Analysis
-
max time kernel
48s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe
Resource
win10v2004-20220901-en
General
-
Target
c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe
-
Size
562KB
-
MD5
88311a93f019a4d98c78e5575138c3aa
-
SHA1
a27ed197af3fd049aaf9534df67ced0ca0ee23ae
-
SHA256
c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311
-
SHA512
db7f9503f2ff76e3fc7d5ead91db767ef15802eb17161d099352faefba828857853fe64d92112759c60aa414bb3d50137ee9a957c31cc3b787c2f1777d42b625
-
SSDEEP
12288:TPRYzHbf7jetRfL0b66FN+806OgWAZJWHAoFvwG9evcX:Oz7f/GT0bTNd/h7WgnG9kc
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe -
Executes dropped EXE 5 IoCs
pid Process 700 installd.exe 1660 nethtsrv.exe 688 netupdsrv.exe 1272 nethtsrv.exe 988 netupdsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 700 installd.exe 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 1660 nethtsrv.exe 1660 nethtsrv.exe 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 1272 nethtsrv.exe 1272 nethtsrv.exe 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\nethtsrv.exe c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe File created C:\Windows\SysWOW64\netupdsrv.exe c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe File created C:\Windows\SysWOW64\hfnapi.dll c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe File created C:\Windows\SysWOW64\hfpapi.dll c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe File created C:\Windows\SysWOW64\installd.exe c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1272 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1544 wrote to memory of 1464 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 26 PID 1544 wrote to memory of 1464 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 26 PID 1544 wrote to memory of 1464 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 26 PID 1544 wrote to memory of 1464 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 26 PID 1464 wrote to memory of 1720 1464 net.exe 28 PID 1464 wrote to memory of 1720 1464 net.exe 28 PID 1464 wrote to memory of 1720 1464 net.exe 28 PID 1464 wrote to memory of 1720 1464 net.exe 28 PID 1544 wrote to memory of 1472 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 29 PID 1544 wrote to memory of 1472 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 29 PID 1544 wrote to memory of 1472 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 29 PID 1544 wrote to memory of 1472 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 29 PID 1472 wrote to memory of 536 1472 net.exe 31 PID 1472 wrote to memory of 536 1472 net.exe 31 PID 1472 wrote to memory of 536 1472 net.exe 31 PID 1472 wrote to memory of 536 1472 net.exe 31 PID 1544 wrote to memory of 700 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 32 PID 1544 wrote to memory of 700 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 32 PID 1544 wrote to memory of 700 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 32 PID 1544 wrote to memory of 700 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 32 PID 1544 wrote to memory of 700 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 32 PID 1544 wrote to memory of 700 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 32 PID 1544 wrote to memory of 700 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 32 PID 1544 wrote to memory of 1660 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 34 PID 1544 wrote to memory of 1660 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 34 PID 1544 wrote to memory of 1660 