Analysis
-
max time kernel
31s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 14:07
Static task
static1
Behavioral task
behavioral1
Sample
2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe
Resource
win10v2004-20220901-en
General
-
Target
2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe
-
Size
831KB
-
MD5
ae8fdd6debd0fce5a153e0c816d08cea
-
SHA1
32cb552920d0cbf2b3dc08b166120f5730421394
-
SHA256
2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981
-
SHA512
c0169acd7642dcf337733e7f08a63279a32cc170b6cbeb8cd6a0856deacdf91adcf95e116f8b3bf763c77b8205b1c09fed3bbb563f1c0deb1659f987eab395c0
-
SSDEEP
24576:1rfGR2wDeRMTa/IilvttO1BB/GOXxmHB8EF:1YYRMTabFtO1BB/G++B8
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe -
Executes dropped EXE 5 IoCs
pid Process 960 installd.exe 1800 nethtsrv.exe 1028 netupdsrv.exe 1644 nethtsrv.exe 804 netupdsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 960 installd.exe 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 1800 nethtsrv.exe 1800 nethtsrv.exe 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 1644 nethtsrv.exe 1644 nethtsrv.exe 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfpapi.dll 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe File created C:\Windows\SysWOW64\installd.exe 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe File created C:\Windows\SysWOW64\nethtsrv.exe 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe File created C:\Windows\SysWOW64\netupdsrv.exe 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe File created C:\Windows\SysWOW64\hfnapi.dll 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe File created C:\Program Files (x86)\Common Files\Config\data.xml 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1644 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1348 wrote to memory of 844 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 26 PID 1348 wrote to memory of 844 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 26 PID 1348 wrote to memory of 844 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 26 PID 1348 wrote to memory of 844 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 26 PID 844 wrote to memory of 1312 844 net.exe 28 PID 844 wrote to memory of 1312 844 net.exe 28 PID 844 wrote to memory of 1312 844 net.exe 28 PID 844 wrote to memory of 1312 844 net.exe 28 PID 1348 wrote to memory of 1904 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 29 PID 1348 wrote to memory of 1904 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 29 PID 1348 wrote to memory of 1904 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 29 PID 1348 wrote to memory of 1904 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 29 PID 1904 wrote to memory of 736 1904 net.exe 31 PID 1904 wrote to memory of 736 1904 net.exe 31 PID 1904 wrote to memory of 736 1904 net.exe 31 PID 1904 wrote to memory of 736 1904 net.exe 31 PID 1348 wrote to memory of 960 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 32 PID 1348 wrote to memory of 960 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 32 PID 1348 wrote to memory of 960 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 32 PID 1348 wrote to memory of 960 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 32 PID 1348 wrote to memory of 960 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 32 PID 1348 wrote to memory of 960 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 32 PID 1348 wrote to memory of 960 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 32 PID 1348 wrote to memory of 1800 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 34 PID 1348 