Analysis
-
max time kernel
45s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe
Resource
win10v2004-20221111-en
General
-
Target
75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe
-
Size
559KB
-
MD5
7e3e661d25b8ef1b25fa703810bc9e82
-
SHA1
c92a9dfaba89707e371eb46cf034d787f3662a0c
-
SHA256
75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469
-
SHA512
7ff468ae39872b9c01a8eca619227127577ab19e58993d99cdc88df277dc95ecc482c1b59f832cd9a395d451a91dc0c7665e3570053bd8be98ed28fe4ff6928a
-
SSDEEP
12288:TPRYzhbfgsMvHdJ/aYqlwC2xbhYbRouevf:OzlfoljqlwCMhYy
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe -
Executes dropped EXE 5 IoCs
pid Process 1640 installd.exe 1584 nethtsrv.exe 632 netupdsrv.exe 676 nethtsrv.exe 2016 netupdsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 1640 installd.exe 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 1584 nethtsrv.exe 1584 nethtsrv.exe 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 676 nethtsrv.exe 676 nethtsrv.exe 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfnapi.dll 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe File created C:\Windows\SysWOW64\hfpapi.dll 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe File created C:\Windows\SysWOW64\installd.exe 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe File created C:\Windows\SysWOW64\nethtsrv.exe 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe File created C:\Windows\SysWOW64\netupdsrv.exe 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 676 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1812 wrote to memory of 908 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 28 PID 1812 wrote to memory of 908 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 28 PID 1812 wrote to memory of 908 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 28 PID 1812 wrote to memory of 908 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 28 PID 908 wrote to memory of 560 908 net.exe 30 PID 908 wrote to memory of 560 908 net.exe 30 PID 908 wrote to memory of 560 908 net.exe 30 PID 908 wrote to memory of 560 908 net.exe 30 PID 1812 wrote to memory of 1916 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 31 PID 1812 wrote to memory of 1916 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 31 PID 1812 wrote to memory of 1916 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 31 PID 1812 wrote to memory of 1916 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 31 PID 1916 wrote to memory of 648 1916 net.exe 33 PID 1916 wrote to memory of 648 1916 net.exe 33 PID 1916 wrote to memory of 648 1916 net.exe 33 PID 1916 wrote to memory of 648 1916 net.exe 33 PID 1812 wrote to memory of 1640 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 34 PID 1812 wrote to memory of 1640 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 34 PID 1812 wrote to memory of 1640 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 34 PID 1812 wrote to memory of 1640 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 34 PID 1812 wrote to memory of 1640 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 34 PID 1812 wrote to memory of 1640 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 34 PID 1812 wrote to memory of 1640 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 34 PID 1812 wrote to memory of 1584 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 36 PID 1812 wrote to memory of 1584 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 36 PID 1812 wrote to memory of 1584 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 