Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe
Resource
win10v2004-20220812-en
General
-
Target
788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe
-
Size
830KB
-
MD5
45d1ffbff447f320bc5d62258b5c3a18
-
SHA1
2fa394f50fb8e7ec5aea9dca0f62241babf33847
-
SHA256
788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d
-
SHA512
887472a9d94bcc8598faab3dc2ccbe9d31d6c2f0ed7d5db6e3e919d784ed80f3013b55bbf1fa48c0a125e160f4659c1440b05a93b16dfbfccd290de8b64af3b4
-
SSDEEP
24576:frfGR2wDeRMTC9rdbJlFxMXkSV9QWW+qO3BtE:fYYRMTErdO9QWlqMtE
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe -
Executes dropped EXE 5 IoCs
pid Process 3684 installd.exe 1196 nethtsrv.exe 4252 netupdsrv.exe 3724 nethtsrv.exe 4016 netupdsrv.exe -
Loads dropped DLL 14 IoCs
pid Process 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 3684 installd.exe 1196 nethtsrv.exe 1196 nethtsrv.exe 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 3724 nethtsrv.exe 3724 nethtsrv.exe 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfpapi.dll 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe File created C:\Windows\SysWOW64\installd.exe 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe File created C:\Windows\SysWOW64\nethtsrv.exe 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe File created C:\Windows\SysWOW64\netupdsrv.exe 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe File created C:\Windows\SysWOW64\hfnapi.dll 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3724 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2444 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 82 PID 2432 wrote to memory of 2444 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 82 PID 2432 wrote to memory of 2444 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 82 PID 2444 wrote to memory of 4124 2444 net.exe 84 PID 2444 wrote to memory of 4124 2444 net.exe 84 PID 2444 wrote to memory of 4124 2444 net.exe 84 PID 2432 wrote to memory of 4948 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 85 PID 2432 wrote to memory of 4948 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 85 PID 2432 wrote to memory of 4948 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 85 PID 4948 wrote to memory of 2200 4948 net.exe 87 PID 4948 wrote to memory of 2200 4948 net.exe 87 PID 4948 wrote to memory of 2200 4948 net.exe 87 PID 2432 wrote to memory of 3684 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 88 PID 2432 wrote to memory of 3684 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 88 PID 2432 wrote to memory of 3684 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 88 PID 2432 wrote to memory of 1196 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 89 PID 2432 wrote to memory of 1196 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 89 PID 2432 wrote to memory of 1196 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 89 PID 2432 wrote to memory of 4252 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 91 PID 2432 wrote to memory of 4252 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 91 PID 2432 wrote to memory of 4252 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 91 PID 2432 wrote to memory of 112 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 93 PID 2432 wrote to memory of 112 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 93 PID 2432 wrote to memory of 112 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 93 PID 112 wrote to memory of 1444 112 net.exe 95 PID 112 wrote to memory of 1444 112 net.exe 95 PID 112 wrote to memory of 1444 112 net.exe 95 PID 2432 wrote to memory of 2640 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 97 PID 2432 wrote to memory of 2640 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 97 PID 2432 wrote to memory of 2640 2432 788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe 97 PID 2640 wrote to memory of 3484 2640 net.exe 99 PID 2640 wrote to memory of 3484 2640 net.exe 99 PID 2640 wrote to memory of 3484 2640 net.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe"C:\Users\Admin\AppData\Local\Temp\788de09288759f30fbfd4e2432960dd1659048c44a1d7c577a4fffe997058e1d.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:4124
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:2200
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3684
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1196
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:4252
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1444
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:3484