wrote to memory of 1800 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 34 PID 1348 wrote to memory of 1800 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 34 PID 1348 wrote to memory of 1800 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 34 PID 1348 wrote to memory of 1028 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 36 PID 1348 wrote to memory of 1028 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 36 PID 1348 wrote to memory of 1028 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 36 PID 1348 wrote to memory of 1028 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 36 PID 1348 wrote to memory of 1028 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 36 PID 1348 wrote to memory of 1028 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 36 PID 1348 wrote to memory of 1028 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 36 PID 1348 wrote to memory of 1604 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 38 PID 1348 wrote to memory of 1604 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 38 PID 1348 wrote to memory of 1604 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 38 PID 1348 wrote to memory of 1604 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 38 PID 1604 wrote to memory of 1480 1604 net.exe 40 PID 1604 wrote to memory of 1480 1604 net.exe 40 PID 1604 wrote to memory of 1480 1604 net.exe 40 PID 1604 wrote to memory of 1480 1604 net.exe 40 PID 1348 wrote to memory of 1724 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 42 PID 1348 wrote to memory of 1724 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 42 PID 1348 wrote to memory of 1724 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 42 PID 1348 wrote to memory of 1724 1348 2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe 42 PID 1724 wrote to memory of 1844 1724 net.exe 44 PID 1724 wrote to memory of 1844 1724 net.exe 44 PID 1724 wrote to memory of 1844 1724 net.exe 44 PID 1724 wrote to memory of 1844 1724 net.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe"C:\Users\Admin\AppData\Local\Temp\2e6778856f7c4a444db1af45bddd9522296c1896fb8d04c4ca8512f2b0d41981.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1312
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:736
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:960
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1800
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1028
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1480
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1844
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:804
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD56b950cad96707fd21ad3bf5f62f565eb
SHA1d50ef4c793cceed89c023c6990dde417de13ecb1
SHA2567cecc0ea51cd7a56c717b157803c9aa36f8cb29f0b6f71384266cde3e7b1925e
SHA51227bd18bab047085c9c25f561ed05a32ef57a121369d5edb30395cb9ce3e0ea83f6d276c5cb8c3b8eb1d9ca6fc9ba6784bb12681c5d56c1f5d2b73f478b8513b9
-
Filesize
428KB
MD50fc3a15f026bc83b992548dfd6a557ff
SHA1fd3fc548ac639ec34266088e4fa9eca27d92ef46
SHA2561805046e2b4065f4b2eed5e984a8bee04262b798e97ff6c290a8152615208f09
SHA51288bc5118d0d474c51d8c34de4c7bf44da90e66d27bd4f24668a0afe8223a195b54dc8282717f3233ce89f80b3eacc2bc59e7cf5881a0c9ac4eb53a9edfc7a8f5
-
Filesize
137KB
MD5a5b30c984230b9ac0b762b37a1b7ca5c
SHA16b62de6f1ecc3ec459337d1cbd984550c49fea92
SHA256204a48ccfdd399ed83faa2ed98b62cfa44c413c0de88d2e4e6dd86fd4aaa2a69
SHA512c80ba5dd54b3665a3b1dd7d08d4f769c1a666e4ce0ca349aabef5bc32375638d7b1040d4117677e2c0f1c983dd4e38e38263228daa4d3355a208d97167efca67
-
Filesize
331KB
MD54690b00116e377b9bb12e02b00c335de
