Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
22s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe
Resource
win10v2004-20220812-en
General
-
Target
788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe
-
Size
830KB
-
MD5
45d1ffbff447f320bc5d62258b5c3a18
-
SHA1
2fa394f50fb8e7ec5aea9dca0f62241babf33847
-
SHA256
788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d
-
SHA512
887472a9d94bcc8598faab3dc2ccbe9d31d6c2f0ed7d5db6e3e919d784ed80f3013b55bbf1fa48c0a125e160f4659c1440b05a93b16dfbfccd290de8b64af3b4
-
SSDEEP
24576:frfGR2wDeRMTC9rdbJlFxMXkSV9QWW+qO3BtE:fYYRMTErdO9QWlqMtE
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe -
Executes dropped EXE 5 IoCs
pid Process 1800 installd.exe 340 nethtsrv.exe 388 netupdsrv.exe 1108 nethtsrv.exe 980 netupdsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 1800 installd.exe 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 340 nethtsrv.exe 340 nethtsrv.exe 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 1108 nethtsrv.exe 1108 nethtsrv.exe 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfnapi.dll 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe File created C:\Windows\SysWOW64\hfpapi.dll 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe File created C:\Windows\SysWOW64\installd.exe 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe File created C:\Windows\SysWOW64\nethtsrv.exe 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe File created C:\Windows\SysWOW64\netupdsrv.exe 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1108 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1660 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 28 PID 1948 wrote to memory of 1660 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 28 PID 1948 wrote to memory of 1660 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 28 PID 1948 wrote to memory of 1660 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 28 PID 1660 wrote to memory of 1496 1660 net.exe 30 PID 1660 wrote to memory of 1496 1660 net.exe 30 PID 1660 wrote to memory of 1496 1660 net.exe 30 PID 1660 wrote to memory of 1496 1660 net.exe 30 PID 1948 wrote to memory of 1552 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 31 PID 1948 wrote to memory of 1552 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 31 PID 1948 wrote to memory of 1552 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 31 PID 1948 wrote to memory of 1552 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 31 PID 1552 wrote to memory of 968 1552 net.exe 33 PID 1552 wrote to memory of 968 1552 net.exe 33 PID 1552 wrote to memory of 968 1552 net.exe 33 PID 1552 wrote to memory of 968 1552 net.exe 33 PID 1948 wrote to memory of 1800 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 34 PID 1948 wrote to memory of 1800 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 34 PID 1948 wrote to memory of 1800 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 34 PID 1948 wrote to memory of 1800 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 34 PID 1948 wrote to memory of 1800 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 34 PID 1948 wrote to memory of 1800 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 34 PID 1948 wrote to memory of 1800 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 34 PID 1948 wrote to memory of 340 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 36 PID 1948 wrote to memory of 340 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 36 PID 1948 wrote to memory of 340 