Analysis
-
max time kernel
17s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe
Resource
win10v2004-20220812-en
General
-
Target
4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe
-
Size
831KB
-
MD5
55f7522fe16674c17664dcd447b60cd7
-
SHA1
3720702961c3314ca55067f60513abce4bdba26d
-
SHA256
4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb
-
SHA512
e5e61abbde1e2ecf6da4c703c59620747249ddda0ee7d5dd4779163f253d9dfe570bdf098fbf4c6ef4b85e41fad51a73ee468348fcd7dc1937cf723f1c76784c
-
SSDEEP
24576:crfGR2wDeRMTAuUVnJYJCFW2t6x5N7Tmc:cYYRMTAVvzFWwo5Nv
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe -
Executes dropped EXE 5 IoCs
pid Process 1292 installd.exe 1524 nethtsrv.exe 1688 netupdsrv.exe 2016 nethtsrv.exe 472 netupdsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 1292 installd.exe 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 1524 nethtsrv.exe 1524 nethtsrv.exe 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 2016 nethtsrv.exe 2016 nethtsrv.exe 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\installd.exe 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe File created C:\Windows\SysWOW64\nethtsrv.exe 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe File created C:\Windows\SysWOW64\netupdsrv.exe 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe File created C:\Windows\SysWOW64\hfnapi.dll 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe File created C:\Windows\SysWOW64\hfpapi.dll 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe File created C:\Program Files (x86)\Common Files\Config\data.xml 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2016 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1788 wrote to memory of 880 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 28 PID 1788 wrote to memory of 880 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 28 PID 1788 wrote to memory of 880 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 28 PID 1788 wrote to memory of 880 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 28 PID 880 wrote to memory of 916 880 net.exe 30 PID 880 wrote to memory of 916 880 net.exe 30 PID 880 wrote to memory of 916 880 net.exe 30 PID 880 wrote to memory of 916 880 net.exe 30 PID 1788 wrote to memory of 1376 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 31 PID 1788 wrote to memory of 1376 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 31 PID 1788 wrote to memory of 1376 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 31 PID 1788 wrote to memory of 1376 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 31 PID 1376 wrote to memory of 1480 1376 net.exe 33 PID 1376 wrote to memory of 1480 1376 net.exe 33 PID 1376 wrote to memory of 1480 1376 net.exe 33 PID 1376 wrote to memory of 1480 1376 net.exe 33 PID 1788 wrote to memory of 1292 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 34 PID 1788 wrote to memory of 1292 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 34 PID 1788 wrote to memory of 1292 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 34 PID 1788 wrote to memory of 1292 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 34 PID 1788 wrote to memory of 1292 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 34 PID 1788 wrote to memory of 1292 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 34 PID 1788 wrote to memory of 1292 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 34 PID 1788 wrote to memory of 1524 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 36 PID 1788 wrote to memory of 1524 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 