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 34 PID 1544 wrote to memory of 1660 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 34 PID 1544 wrote to memory of 688 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 36 PID 1544 wrote to memory of 688 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 36 PID 1544 wrote to memory of 688 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 36 PID 1544 wrote to memory of 688 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 36 PID 1544 wrote to memory of 688 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 36 PID 1544 wrote to memory of 688 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 36 PID 1544 wrote to memory of 688 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 36 PID 1544 wrote to memory of 2008 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 38 PID 1544 wrote to memory of 2008 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 38 PID 1544 wrote to memory of 2008 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 38 PID 1544 wrote to memory of 2008 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 38 PID 2008 wrote to memory of 1732 2008 net.exe 40 PID 2008 wrote to memory of 1732 2008 net.exe 40 PID 2008 wrote to memory of 1732 2008 net.exe 40 PID 2008 wrote to memory of 1732 2008 net.exe 40 PID 1544 wrote to memory of 784 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 42 PID 1544 wrote to memory of 784 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 42 PID 1544 wrote to memory of 784 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 42 PID 1544 wrote to memory of 784 1544 c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe 42 PID 784 wrote to memory of 1956 784 net.exe 44 PID 784 wrote to memory of 1956 784 net.exe 44 PID 784 wrote to memory of 1956 784 net.exe 44 PID 784 wrote to memory of 1956 784 net.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe"C:\Users\Admin\AppData\Local\Temp\c2f8c68b9da3ec34c38920aae7868a2104b410e1854ad7cb0e1df86922ddf311.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1720
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:536
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:700
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1660
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:688
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1732
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1956
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:988
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD52f53bd78c9c944ebb26955fcb61a85f2
SHA124a0dd0fa0f8b2cc5c325c9313284a96b434cfff
SHA25675e47069938963f38791fc82edebd111e292b52b8187afe776443a0e163b2019
SHA512f6ce8b9816e7ee688dc32f7b2487fe7a41097bfe61065be46ea6d91e961c3dc7faed87d750196bb17a9a707a6240f2365b797cacc857bbe86b972a4bffcc3333
-
Filesize
244KB
MD5ebd4f81266d702f302d279b5dd9c43fe
SHA16ca106e469dd61e589ff7755963835c658580312
SHA25687624ebaf5330730aa9a07590b19bfb53ee1e1f41c06cac485bd6663fd0d94e7
SHA512569626e450a8b0f90e707de1e6ad0626116c03a60289c7959b920ec163624f4f53971bbfdbea54e799e1c48491b3bf7a8039ff3e3608c37620a76bb14dd418bf
-
Filesize
108KB
MD52d7fd7b67ebad388cd6f8cafe61b2205
SHA1b883565a8c9362dfcd536e837737b175ec738c8b
SHA256956cff26c6efcfdc14f2a85c7112331f97d772bcde821c8922f413328ea2e532
SHA51219b8afa682e44b7aec2c9f1284cfddc10d95f2152f4ab20b42aedc4aedc44eb661ece1c7f898d5e9e4576f6d00257449dbbfe5cc4f1253b4d18fb34c483aa75b
-
Filesize
176KB
MD55199c5a806c0f37cf5621e4f2484ebdf
SHA1c206bb63783650da8a4b24af0b119b038cb2b87f