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 36 PID 1948 wrote to memory of 340 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 36 PID 1948 wrote to memory of 388 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 38 PID 1948 wrote to memory of 388 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 38 PID 1948 wrote to memory of 388 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 38 PID 1948 wrote to memory of 388 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 38 PID 1948 wrote to memory of 388 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 38 PID 1948 wrote to memory of 388 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 38 PID 1948 wrote to memory of 388 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 38 PID 1948 wrote to memory of 684 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 40 PID 1948 wrote to memory of 684 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 40 PID 1948 wrote to memory of 684 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 40 PID 1948 wrote to memory of 684 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 40 PID 684 wrote to memory of 1096 684 net.exe 42 PID 684 wrote to memory of 1096 684 net.exe 42 PID 684 wrote to memory of 1096 684 net.exe 42 PID 684 wrote to memory of 1096 684 net.exe 42 PID 1948 wrote to memory of 1440 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 44 PID 1948 wrote to memory of 1440 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 44 PID 1948 wrote to memory of 1440 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 44 PID 1948 wrote to memory of 1440 1948 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 44 PID 1440 wrote to memory of 364 1440 net.exe 46 PID 1440 wrote to memory of 364 1440 net.exe 46 PID 1440 wrote to memory of 364 1440 net.exe 46 PID 1440 wrote to memory of 364 1440 net.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe"C:\Users\Admin\AppData\Local\Temp\788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1496
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:968
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1800
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:340
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:388
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1096
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:364
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:980
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD577b39da07b68cecbb6f712e74802594a
SHA179e2361ca2328306379b60c20091a9b362bae5a2
SHA25699b74b5058df5339bb1422a331cc549d55d191e091646297b0ca05238efc6387
SHA5129cf4a44a05ee619aba6946ec2585d0bb255e5947d4ff376dc543ded8f309a71424ee54d364e6e6456156e6dbedc89698fb5897203f3891d7c5788eb44d877b4f
-
Filesize
427KB
MD576c8f5726a589c7aee26cae35d061206
SHA11e0af5f5c411b7a0260220eb9df7c27bcf2e168b
SHA2562a2f5cf8467f72b575f5d08607ebcd21976730fc769f9369279e0ade739f3f82
SHA512b83db88f8dfabbd96e903bd597e973dd041565beb7de1111a52076a50127634b1f578471d79792d0b6891abda53cc9a579418814634ac4e0b72246f2ce908aaa
-
Filesize
137KB
MD55a018c0b95420a1b2854154b64c5563b
SHA1ba116ccc93fe4727dfdbafd6776d6bec6a031985
SHA25679464fc81646103052d8c39b566c3206f0a9455cabfb9c3aa3208a6927bb09ed
SHA512cf9930ffad27f6efa682db2363c87ac85fc6525f100328fa828b852f617067c3fa50a837dfa9c07a577f5abfacdc6c18ccc05608fc8d9c22a72b83da5fd467a4
-
Filesize
330KB
MD5cb51e92ba7e6275903977022031df6b8
SHA186dfbd64efd2fe890df60b5fd617b96d18f6a21c
SHA25679e1bec98dcb77022f436a7d9a46afc1f67402f3627092c7b708a3a7651b83a4
