Analysis
-
max time kernel
37s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe
Resource
win10v2004-20220901-en
General
-
Target
eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe
-
Size
831KB
-
MD5
8208f614b6cb1efb02727ef208f431e3
-
SHA1
550823427740aa6e06e59c40d72ab9f31da1cee5
-
SHA256
eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b
-
SHA512
ecf86db365b4a59692a4e850b7ada8b94ef38b37c08be158db9fcb0cb79b9b1bd9e4f887d22ce2dee9ecf265c90bcf9c640f24c04da9f45237dda2840af25830
-
SSDEEP
12288:5NpbfGRDCwDeR/0TbnmfWgeRkyCSph8Hub+NT2s14GOSyls1x8Oww/EA0LnxDS:5rfGR2wDeRMT+PyCkKF14NNlPOwO3oD
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe -
Executes dropped EXE 5 IoCs
pid Process 1448 installd.exe 904 nethtsrv.exe 632 netupdsrv.exe 1976 nethtsrv.exe 1608 netupdsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 1448 installd.exe 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 904 nethtsrv.exe 904 nethtsrv.exe 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 1976 nethtsrv.exe 1976 nethtsrv.exe 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\installd.exe eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe File created C:\Windows\SysWOW64\nethtsrv.exe eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe File created C:\Windows\SysWOW64\netupdsrv.exe eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe File created C:\Windows\SysWOW64\hfnapi.dll eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe File created C:\Windows\SysWOW64\hfpapi.dll eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1976 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2020 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 26 PID 1612 wrote to memory of 2020 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 26 PID 1612 wrote to memory of 2020 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 26 PID 1612 wrote to memory of 2020 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 26 PID 2020 wrote to memory of 908 2020 net.exe 28 PID 2020 wrote to memory of 908 2020 net.exe 28 PID 2020 wrote to memory of 908 2020 net.exe 28 PID 2020 wrote to memory of 908 2020 net.exe 28 PID 1612 wrote to memory of 1528 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 29 PID 1612 wrote to memory of 1528 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 29 PID 1612 wrote to memory of 1528 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 29 PID 1612 wrote to memory of 1528 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 29 PID 1528 wrote to memory of 1376 1528 net.exe 31 PID 1528 wrote to memory of 1376 1528 net.exe 31 PID 1528 wrote to memory of 1376 1528 net.exe 31 PID 1528 wrote to memory of 1376 1528 net.exe 31 PID 1612 wrote to memory of 1448 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 32 PID 1612 wrote to memory of 1448 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 32 PID 1612 wrote to memory of 1448 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 32 PID 1612 wrote to memory of 1448 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 32 PID 1612 wrote to memory of 1448 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 32 PID 1612 wrote to memory of 1448 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 32 PID 1612 wrote to memory of 1448 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 32 PID 1612 wrote to memory of 904 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 34 PID 1612 wrote to memory of 904 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 34 PID 1612 wrote to memory of 904 