Analysis
-
max time kernel
335s -
max time network
359s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe
Resource
win10v2004-20221111-en
General
-
Target
7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe
-
Size
695KB
-
MD5
25fa3554fd61f7e3a48fd702d61cfd64
-
SHA1
c9a026e1c9483e800fb63aa204e6d513a8c71792
-
SHA256
7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb
-
SHA512
9764a300cca0f938b30ef80b59a9bbd2b9d6426f4c2f9ef8c21739358d4cb4f4f9802c3bf7c2349d3c067365a7cd9bfa5cfd9799b99b9ec88ef81030e651f510
-
SSDEEP
12288:+Abu3fQ+thk6Ezvbfy0+f04GkrYJ7uUxheY+Q/:+AbuPPEzzfis4V4vak
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe -
Executes dropped EXE 5 IoCs
pid Process 3204 installd.exe 4032 nethtsrv.exe 636 netupdsrv.exe 2892 nethtsrv.exe 4436 netupdsrv.exe -
Loads dropped DLL 14 IoCs
pid Process 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 3204 installd.exe 4032 nethtsrv.exe 4032 nethtsrv.exe 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 2892 nethtsrv.exe 2892 nethtsrv.exe 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\installd.exe 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe File created C:\Windows\SysWOW64\nethtsrv.exe 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe File created C:\Windows\SysWOW64\netupdsrv.exe 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe File created C:\Windows\SysWOW64\hfnapi.dll 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe File created C:\Windows\SysWOW64\hfpapi.dll 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2892 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1628 wrote to memory of 756 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 80 PID 1628 wrote to memory of 756 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 80 PID 1628 wrote to memory of 756 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 80 PID 756 wrote to memory of 4516 756 net.exe 82 PID 756 wrote to memory of 4516 756 net.exe 82 PID 756 wrote to memory of 4516 756 net.exe 82 PID 1628 wrote to memory of 4988 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 84 PID 1628 wrote to memory of 4988 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 84 PID 1628 wrote to memory of 4988 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 84 PID 4988 wrote to memory of 5080 4988 net.exe 86 PID 4988 wrote to memory of 5080 4988 net.exe 86 PID 4988 wrote to memory of 5080 4988 net.exe 86 PID 1628 wrote to memory of 3204 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 87 PID 1628 wrote to memory of 3204 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 87 PID 1628 wrote to memory of 3204 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 87 PID 1628 wrote to memory of 4032 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 89 PID 1628 wrote to memory of 4032 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 89 PID 1628 wrote to memory of 4032 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 89 PID 1628 wrote to memory of 636 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 91 PID 1628 wrote to memory of 636 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 91 PID 1628 wrote to memory of 636 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 91 PID 1628 wrote to memory of 2140 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 93 PID 1628 wrote to memory of 2140 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 93 PID 1628 wrote to memory of 2140 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 93 PID 2140 wrote to memory of 4072 2140 net.exe 95 PID 2140 wrote to memory of 4072 2140 net.exe 95 PID 2140 wrote to memory of 4072 2140 net.exe 95 PID 1628 wrote to memory of 4948 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 97 PID 1628 wrote to memory of 4948 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 97 PID 1628 wrote to memory of 4948 1628 7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe 97 PID 4948 wrote to memory of 1044 4948 net.exe 99 PID 4948 wrote to memory of 1044 4948 net.exe 99 PID 4948 wrote to memory of 1044 4948 net.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe"C:\Users\Admin\AppData\Local\Temp\7b12344d91eb57515e994ec388bfb77323655b22760f253eaabd8376e74521bb.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:4516
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:5080
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3204
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4032
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:636
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:4072
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1044