SHA512b496d63f81e1f6150042ae775e9ff04bd9030e0976f74e8ac4912c4d63ff9450b6c1b025c63e9cad7fac12553167b60b794c5fbb5218a0cced77118894758be4
-
Filesize
330KB
MD5cb51e92ba7e6275903977022031df6b8
SHA186dfbd64efd2fe890df60b5fd617b96d18f6a21c
SHA25679e1bec98dcb77022f436a7d9a46afc1f67402f3627092c7b708a3a7651b83a4
SHA512b496d63f81e1f6150042ae775e9ff04bd9030e0976f74e8ac4912c4d63ff9450b6c1b025c63e9cad7fac12553167b60b794c5fbb5218a0cced77118894758be4
-
Filesize
186KB
MD57aefe58d7527e3e60ea4e9234696158d
SHA1ff02bb8028fb48bb326227035c39436e48ba52a6
SHA2560674722ce5bfbc98561c9287ef847c5bcce74fa84f8f840ad5d426835a25018b
SHA5124604fabf502a111d47b2dc2616ed5d995e91ee56d2c602cf6279daf0f45496d481c60381fd187dedcf08636fa0870cb429eba1dfeaf4dd2d84e0cf94b69b42bd
-
Filesize
186KB
MD57aefe58d7527e3e60ea4e9234696158d
SHA1ff02bb8028fb48bb326227035c39436e48ba52a6
SHA2560674722ce5bfbc98561c9287ef847c5bcce74fa84f8f840ad5d426835a25018b
SHA5124604fabf502a111d47b2dc2616ed5d995e91ee56d2c602cf6279daf0f45496d481c60381fd187dedcf08636fa0870cb429eba1dfeaf4dd2d84e0cf94b69b42bd
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD577b39da07b68cecbb6f712e74802594a
SHA179e2361ca2328306379b60c20091a9b362bae5a2
SHA25699b74b5058df5339bb1422a331cc549d55d191e091646297b0ca05238efc6387
SHA5129cf4a44a05ee619aba6946ec2585d0bb255e5947d4ff376dc543ded8f309a71424ee54d364e6e6456156e6dbedc89698fb5897203f3891d7c5788eb44d877b4f
-
Filesize
106KB
MD577b39da07b68cecbb6f712e74802594a
SHA179e2361ca2328306379b60c20091a9b362bae5a2
SHA25699b74b5058df5339bb1422a331cc549d55d191e091646297b0ca05238efc6387
SHA5129cf4a44a05ee619aba6946ec2585d0bb255e5947d4ff376dc543ded8f309a71424ee54d364e6e6456156e6dbedc89698fb5897203f3891d7c5788eb44d877b4f
-
Filesize
106KB
MD577b39da07b68cecbb6f712e74802594a
SHA179e2361ca2328306379b60c20091a9b362bae5a2
SHA25699b74b5058df5339bb1422a331cc549d55d191e091646297b0ca05238efc6387
SHA5129cf4a44a05ee619aba6946ec2585d0bb255e5947d4ff376dc543ded8f309a71424ee54d364e6e6456156e6dbedc89698fb5897203f3891d7c5788eb44d877b4f
-
Filesize
427KB
MD576c8f5726a589c7aee26cae35d061206
SHA11e0af5f5c411b7a0260220eb9df7c27bcf2e168b
SHA2562a2f5cf8467f72b575f5d08607ebcd21976730fc769f9369279e0ade739f3f82
SHA512b83db88f8dfabbd96e903bd597e973dd041565beb7de1111a52076a50127634b1f578471d79792d0b6891abda53cc9a579418814634ac4e0b72246f2ce908aaa
-
Filesize
427KB
MD576c8f5726a589c7aee26cae35d061206
SHA11e0af5f5c411b7a0260220eb9df7c27bcf2e168b
SHA2562a2f5cf8467f72b575f5d08607ebcd21976730fc769f9369279e0ade739f3f82
SHA512b83db88f8dfabbd96e903bd597e973dd041565beb7de1111a52076a50127634b1f578471d79792d0b6891abda53cc9a579418814634ac4e0b72246f2ce908aaa
-
Filesize
137KB
MD55a018c0b95420a1b2854154b64c5563b
SHA1ba116ccc93fe4727dfdbafd6776d6bec6a031985
SHA25679464fc81646103052d8c39b566c3206f0a9455cabfb9c3aa3208a6927bb09ed
SHA512cf9930ffad27f6efa682db2363c87ac85fc6525f100328fa828b852f617067c3fa50a837dfa9c07a577f5abfacdc6c18ccc05608fc8d9c22a72b83da5fd467a4
-
Filesize
330KB
MD5cb51e92ba7e6275903977022031df6b8
SHA186dfbd64efd2fe890df60b5fd617b96d18f6a21c
SHA25679e1bec98dcb77022f436a7d9a46afc1f67402f3627092c7b708a3a7651b83a4
SHA512b496d63f81e1f6150042ae775e9ff04bd9030e0976f74e8ac4912c4d63ff9450b6c1b025c63e9cad7fac12553167b60b794c5fbb5218a0cced77118894758be4
-
Filesize
186KB
MD57aefe58d7527e3e60ea4e9234696158d
SHA1ff02bb8028fb48bb326227035c39436e48ba52a6
SHA2560674722ce5bfbc98561c9287ef847c5bcce74fa84f8f840ad5d426835a25018b
SHA5124604fabf502a111d47b2dc2616ed5d995e91ee56d2c602cf6279daf0f45496d481c60381fd187dedcf08636fa0870cb429eba1dfeaf4dd2d84e0cf94b69b42bd