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 34 PID 1612 wrote to memory of 904 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 34 PID 1612 wrote to memory of 632 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 36 PID 1612 wrote to memory of 632 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 36 PID 1612 wrote to memory of 632 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 36 PID 1612 wrote to memory of 632 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 36 PID 1612 wrote to memory of 632 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 36 PID 1612 wrote to memory of 632 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 36 PID 1612 wrote to memory of 632 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 36 PID 1612 wrote to memory of 928 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 38 PID 1612 wrote to memory of 928 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 38 PID 1612 wrote to memory of 928 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 38 PID 1612 wrote to memory of 928 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 38 PID 928 wrote to memory of 1980 928 net.exe 40 PID 928 wrote to memory of 1980 928 net.exe 40 PID 928 wrote to memory of 1980 928 net.exe 40 PID 928 wrote to memory of 1980 928 net.exe 40 PID 1612 wrote to memory of 1064 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 42 PID 1612 wrote to memory of 1064 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 42 PID 1612 wrote to memory of 1064 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 42 PID 1612 wrote to memory of 1064 1612 eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe 42 PID 1064 wrote to memory of 820 1064 net.exe 44 PID 1064 wrote to memory of 820 1064 net.exe 44 PID 1064 wrote to memory of 820 1064 net.exe 44 PID 1064 wrote to memory of 820 1064 net.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe"C:\Users\Admin\AppData\Local\Temp\eba738d6075bcb517348e36c4b501299117894592324597360ca14b1d778bf2b.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:908
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1376
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1448
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:904
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:632
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1980
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:820
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:1608
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD54ecc2f1221117017f7f2cda19aaf95b4
SHA11d2e461a980cc68bb90c643dcef89193b455b9bf
SHA2563de1534d0757aa725a504b2041151dd4f6338aa86b74572daf4db0d5e9718616
SHA512d748b7b4f6b4b3c2e68e77031154ef72cfb12ec8bc1bd42e6de230867ce92412d1f5666c11b53221c8231a9e6c7e637be1c366c5dc7cc4addb8cfa00e522c4f6
-
Filesize
427KB
MD5f404a61fee33e2c1732a9d6cdf7293e8
SHA1c5ac18ffd0fb35ebceb06f3c2e372d97a855fe92
SHA2562c8655e3642866c9e666657994ac9805f012d2414ce76bcbe7ff30f67dc74ea5
SHA512de7425a6bacfb80610c1d2f1e331e66370cb551691f75696d4e4756f66a8504be6687854a72acf046027467c0ff2dfe5fb4cdef36ae210345ce1db1dabddc2d0
-
Filesize
137KB
MD52128ccad79e9a0b7410a4febad63b15d
SHA1fb8a2fd8c562a0223912eefb8adc2860edc97b6c
SHA256439b56866eaf6aefd3f11a7db6759b3844ccbc3c6eed8a0a2e3ada6ab8be6551
SHA51202d840ac9df94b2a42f051836bf4b9b8323e547798faf99171e1b8cfb7b3b925adb62c2e37b69bf29c7a3e13932d65fbb5810a71e72da3bb144ea133376433bd
-
Filesize
331KB
MD5002daee7f6e69902790a9654dee548e7
SHA1964ef9798e6acc0ce0fab2b947f13eb6f869f048