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:4436
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5bc9f218844945b85ffb46b7cced1f9c4
SHA13c0782f1755d36fee8be7ec57faa5ff7b032fdc6
SHA25605ded9393cb4f490fa83a2b22d0ab7abc0ff43dfe7c6ba9da4ce558cb203958b
SHA512b360b1835fa997a3faa0dcd5d88dfaa55963c3a2bf539b08b8b06894c6144652254ec1ad24e6a93045232005d183d2a36706fd5ba013228bda961fa6c41a2d91
-
Filesize
106KB
MD5bc9f218844945b85ffb46b7cced1f9c4
SHA13c0782f1755d36fee8be7ec57faa5ff7b032fdc6
SHA25605ded9393cb4f490fa83a2b22d0ab7abc0ff43dfe7c6ba9da4ce558cb203958b
SHA512b360b1835fa997a3faa0dcd5d88dfaa55963c3a2bf539b08b8b06894c6144652254ec1ad24e6a93045232005d183d2a36706fd5ba013228bda961fa6c41a2d91
-
Filesize
106KB
MD5bc9f218844945b85ffb46b7cced1f9c4
SHA13c0782f1755d36fee8be7ec57faa5ff7b032fdc6
SHA25605ded9393cb4f490fa83a2b22d0ab7abc0ff43dfe7c6ba9da4ce558cb203958b
SHA512b360b1835fa997a3faa0dcd5d88dfaa55963c3a2bf539b08b8b06894c6144652254ec1ad24e6a93045232005d183d2a36706fd5ba013228bda961fa6c41a2d91
-
Filesize
106KB
MD5bc9f218844945b85ffb46b7cced1f9c4
SHA13c0782f1755d36fee8be7ec57faa5ff7b032fdc6
SHA25605ded9393cb4f490fa83a2b22d0ab7abc0ff43dfe7c6ba9da4ce558cb203958b
SHA512b360b1835fa997a3faa0dcd5d88dfaa55963c3a2bf539b08b8b06894c6144652254ec1ad24e6a93045232005d183d2a36706fd5ba013228bda961fa6c41a2d91
-
Filesize
241KB
MD5f2af2e586bcd548df8282a3f482b0df5
SHA15b5c98588c6fa9feced7a7ae6768f63668421c04
SHA2561b9aa085e69a03c05ee19166e99e41173d97c43dff42f37b8056ae6005a52784
SHA5120660a52131b56d9b07ba351a0d5af95d22662d089b2372bc752bedb4a059577a966ef670a97e7f9d4231762042181f433509a9e2dfa439e99665da9af2b5be42
-
Filesize
241KB
MD5f2af2e586bcd548df8282a3f482b0df5
SHA15b5c98588c6fa9feced7a7ae6768f63668421c04
SHA2561b9aa085e69a03c05ee19166e99e41173d97c43dff42f37b8056ae6005a52784
SHA5120660a52131b56d9b07ba351a0d5af95d22662d089b2372bc752bedb4a059577a966ef670a97e7f9d4231762042181f433509a9e2dfa439e99665da9af2b5be42
-
Filesize
241KB
MD5f2af2e586bcd548df8282a3f482b0df5
SHA15b5c98588c6fa9feced7a7ae6768f63668421c04
SHA2561b9aa085e69a03c05ee19166e99e41173d97c43dff42f37b8056ae6005a52784
SHA5120660a52131b56d9b07ba351a0d5af95d22662d089b2372bc752bedb4a059577a966ef670a97e7f9d4231762042181f433509a9e2dfa439e99665da9af2b5be42
-
Filesize
108KB
MD5ba9831f1f8497c390406484c3be59e6a
SHA1d3773d11f56132084ee5f49954dbef5e947a6c0c
SHA256c82cacf08ac3eabfef61b0ce7d480eb3481697cee7d38f2a88845c98c7168cb3
SHA51278c198d7c4074a5650e60427790e10050753b8651412081033a86a5526b201f0b90cceadae0a334cd97cdbfc01f03d96eeb1656ff61054013c7450dac6608dbf
-
Filesize
108KB
MD5ba9831f1f8497c390406484c3be59e6a
SHA1d3773d11f56132084ee5f49954dbef5e947a6c0c
SHA256c82cacf08ac3eabfef61b0ce7d480eb3481697cee7d38f2a88845c98c7168cb3
SHA51278c198d7c4074a5650e60427790e10050753b8651412081033a86a5526b201f0b90cceadae0a334cd97cdbfc01f03d96eeb1656ff61054013c7450dac6608dbf
-
Filesize
176KB
MD542c482fcfcc0ad664c6af09d5efa386a
SHA11f933a6c140dd4e00e9fe021b3da15567352d814
SHA256f0c6235e4e0d9efca48634d2a721fe359768029d2e4798783df03f501e381413
SHA5124f7e77f3f6e2c016e0585dcd1dfcc7a8e247e7b109cdefd1b16677c36e736780ea6162e567dc960bb7a07a8756b473a18e54c58ea9916534d2e0e39521fca7b9
-
Filesize
176KB
MD542c482fcfcc0ad664c6af09d5efa386a
SHA11f933a6c140dd4e00e9fe021b3da15567352d814
SHA256f0c6235e4e0d9efca48634d2a721fe359768029d2e4798783df03f501e381413
SHA5124f7e77f3f6e2c016e0585dcd1dfcc7a8e247e7b109cdefd1b16677c36e736780ea6162e567dc960bb7a07a8756b473a18e54c58ea9916534d2e0e39521fca7b9
-
Filesize
176KB
MD542c482fcfcc0ad664c6af09d5efa386a
SHA11f933a6c140dd4e00e9fe021b3da15567352d814
SHA256f0c6235e4e0d9efca48634d2a721fe359768029d2e4798783df03f501e381413
SHA5124f7e77f3f6e2c016e0585dcd1dfcc7a8e247e7b109cdefd1b16677c36e736780ea6162e567dc960bb7a07a8756b473a18e54c58ea9916534d2e0e39521fca7b9
-
Filesize
159KB
MD579c29c5c866a6b119122aba8bcdac3a5
SHA19b6583a25c6d15a937965722774cd4f1d92c66d1
SHA25660cd4a0fe82cdb0c3da8bec9084b8f94834d24e4a3d0ff8912b3e5606c2e417e
SHA5128d950d311811578877b4eeffa250958c28ad230e1224a5353d0dec25a2613727aced4a7ba8b72391b6e10395b3478aafdcfb42c9cfa21dc71d22f550d9b9c9c3
-
Filesize
159KB
MD579c29c5c866a6b119122aba8bcdac3a5
SHA19b6583a25c6d15a937965722774cd4f1d92c66d1
SHA25660cd4a0fe82cdb0c3da8bec9084b8f94834d24e4a3d0ff8912b3e5606c2e417e
SHA5128d950d311811578877b4eeffa250958c28ad230e1224a5353d0dec25a2613727aced4a7ba8b72391b6e10395b3478aafdcfb42c9cfa21dc71d22f550d9b9c9c3
-
Filesize
159KB
MD579c29c5c866a6b119122aba8bcdac3a5
SHA19b6583a25c6d15a937965722774cd4f1d92c66d1
SHA25660cd4a0fe82cdb0c3da8bec9084b8f94834d24e4a3d0ff8912b3e5606c2e417e
SHA5128d950d311811578877b4eeffa250958c28ad230e1224a5353d0dec25a2613727aced4a7ba8b72391b6e10395b3478aafdcfb42c9cfa21dc71d22f550d9b9c9c3