5da69f9e8bad227edef216bae81d85e86936d112128b8f4
SHA51206dc046b95e8ed23e161d30b7b3bbc55d6823bc10bc84e3d4766d83178adfc45fb096a99dfaf6d5abb02467e1109cb3b9294e18bcbe8992ddde5b809a2fa3cbc
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD53cd0ec27ff02bc0d80454f6a5693eb01
SHA1e7dba86a27e582244174b57856d6609e62fd0fbc
SHA2568c3344e815a66f2f0f2a088b4efa01013c42e32a67cefe531513a415619ee847
SHA51239ddfeff3b06ab76478a5e328720b90459419d73e30470bc016078451065cf8aff88dd887dcc2104d7da9ab31c1ededf14e7c780d2114592331efab93f77c10c
-
Filesize
106KB
MD53cd0ec27ff02bc0d80454f6a5693eb01
SHA1e7dba86a27e582244174b57856d6609e62fd0fbc
SHA2568c3344e815a66f2f0f2a088b4efa01013c42e32a67cefe531513a415619ee847
SHA51239ddfeff3b06ab76478a5e328720b90459419d73e30470bc016078451065cf8aff88dd887dcc2104d7da9ab31c1ededf14e7c780d2114592331efab93f77c10c
-
Filesize
106KB
MD53cd0ec27ff02bc0d80454f6a5693eb01
SHA1e7dba86a27e582244174b57856d6609e62fd0fbc
SHA2568c3344e815a66f2f0f2a088b4efa01013c42e32a67cefe531513a415619ee847
SHA51239ddfeff3b06ab76478a5e328720b90459419d73e30470bc016078451065cf8aff88dd887dcc2104d7da9ab31c1ededf14e7c780d2114592331efab93f77c10c
-
Filesize
241KB
MD502f212fc80a17d2ccbc2f5d9d8f3c454
SHA136999267a8d269c67fbf87a0c4f6c87a6e8b3520
SHA2560102200e8e25237e5865b85053f0cf2d641571875e4ad20374cb6cd4e4df7e14
SHA512739954aa3219f259aa7435b630c742603b9a196f845961b1517c917f8a77b3fc8d3295669cdd5492cef477060114bbe3ea134090b786bb3c0840df801d51bc0e
-
Filesize
241KB
MD502f212fc80a17d2ccbc2f5d9d8f3c454
SHA136999267a8d269c67fbf87a0c4f6c87a6e8b3520
SHA2560102200e8e25237e5865b85053f0cf2d641571875e4ad20374cb6cd4e4df7e14
SHA512739954aa3219f259aa7435b630c742603b9a196f845961b1517c917f8a77b3fc8d3295669cdd5492cef477060114bbe3ea134090b786bb3c0840df801d51bc0e
-
Filesize
108KB
MD5ef418bd3447225914ddcf1653ec2582a
SHA1bdd4e3e76bb4a2345835067eecd5b7c1965d64e8
SHA25655cb5715cb8bda6d3e0b6adf31b13328709842de5b58b3f21f686df3bc07b75a
SHA51276977d5be4b82beead3eca25b317a5df2854770584f3e541f0c4f53aaac9be88bde8fcd8950c099b4f17e6e79aefab2cb057d8375c96abcb9bb990fc9dc6e2c8
-
Filesize
176KB
MD5708c05db5802a1d963ae3760b1d616d4
SHA1958aa25818f0d5f43f0965144a46621177000200
SHA256ce34df2b7d6f93698190963c001939f80b3e777c4eeb4449190929da0222673e
SHA512945e3ad8c24d287dff29956d7a7d05f8f3f3d52554395bb3f5a8fccd0d9f6b5245851aebd2b1615b0614930d6e1ffd985c8a4c6dad5c078fb4c5afb44e29f30c
-
Filesize
159KB
MD520a61a7cb9a947aa8c297a9182fdc1af
SHA186c7b496cfbd7123623d2a5e0d4dc44a406b0f06
SHA25620c9280e05b71ee1e5da69f9e8bad227edef216bae81d85e86936d112128b8f4
SHA51206dc046b95e8ed23e161d30b7b3bbc55d6823bc10bc84e3d4766d83178adfc45fb096a99dfaf6d5abb02467e1109cb3b9294e18bcbe8992ddde5b809a2fa3cbc