SHA2565200572d735b430cb107e5ec6d8823bcab9acb97d759c90364aa9bd456f18cae
SHA512699a06b980dcaa0519c5553b496cc6c0cbd974d061b23e3e4802fc3b36ebc29e4744388f260b4ac1f2aba01c1b88dd05ac14e3c3f2dc73215b3207ee85bc06c4
-
Filesize
176KB
MD55199c5a806c0f37cf5621e4f2484ebdf
SHA1c206bb63783650da8a4b24af0b119b038cb2b87f
SHA2565200572d735b430cb107e5ec6d8823bcab9acb97d759c90364aa9bd456f18cae
SHA512699a06b980dcaa0519c5553b496cc6c0cbd974d061b23e3e4802fc3b36ebc29e4744388f260b4ac1f2aba01c1b88dd05ac14e3c3f2dc73215b3207ee85bc06c4
-
Filesize
158KB
MD5bd446275605e90ce7d006ac0e9797f57
SHA1f4e79c41e295542cf9322f2793a5abbf3d1300b0
SHA256055d1f286a0cd80a77cdbcbfc8ebf4c61c31af27db0b75106540282dbf8065d4
SHA512d4f9a423f8b6645859e107ead2abf1ac335c5ad95e59b2faf6d39722f5f81ee77fab4f18ca13d8dd6a00e9552b2e35d2ab8c42b08b7cc3fd34b57a4ce940dcf3
-
Filesize
158KB
MD5bd446275605e90ce7d006ac0e9797f57
SHA1f4e79c41e295542cf9322f2793a5abbf3d1300b0
SHA256055d1f286a0cd80a77cdbcbfc8ebf4c61c31af27db0b75106540282dbf8065d4
SHA512d4f9a423f8b6645859e107ead2abf1ac335c5ad95e59b2faf6d39722f5f81ee77fab4f18ca13d8dd6a00e9552b2e35d2ab8c42b08b7cc3fd34b57a4ce940dcf3
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD52f53bd78c9c944ebb26955fcb61a85f2
SHA124a0dd0fa0f8b2cc5c325c9313284a96b434cfff
SHA25675e47069938963f38791fc82edebd111e292b52b8187afe776443a0e163b2019
SHA512f6ce8b9816e7ee688dc32f7b2487fe7a41097bfe61065be46ea6d91e961c3dc7faed87d750196bb17a9a707a6240f2365b797cacc857bbe86b972a4bffcc3333
-
Filesize
106KB
MD52f53bd78c9c944ebb26955fcb61a85f2
SHA124a0dd0fa0f8b2cc5c325c9313284a96b434cfff
SHA25675e47069938963f38791fc82edebd111e292b52b8187afe776443a0e163b2019
SHA512f6ce8b9816e7ee688dc32f7b2487fe7a41097bfe61065be46ea6d91e961c3dc7faed87d750196bb17a9a707a6240f2365b797cacc857bbe86b972a4bffcc3333
-
Filesize
106KB
MD52f53bd78c9c944ebb26955fcb61a85f2
SHA124a0dd0fa0f8b2cc5c325c9313284a96b434cfff
SHA25675e47069938963f38791fc82edebd111e292b52b8187afe776443a0e163b2019
SHA512f6ce8b9816e7ee688dc32f7b2487fe7a41097bfe61065be46ea6d91e961c3dc7faed87d750196bb17a9a707a6240f2365b797cacc857bbe86b972a4bffcc3333
-
Filesize
244KB
MD5ebd4f81266d702f302d279b5dd9c43fe
SHA16ca106e469dd61e589ff7755963835c658580312
SHA25687624ebaf5330730aa9a07590b19bfb53ee1e1f41c06cac485bd6663fd0d94e7
SHA512569626e450a8b0f90e707de1e6ad0626116c03a60289c7959b920ec163624f4f53971bbfdbea54e799e1c48491b3bf7a8039ff3e3608c37620a76bb14dd418bf
-
Filesize
244KB
MD5ebd4f81266d702f302d279b5dd9c43fe
SHA16ca106e469dd61e589ff7755963835c658580312
SHA25687624ebaf5330730aa9a07590b19bfb53ee1e1f41c06cac485bd6663fd0d94e7
SHA512569626e450a8b0f90e707de1e6ad0626116c03a60289c7959b920ec163624f4f53971bbfdbea54e799e1c48491b3bf7a8039ff3e3608c37620a76bb14dd418bf
-
Filesize
108KB
MD52d7fd7b67ebad388cd6f8cafe61b2205
SHA1b883565a8c9362dfcd536e837737b175ec738c8b
SHA256956cff26c6efcfdc14f2a85c7112331f97d772bcde821c8922f413328ea2e532
SHA51219b8afa682e44b7aec2c9f1284cfddc10d95f2152f4ab20b42aedc4aedc44eb661ece1c7f898d5e9e4576f6d00257449dbbfe5cc4f1253b4d18fb34c483aa75b
-
Filesize
176KB
MD55199c5a806c0f37cf5621e4f2484ebdf
SHA1c206bb63783650da8a4b24af0b119b038cb2b87f
SHA2565200572d735b430cb107e5ec6d8823bcab9acb97d759c90364aa9bd456f18cae
SHA512699a06b980dcaa0519c5553b496cc6c0cbd974d061b23e3e4802fc3b36ebc29e4744388f260b4ac1f2aba01c1b88dd05ac14e3c3f2dc73215b3207ee85bc06c4
-
Filesize
158KB
MD5bd446275605e90ce7d006ac0e9797f57
SHA1f4e79c41e295542cf9322f2793a5abbf3d1300b0
SHA256055d1f286a0cd80a77cdbcbfc8ebf4c61c31af27db0b75106540282dbf8065d4
SHA512d4f9a423f8b6645859e107ead2abf1ac335c5ad95e59b2faf6d39722f5f81ee77fab4f18ca13d8dd6a00e9552b2e35d2ab8c42b08b7cc3fd34b57a4ce940dcf3