SHA2561d219a03b7bef01283cbb1242548f4e3662b3e86e6c32094096d79c05ea8a77b
SHA5129b395552235a828e30cbbecef77502757cce6008f73595751ad282336996eed554b64ae677b9cf019544e682c28469b36c62b44a4500c70ba27bfca7defb9d08
-
Filesize
331KB
MD5002daee7f6e69902790a9654dee548e7
SHA1964ef9798e6acc0ce0fab2b947f13eb6f869f048
SHA2561d219a03b7bef01283cbb1242548f4e3662b3e86e6c32094096d79c05ea8a77b
SHA5129b395552235a828e30cbbecef77502757cce6008f73595751ad282336996eed554b64ae677b9cf019544e682c28469b36c62b44a4500c70ba27bfca7defb9d08
-
Filesize
186KB
MD5eb645a8223c035a3a74900943d2130c7
SHA1e17a367af56f03b527501b0195f0f32e9cb6b726
SHA2562d1a8552fa9d1295d2cefde4324e1b0748b1c07a5650805dde6c1e1db9254634
SHA5129a2a5d9af0d708e5c52611f439c5c7cba7abb6a23613187eb8256d6273263d784f693cefd74cb6c3fb8f859134687f49e0942b1ed2b5ee88dd18399bccc2a061
-
Filesize
186KB
MD5eb645a8223c035a3a74900943d2130c7
SHA1e17a367af56f03b527501b0195f0f32e9cb6b726
SHA2562d1a8552fa9d1295d2cefde4324e1b0748b1c07a5650805dde6c1e1db9254634
SHA5129a2a5d9af0d708e5c52611f439c5c7cba7abb6a23613187eb8256d6273263d784f693cefd74cb6c3fb8f859134687f49e0942b1ed2b5ee88dd18399bccc2a061
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD54ecc2f1221117017f7f2cda19aaf95b4
SHA11d2e461a980cc68bb90c643dcef89193b455b9bf
SHA2563de1534d0757aa725a504b2041151dd4f6338aa86b74572daf4db0d5e9718616
SHA512d748b7b4f6b4b3c2e68e77031154ef72cfb12ec8bc1bd42e6de230867ce92412d1f5666c11b53221c8231a9e6c7e637be1c366c5dc7cc4addb8cfa00e522c4f6
-
Filesize
106KB
MD54ecc2f1221117017f7f2cda19aaf95b4
SHA11d2e461a980cc68bb90c643dcef89193b455b9bf
SHA2563de1534d0757aa725a504b2041151dd4f6338aa86b74572daf4db0d5e9718616
SHA512d748b7b4f6b4b3c2e68e77031154ef72cfb12ec8bc1bd42e6de230867ce92412d1f5666c11b53221c8231a9e6c7e637be1c366c5dc7cc4addb8cfa00e522c4f6
-
Filesize
106KB
MD54ecc2f1221117017f7f2cda19aaf95b4
SHA11d2e461a980cc68bb90c643dcef89193b455b9bf
SHA2563de1534d0757aa725a504b2041151dd4f6338aa86b74572daf4db0d5e9718616
SHA512d748b7b4f6b4b3c2e68e77031154ef72cfb12ec8bc1bd42e6de230867ce92412d1f5666c11b53221c8231a9e6c7e637be1c366c5dc7cc4addb8cfa00e522c4f6
-
Filesize
427KB
MD5f404a61fee33e2c1732a9d6cdf7293e8
SHA1c5ac18ffd0fb35ebceb06f3c2e372d97a855fe92
SHA2562c8655e3642866c9e666657994ac9805f012d2414ce76bcbe7ff30f67dc74ea5
SHA512de7425a6bacfb80610c1d2f1e331e66370cb551691f75696d4e4756f66a8504be6687854a72acf046027467c0ff2dfe5fb4cdef36ae210345ce1db1dabddc2d0
-
Filesize
427KB
MD5f404a61fee33e2c1732a9d6cdf7293e8
SHA1c5ac18ffd0fb35ebceb06f3c2e372d97a855fe92
SHA2562c8655e3642866c9e666657994ac9805f012d2414ce76bcbe7ff30f67dc74ea5
SHA512de7425a6bacfb80610c1d2f1e331e66370cb551691f75696d4e4756f66a8504be6687854a72acf046027467c0ff2dfe5fb4cdef36ae210345ce1db1dabddc2d0
-
Filesize
137KB
MD52128ccad79e9a0b7410a4febad63b15d
SHA1fb8a2fd8c562a0223912eefb8adc2860edc97b6c
SHA256439b56866eaf6aefd3f11a7db6759b3844ccbc3c6eed8a0a2e3ada6ab8be6551
SHA51202d840ac9df94b2a42f051836bf4b9b8323e547798faf99171e1b8cfb7b3b925adb62c2e37b69bf29c7a3e13932d65fbb5810a71e72da3bb144ea133376433bd
-
Filesize
331KB
MD5002daee7f6e69902790a9654dee548e7
SHA1964ef9798e6acc0ce0fab2b947f13eb6f869f048
SHA2561d219a03b7bef01283cbb1242548f4e3662b3e86e6c32094096d79c05ea8a77b
SHA5129b395552235a828e30cbbecef77502757cce6008f73595751ad282336996eed554b64ae677b9cf019544e682c28469b36c62b44a4500c70ba27bfca7defb9d08
-
Filesize
186KB
MD5eb645a8223c035a3a74900943d2130c7
SHA1e17a367af56f03b527501b0195f0f32e9cb6b726
SHA2562d1a8552fa9d1295d2cefde4324e1b0748b1c07a5650805dde6c1e1db9254634
SHA5129a2a5d9af0d708e5c52611f439c5c7cba7abb6a23613187eb8256d6273263d784f693cefd74cb6c3fb8f859134687f49e0942b1ed2b5ee88dd18399bccc2a061