36 PID 1812 wrote to memory of 1584 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 36 PID 1812 wrote to memory of 632 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 38 PID 1812 wrote to memory of 632 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 38 PID 1812 wrote to memory of 632 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 38 PID 1812 wrote to memory of 632 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 38 PID 1812 wrote to memory of 632 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 38 PID 1812 wrote to memory of 632 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 38 PID 1812 wrote to memory of 632 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 38 PID 1812 wrote to memory of 1972 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 40 PID 1812 wrote to memory of 1972 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 40 PID 1812 wrote to memory of 1972 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 40 PID 1812 wrote to memory of 1972 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 40 PID 1972 wrote to memory of 1384 1972 net.exe 42 PID 1972 wrote to memory of 1384 1972 net.exe 42 PID 1972 wrote to memory of 1384 1972 net.exe 42 PID 1972 wrote to memory of 1384 1972 net.exe 42 PID 1812 wrote to memory of 1280 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 44 PID 1812 wrote to memory of 1280 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 44 PID 1812 wrote to memory of 1280 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 44 PID 1812 wrote to memory of 1280 1812 75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe 44 PID 1280 wrote to memory of 1308 1280 net.exe 46 PID 1280 wrote to memory of 1308 1280 net.exe 46 PID 1280 wrote to memory of 1308 1280 net.exe 46 PID 1280 wrote to memory of 1308 1280 net.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe"C:\Users\Admin\AppData\Local\Temp\75232147400498e7af92a6de3887b8310003cdeafbbef0ca6c4ad14282804469.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:560
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:648
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1584
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:632
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1384
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1308
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:676
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:2016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD531fb29b55cf22951cb420690ff188d09
SHA1a9198805e59525668478b3df8383f0a38020bcec
SHA256d5dc4f3aed262a8cc277819e3c309c8e6456dc131657e22a441db51c7947775f
SHA512fea4a7c3626eaaf3ee196475edb3ccab14b29ce71c5ed943882adb15f08cdaa336c1db5a0a34bd6b657f26b1e5296fec7066588c4b3d2fd5072aafa8ffc9a6d9
-
Filesize
244KB
MD51562a75787c84e53ad68302f7656f4a4
SHA1452ed12005f38abce567116042f48685ac09560c
SHA256dbe820b3711391c1a9022790b6446d8b4f5236cd0b8eadd28931dce47bdf74a4
SHA512f1e9f5b600f9f28ab763158610fd4dfacb82514031c22cb37a966b3a3ea24b30aa964a8196f19b6efedd619a4f66f6e51f85af503eb64cb5f0fd47168f200b61
-
Filesize
108KB
MD58eae7eb5e65943e8b9cae1844c7b94e3
SHA1871e6031751ea6c04c92a4a2f668c4c5738bc2b7
SHA256075c7e30cac501db58431753d9c3945da96485f8726cda64a95efcc963ba1765
SHA512785dcc8f468285bd89931d62a0729c75c74b8e0bb113ebea28bbedbacaa876ff532acbc1e27de3c2584186069a8b056825c4cd1fb6b4e067b6807757f49406f4
-
Filesize
176KB
MD58523129fca9e030bcf59ba05514e67db
SHA1dcc02749df5b4e3e78234de8e2f06da9133eab3f
SHA25641ed46ef5e2ef11c7253b757949d1a67f3cf5aa39e8eaff171c72e25dea2af7d