SHA110ee7783b2cfd7cfa0e0d79342063210b04482e6
SHA2566c9488d82573956f8abedf51c94dd6abd31b4448142c55dc949e23c121c2bf19
SHA5123e04b63762b21aa6b66bd3fb2b17941467699986f537495afe20667486e300a6ab8b0ebb8f42e8fe720075d0644b7d4b0cd3fe24f54432ad7f128784f936321a
-
Filesize
331KB
MD54690b00116e377b9bb12e02b00c335de
SHA110ee7783b2cfd7cfa0e0d79342063210b04482e6
SHA2566c9488d82573956f8abedf51c94dd6abd31b4448142c55dc949e23c121c2bf19
SHA5123e04b63762b21aa6b66bd3fb2b17941467699986f537495afe20667486e300a6ab8b0ebb8f42e8fe720075d0644b7d4b0cd3fe24f54432ad7f128784f936321a
-
Filesize
186KB
MD5b6e634edd5ac8e336eba6b82952b7d46
SHA1a2c643b0227daf5c0d1d700dbd6aad5f117fd782
SHA25626c016e061a337e0deec4fc798f950ed324ec5a27a321cb33fd32623dc6cbe48
SHA51233fcbc917ce92fa96b9407ba6c927260c45b2638aab47e69f2dc850adc1508bd1fb2379dc31e863ee4c9e154ce3f4994b5c04e773a21acc0576a978d3f9a92bb
-
Filesize
186KB
MD5b6e634edd5ac8e336eba6b82952b7d46
SHA1a2c643b0227daf5c0d1d700dbd6aad5f117fd782
SHA25626c016e061a337e0deec4fc798f950ed324ec5a27a321cb33fd32623dc6cbe48
SHA51233fcbc917ce92fa96b9407ba6c927260c45b2638aab47e69f2dc850adc1508bd1fb2379dc31e863ee4c9e154ce3f4994b5c04e773a21acc0576a978d3f9a92bb
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD56b950cad96707fd21ad3bf5f62f565eb
SHA1d50ef4c793cceed89c023c6990dde417de13ecb1
SHA2567cecc0ea51cd7a56c717b157803c9aa36f8cb29f0b6f71384266cde3e7b1925e
SHA51227bd18bab047085c9c25f561ed05a32ef57a121369d5edb30395cb9ce3e0ea83f6d276c5cb8c3b8eb1d9ca6fc9ba6784bb12681c5d56c1f5d2b73f478b8513b9
-
Filesize
106KB
MD56b950cad96707fd21ad3bf5f62f565eb
SHA1d50ef4c793cceed89c023c6990dde417de13ecb1
SHA2567cecc0ea51cd7a56c717b157803c9aa36f8cb29f0b6f71384266cde3e7b1925e
SHA51227bd18bab047085c9c25f561ed05a32ef57a121369d5edb30395cb9ce3e0ea83f6d276c5cb8c3b8eb1d9ca6fc9ba6784bb12681c5d56c1f5d2b73f478b8513b9
-
Filesize
106KB
MD56b950cad96707fd21ad3bf5f62f565eb
SHA1d50ef4c793cceed89c023c6990dde417de13ecb1
SHA2567cecc0ea51cd7a56c717b157803c9aa36f8cb29f0b6f71384266cde3e7b1925e
SHA51227bd18bab047085c9c25f561ed05a32ef57a121369d5edb30395cb9ce3e0ea83f6d276c5cb8c3b8eb1d9ca6fc9ba6784bb12681c5d56c1f5d2b73f478b8513b9
-
Filesize
428KB
MD50fc3a15f026bc83b992548dfd6a557ff
SHA1fd3fc548ac639ec34266088e4fa9eca27d92ef46
SHA2561805046e2b4065f4b2eed5e984a8bee04262b798e97ff6c290a8152615208f09
SHA51288bc5118d0d474c51d8c34de4c7bf44da90e66d27bd4f24668a0afe8223a195b54dc8282717f3233ce89f80b3eacc2bc59e7cf5881a0c9ac4eb53a9edfc7a8f5
-
Filesize
428KB
MD50fc3a15f026bc83b992548dfd6a557ff
SHA1fd3fc548ac639ec34266088e4fa9eca27d92ef46
SHA2561805046e2b4065f4b2eed5e984a8bee04262b798e97ff6c290a8152615208f09
SHA51288bc5118d0d474c51d8c34de4c7bf44da90e66d27bd4f24668a0afe8223a195b54dc8282717f3233ce89f80b3eacc2bc59e7cf5881a0c9ac4eb53a9edfc7a8f5
-
Filesize
137KB
MD5a5b30c984230b9ac0b762b37a1b7ca5c
SHA16b62de6f1ecc3ec459337d1cbd984550c49fea92
SHA256204a48ccfdd399ed83faa2ed98b62cfa44c413c0de88d2e4e6dd86fd4aaa2a69
SHA512c80ba5dd54b3665a3b1dd7d08d4f769c1a666e4ce0ca349aabef5bc32375638d7b1040d4117677e2c0f1c983dd4e38e38263228daa4d3355a208d97167efca67
-
Filesize
331KB
MD54690b00116e377b9bb12e02b00c335de
SHA110ee7783b2cfd7cfa0e0d79342063210b04482e6
SHA2566c9488d82573956f8abedf51c94dd6abd31b4448142c55dc949e23c121c2bf19
SHA5123e04b63762b21aa6b66bd3fb2b17941467699986f537495afe20667486e300a6ab8b0ebb8f42e8fe720075d0644b7d4b0cd3fe24f54432ad7f128784f936321a
-
Filesize
186KB
MD5b6e634edd5ac8e336eba6b82952b7d46
SHA1a2c643b0227daf5c0d1d700dbd6aad5f117fd782
SHA25626c016e061a337e0deec4fc798f950ed324ec5a27a321cb33fd32623dc6cbe48
SHA51233fcbc917ce92fa96b9407ba6c927260c45b2638aab47e69f2dc850adc1508bd1fb2379dc31e863ee4c9e154ce3f4994b5c04e773a21acc0576a978d3f9a92bb