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:4016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD577b39da07b68cecbb6f712e74802594a
SHA179e2361ca2328306379b60c20091a9b362bae5a2
SHA25699b74b5058df5339bb1422a331cc549d55d191e091646297b0ca05238efc6387
SHA5129cf4a44a05ee619aba6946ec2585d0bb255e5947d4ff376dc543ded8f309a71424ee54d364e6e6456156e6dbedc89698fb5897203f3891d7c5788eb44d877b4f
-
Filesize
106KB
MD577b39da07b68cecbb6f712e74802594a
SHA179e2361ca2328306379b60c20091a9b362bae5a2
SHA25699b74b5058df5339bb1422a331cc549d55d191e091646297b0ca05238efc6387
SHA5129cf4a44a05ee619aba6946ec2585d0bb255e5947d4ff376dc543ded8f309a71424ee54d364e6e6456156e6dbedc89698fb5897203f3891d7c5788eb44d877b4f
-
Filesize
106KB
MD577b39da07b68cecbb6f712e74802594a
SHA179e2361ca2328306379b60c20091a9b362bae5a2
SHA25699b74b5058df5339bb1422a331cc549d55d191e091646297b0ca05238efc6387
SHA5129cf4a44a05ee619aba6946ec2585d0bb255e5947d4ff376dc543ded8f309a71424ee54d364e6e6456156e6dbedc89698fb5897203f3891d7c5788eb44d877b4f
-
Filesize
106KB
MD577b39da07b68cecbb6f712e74802594a
SHA179e2361ca2328306379b60c20091a9b362bae5a2
SHA25699b74b5058df5339bb1422a331cc549d55d191e091646297b0ca05238efc6387
SHA5129cf4a44a05ee619aba6946ec2585d0bb255e5947d4ff376dc543ded8f309a71424ee54d364e6e6456156e6dbedc89698fb5897203f3891d7c5788eb44d877b4f
-
Filesize
427KB
MD576c8f5726a589c7aee26cae35d061206
SHA11e0af5f5c411b7a0260220eb9df7c27bcf2e168b
SHA2562a2f5cf8467f72b575f5d08607ebcd21976730fc769f9369279e0ade739f3f82
SHA512b83db88f8dfabbd96e903bd597e973dd041565beb7de1111a52076a50127634b1f578471d79792d0b6891abda53cc9a579418814634ac4e0b72246f2ce908aaa
-
Filesize
427KB
MD576c8f5726a589c7aee26cae35d061206
SHA11e0af5f5c411b7a0260220eb9df7c27bcf2e168b
SHA2562a2f5cf8467f72b575f5d08607ebcd21976730fc769f9369279e0ade739f3f82
SHA512b83db88f8dfabbd96e903bd597e973dd041565beb7de1111a52076a50127634b1f578471d79792d0b6891abda53cc9a579418814634ac4e0b72246f2ce908aaa
-
Filesize
427KB
MD576c8f5726a589c7aee26cae35d061206
SHA11e0af5f5c411b7a0260220eb9df7c27bcf2e168b
SHA2562a2f5cf8467f72b575f5d08607ebcd21976730fc769f9369279e0ade739f3f82
SHA512b83db88f8dfabbd96e903bd597e973dd041565beb7de1111a52076a50127634b1f578471d79792d0b6891abda53cc9a579418814634ac4e0b72246f2ce908aaa
-
Filesize
137KB
MD55a018c0b95420a1b2854154b64c5563b
SHA1ba116ccc93fe4727dfdbafd6776d6bec6a031985
SHA25679464fc81646103052d8c39b566c3206f0a9455cabfb9c3aa3208a6927bb09ed
SHA512cf9930ffad27f6efa682db2363c87ac85fc6525f100328fa828b852f617067c3fa50a837dfa9c07a577f5abfacdc6c18ccc05608fc8d9c22a72b83da5fd467a4
-
Filesize
137KB
MD55a018c0b95420a1b2854154b64c5563b
SHA1ba116ccc93fe4727dfdbafd6776d6bec6a031985
SHA25679464fc81646103052d8c39b566c3206f0a9455cabfb9c3aa3208a6927bb09ed
SHA512cf9930ffad27f6efa682db2363c87ac85fc6525f100328fa828b852f617067c3fa50a837dfa9c07a577f5abfacdc6c18ccc05608fc8d9c22a72b83da5fd467a4
-
Filesize
330KB
MD5cb51e92ba7e6275903977022031df6b8
SHA186dfbd64efd2fe890df60b5fd617b96d18f6a21c
SHA25679e1bec98dcb77022f436a7d9a46afc1f67402f3627092c7b708a3a7651b83a4
SHA512b496d63f81e1f6150042ae775e9ff04bd9030e0976f74e8ac4912c4d63ff9450b6c1b025c63e9cad7fac12553167b60b794c5fbb5218a0cced77118894758be4
-
Filesize
330KB
MD5cb51e92ba7e6275903977022031df6b8
SHA186dfbd64efd2fe890df60b5fd617b96d18f6a21c
SHA25679e1bec98dcb77022f436a7d9a46afc1f67402f3627092c7b708a3a7651b83a4
SHA512b496d63f81e1f6150042ae775e9ff04bd9030e0976f74e8ac4912c4d63ff9450b6c1b025c63e9cad7fac12553167b60b794c5fbb5218a0cced77118894758be4
-
Filesize
330KB
MD5cb51e92ba7e6275903977022031df6b8
SHA186dfbd64efd2fe890df60b5fd617b96d18f6a21c
SHA25679e1bec98dcb77022f436a7d9a46afc1f67402f3627092c7b708a3a7651b83a4
SHA512b496d63f81e1f6150042ae775e9ff04bd9030e0976f74e8ac4912c4d63ff9450b6c1b025c63e9cad7fac12553167b60b794c5fbb5218a0cced77118894758be4
-
Filesize
186KB
MD57aefe58d7527e3e60ea4e9234696158d
SHA1ff02bb8028fb48bb326227035c39436e48ba52a6
SHA2560674722ce5bfbc98561c9287ef847c5bcce74fa84f8f840ad5d426835a25018b
SHA5124604fabf502a111d47b2dc2616ed5d995e91ee56d2c602cf6279daf0f45496d481c60381fd187dedcf08636fa0870cb429eba1dfeaf4dd2d84e0cf94b69b42bd
-
Filesize
186KB
MD57aefe58d7527e3e60ea4e9234696158d
SHA1ff02bb8028fb48bb326227035c39436e48ba52a6
SHA2560674722ce5bfbc98561c9287ef847c5bcce74fa84f8f840ad5d426835a25018b
SHA5124604fabf502a111d47b2dc2616ed5d995e91ee56d2c602cf6279daf0f45496d481c60381fd187dedcf08636fa0870cb429eba1dfeaf4dd2d84e0cf94b69b42bd
-
Filesize
186KB
MD57aefe58d7527e3e60ea4e9234696158d
SHA1ff02bb8028fb48bb326227035c39436e48ba52a6
SHA2560674722ce5bfbc98561c9287ef847c5bcce74fa84f8f840ad5d426835a25018b
SHA5124604fabf502a111d47b2dc2616ed5d995e91ee56d2c602cf6279daf0f45496d481c60381fd187dedcf08636fa0870cb429eba1dfeaf4dd2d84e0cf94b69b42bd