SHA51256614e5ea22b72cdcb74b3fcc63a62904939a3a35c6601fa2a396e145ff20b12f19c6482bd4e6975ab3a4562ad2332f5da614f87e2adcb8c98e5b4898cad2f4e
-
Filesize
176KB
MD58523129fca9e030bcf59ba05514e67db
SHA1dcc02749df5b4e3e78234de8e2f06da9133eab3f
SHA25641ed46ef5e2ef11c7253b757949d1a67f3cf5aa39e8eaff171c72e25dea2af7d
SHA51256614e5ea22b72cdcb74b3fcc63a62904939a3a35c6601fa2a396e145ff20b12f19c6482bd4e6975ab3a4562ad2332f5da614f87e2adcb8c98e5b4898cad2f4e
-
Filesize
158KB
MD56200f3b458b42aa39e7213bb1170c903
SHA11ffc647f308017e9bfad8025b23caaeb4557f972
SHA256b1762168fa35d1347795daa6a6c436908973674f5420b14ddc37ce7081b2e745
SHA51249bdcf6bd6a191dac18428df0d50afff06aa3dd2d5e143c3de845cc2fe20a3fde2badb6727b67f216f81f9c3282bd9af1750fc762b03f8c560e65b739f847767
-
Filesize
158KB
MD56200f3b458b42aa39e7213bb1170c903
SHA11ffc647f308017e9bfad8025b23caaeb4557f972
SHA256b1762168fa35d1347795daa6a6c436908973674f5420b14ddc37ce7081b2e745
SHA51249bdcf6bd6a191dac18428df0d50afff06aa3dd2d5e143c3de845cc2fe20a3fde2badb6727b67f216f81f9c3282bd9af1750fc762b03f8c560e65b739f847767
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD531fb29b55cf22951cb420690ff188d09
SHA1a9198805e59525668478b3df8383f0a38020bcec
SHA256d5dc4f3aed262a8cc277819e3c309c8e6456dc131657e22a441db51c7947775f
SHA512fea4a7c3626eaaf3ee196475edb3ccab14b29ce71c5ed943882adb15f08cdaa336c1db5a0a34bd6b657f26b1e5296fec7066588c4b3d2fd5072aafa8ffc9a6d9
-
Filesize
106KB
MD531fb29b55cf22951cb420690ff188d09
SHA1a9198805e59525668478b3df8383f0a38020bcec
SHA256d5dc4f3aed262a8cc277819e3c309c8e6456dc131657e22a441db51c7947775f
SHA512fea4a7c3626eaaf3ee196475edb3ccab14b29ce71c5ed943882adb15f08cdaa336c1db5a0a34bd6b657f26b1e5296fec7066588c4b3d2fd5072aafa8ffc9a6d9
-
Filesize
106KB
MD531fb29b55cf22951cb420690ff188d09
SHA1a9198805e59525668478b3df8383f0a38020bcec
SHA256d5dc4f3aed262a8cc277819e3c309c8e6456dc131657e22a441db51c7947775f
SHA512fea4a7c3626eaaf3ee196475edb3ccab14b29ce71c5ed943882adb15f08cdaa336c1db5a0a34bd6b657f26b1e5296fec7066588c4b3d2fd5072aafa8ffc9a6d9
-
Filesize
244KB
MD51562a75787c84e53ad68302f7656f4a4
SHA1452ed12005f38abce567116042f48685ac09560c
SHA256dbe820b3711391c1a9022790b6446d8b4f5236cd0b8eadd28931dce47bdf74a4
SHA512f1e9f5b600f9f28ab763158610fd4dfacb82514031c22cb37a966b3a3ea24b30aa964a8196f19b6efedd619a4f66f6e51f85af503eb64cb5f0fd47168f200b61
-
Filesize
244KB
MD51562a75787c84e53ad68302f7656f4a4
SHA1452ed12005f38abce567116042f48685ac09560c
SHA256dbe820b3711391c1a9022790b6446d8b4f5236cd0b8eadd28931dce47bdf74a4
SHA512f1e9f5b600f9f28ab763158610fd4dfacb82514031c22cb37a966b3a3ea24b30aa964a8196f19b6efedd619a4f66f6e51f85af503eb64cb5f0fd47168f200b61
-
Filesize
108KB
MD58eae7eb5e65943e8b9cae1844c7b94e3
SHA1871e6031751ea6c04c92a4a2f668c4c5738bc2b7
SHA256075c7e30cac501db58431753d9c3945da96485f8726cda64a95efcc963ba1765
SHA512785dcc8f468285bd89931d62a0729c75c74b8e0bb113ebea28bbedbacaa876ff532acbc1e27de3c2584186069a8b056825c4cd1fb6b4e067b6807757f49406f4
-
Filesize
176KB
MD58523129fca9e030bcf59ba05514e67db
SHA1dcc02749df5b4e3e78234de8e2f06da9133eab3f
SHA25641ed46ef5e2ef11c7253b757949d1a67f3cf5aa39e8eaff171c72e25dea2af7d
SHA51256614e5ea22b72cdcb74b3fcc63a62904939a3a35c6601fa2a396e145ff20b12f19c6482bd4e6975ab3a4562ad2332f5da614f87e2adcb8c98e5b4898cad2f4e
-
Filesize
158KB
MD56200f3b458b42aa39e7213bb1170c903
SHA11ffc647f308017e9bfad8025b23caaeb4557f972
SHA256b1762168fa35d1347795daa6a6c436908973674f5420b14ddc37ce7081b2e745
SHA51249bdcf6bd6a191dac18428df0d50afff06aa3dd2d5e143c3de845cc2fe20a3fde2badb6727b67f216f81f9c3282bd9af1750fc762b03f8c560e65b739f847767