36 PID 1788 wrote to memory of 1524 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 36 PID 1788 wrote to memory of 1524 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 36 PID 1788 wrote to memory of 1688 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 38 PID 1788 wrote to memory of 1688 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 38 PID 1788 wrote to memory of 1688 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 38 PID 1788 wrote to memory of 1688 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 38 PID 1788 wrote to memory of 1688 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 38 PID 1788 wrote to memory of 1688 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 38 PID 1788 wrote to memory of 1688 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 38 PID 1788 wrote to memory of 1932 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 40 PID 1788 wrote to memory of 1932 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 40 PID 1788 wrote to memory of 1932 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 40 PID 1788 wrote to memory of 1932 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 40 PID 1932 wrote to memory of 1752 1932 net.exe 42 PID 1932 wrote to memory of 1752 1932 net.exe 42 PID 1932 wrote to memory of 1752 1932 net.exe 42 PID 1932 wrote to memory of 1752 1932 net.exe 42 PID 1788 wrote to memory of 1488 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 44 PID 1788 wrote to memory of 1488 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 44 PID 1788 wrote to memory of 1488 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 44 PID 1788 wrote to memory of 1488 1788 4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe 44 PID 1488 wrote to memory of 1192 1488 net.exe 46 PID 1488 wrote to memory of 1192 1488 net.exe 46 PID 1488 wrote to memory of 1192 1488 net.exe 46 PID 1488 wrote to memory of 1192 1488 net.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe"C:\Users\Admin\AppData\Local\Temp\4ccbb5b23b47e7ec9e82fe6275803079d45b94eb801e141bdc459f89688b12eb.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:916
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1480
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1292
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1524
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1688
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1752
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1192
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:472
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5a057235bb53793107c287e4a028bdaa7
SHA1ade24302cd08a79edeaa22d8b2f26ae8a5254e34
SHA256649d0cc4c04dabd5c56220d6fc32a6ff20f0bc86c65ec3ef89c438978d26d92c
SHA5124afabbf2fc65ab657f079f0eb33c836289ac16ac32c5c3391cf17c65d426a84aab0754f9dbe9602c56ae93791b553d844e31cfc324d0fb48318f255e1b4accd6
-
Filesize
427KB
MD567f15ff71d1a6cef08e0845c02bd6fc4
SHA1c46560f4cfb497f6cd7dfde6cd6fdd565724fd59
SHA2561a99a056d7dcb57e4ee3038733f4cecfb9181b0876f92ef770eb3636bd403e55
SHA512eb51d7703d18c7be5ddf2c079c6c63e0ae34ab1746cd207a2c738da5d315a6cac9fc5e8dc41ad1582c199e9d1979a094458e56cb67133c25c780582ffe11a68b
-
Filesize
137KB
MD5379ac6c486ff4384c1e1f6121ef3aaf3
SHA1a6b7307f6567238ab7b7f1cfc497b89209ae6dcb
SHA2565eb84b78572b51b5e0dd0147022c47c3f314c60c9a5747fa0597b2bdf989de88
SHA512389f6d46c3f4910b7c0781d3367085df1802fcb9b33e9cc1148223630efdf11614eb8ccb2c14076245479d581972654c422eb9b555b6d1cb4e6d84217118cb58
-
Filesize
331KB
MD5135d0e86e935c45b72f77208a1f48a22
SHA19e6d18e216b209fd391cb58406fa0a64ba1c5a40
SHA256c3d414e4d7a096285d039858a65b8d974b568c10351902c32047ff191c54ee59
SHA51221430ce052167d3eb6ed214ed4d9d65c6aefc2d7875a243636589f7e71e4c94299551c92622f947b9ebabe3f42a2894397890dcac0fd837746e27701fb2919ed
-
Filesize
331KB
MD5135d0e86e935c45b72f77208a1f48a22
SHA19e6d18e216b209fd391cb58406fa0a64ba1c5a40
SHA256c3d414e4d7a096285d039858a65b8d974b568c10351902c32047ff191c54ee59
SHA51221430ce052167d3eb6ed214ed4d9d65c6aefc2d7875a243636589f7e71e4c94299551c92622f947b9ebabe3f42a2894397890dcac0fd837746e27701fb2919ed
-
Filesize
186KB
MD5fabf1b29dc7e356caf622036a6fb67af
SHA1bcde5e97efe6f7c14aa86079117e82114c274d6d
SHA2563db46d8a9009f266931f16f8f8f319d22d2ef77f0f84d612c700b568c3ab3928
SHA5126923506e4570b2a30dc38e3e51bd1fb8d60fa6cf72fdca6b0e7667f26e6f2b6ac821d4a59cb34eec50af75a9a703391f3b48324499ab5b9b3cd55b715582a8c4
-
Filesize
186KB
MD5fabf1b29dc7e356caf622036a6fb67af
SHA1bcde5e97efe6f7c14aa86079117e82114c274d6d
SHA2563db46d8a9009f266931f16f8f8f319d22d2ef77f0f84d612c700b568c3ab3928
SHA5126923506e4570b2a30dc38e3e51bd1fb8d60fa6cf72fdca6b0e7667f26e6f2b6ac821d4a59cb34eec50af75a9a703391f3b48324499ab5b9b3cd55b715582a8c4
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5a057235bb53793107c287e4a028bdaa7
SHA1ade24302cd08a79edeaa22d8b2f26ae8a5254e34
SHA256649d0cc4c04dabd5c56220d6fc32a6ff20f0bc86c65ec3ef89c438978d26d92c
SHA5124afabbf2fc65ab657f079f0eb33c836289ac16ac32c5c3391cf17c65d426a84aab0754f9dbe9602c56ae93791b553d844e31cfc324d0fb48318f255e1b4accd6
-
Filesize
106KB
MD5a057235bb53793107c287e4a028bdaa7
SHA1ade24302cd08a79edeaa22d8b2f26ae8a5254e34
SHA256649d0cc4c04dabd5c56220d6fc32a6ff20f0bc86c65ec3ef89c438978d26d92c
SHA5124afabbf2fc65ab657f079f0eb33c836289ac16ac32c5c3391cf17c65d426a84aab0754f9dbe9602c56ae93791b553d844e31cfc324d0fb48318f255e1b4accd6
-
Filesize
106KB
MD5a057235bb53793107c287e4a028bdaa7
SHA1ade24302cd08a79edeaa22d8b2f26ae8a5254e34
SHA256649d0cc4c04dabd5c56220d6fc32a6ff20f0bc86c65ec3ef89c438978d26d92c
SHA5124afabbf2fc65ab657f079f0eb33c836289ac16ac32c5c3391cf17c65d426a84aab0754f9dbe9602c56ae93791b553d844e31cfc324d0fb48318f255e1b4accd6
-
Filesize
427KB
MD567f15ff71d1a6cef08e0845c02bd6fc4
SHA1c46560f4cfb497f6cd7dfde6cd6fdd565724fd59
SHA2561a99a056d7dcb57e4ee3038733f4cecfb9181b0876f92ef770eb3636bd403e55
SHA512eb51d7703d18c7be5ddf2c079c6c63e0ae34ab1746cd207a2c738da5d315a6cac9fc5e8dc41ad1582c199e9d1979a094458e56cb67133c25c780582ffe11a68b
-
Filesize
427KB
MD567f15ff71d1a6cef08e0845c02bd6fc4
SHA1c46560f4cfb497f6cd7dfde6cd6fdd565724fd59
SHA2561a99a056d7dcb57e4ee3038733f4cecfb9181b0876f92ef770eb3636bd403e55
SHA512eb51d7703d18c7be5ddf2c079c6c63e0ae34ab1746cd207a2c738da5d315a6cac9fc5e8dc41ad1582c199e9d1979a094458e56cb67133c25c780582ffe11a68b
-
Filesize
137KB
MD5379ac6c486ff4384c1e1f6121ef3aaf3
SHA1a6b7307f6567238ab7b7f1cfc497b89209ae6dcb
SHA2565eb84b78572b51b5e0dd0147022c47c3f314c60c9a5747fa0597b2bdf989de88
SHA512389f6d46c3f4910b7c0781d3367085df1802fcb9b33e9cc1148223630efdf11614eb8ccb2c14076245479d581972654c422eb9b555b6d1cb4e6d84217118cb58
-
Filesize
331KB
MD5135d0e86e935c45b72f77208a1f48a22
SHA19e6d18e216b209fd391cb58406fa0a64ba1c5a40
SHA256c3d414e4d7a096285d039858a65b8d974b568c10351902c32047ff191c54ee59
SHA51221430ce052167d3eb6ed214ed4d9d65c6aefc2d7875a243636589f7e71e4c94299551c92622f947b9ebabe3f42a2894397890dcac0fd837746e27701fb2919ed
-
Filesize
186KB
MD5fabf1b29dc7e356caf622036a6fb67af
SHA1bcde5e97efe6f7c14aa86079117e82114c274d6d
SHA2563db46d8a9009f266931f16f8f8f319d22d2ef77f0f84d612c700b568c3ab3928
SHA5126923506e4570b2a30dc38e3e51bd1fb8d60fa6cf72fdca6b0e7667f26e6f2b6ac821d4a59cb34eec50af75a9a703391f3b48324499ab5b9b3cd55b715582a8c4