Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    26s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/11/2022, 05:06

General

  • Target

    9874aeb5f8a5794e958e26bc3ccf778a5f379afa3a956063294464c052f888da.exe

  • Size

    341KB

  • MD5

    1bd0a5537e225c5b692a0b3a2f5c2558

  • SHA1

    2869c31e4d19cbee3cc7e7dd046609887e53a14e

  • SHA256

    9874aeb5f8a5794e958e26bc3ccf778a5f379afa3a956063294464c052f888da

  • SHA512

    8c7ffe6a3f0242fd48fbe23834c73f7d47b64e376b0f43f4c302988fa7e09476a3fcded6a9cc86622acb1ce7fae6035fdfad2ae6aff1610dd3b4f55f929fc053

  • SSDEEP

    6144:IDSoITfCywNbrbi7i+fO53TjMx86ZALnDHSd9vDoYCoTXGkjryBPKI:rKywNW75I3TgC66LnmdBoY3iknyJD

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9874aeb5f8a5794e958e26bc3ccf778a5f379afa3a956063294464c052f888da.exe
    "C:\Users\Admin\AppData\Local\Temp\9874aeb5f8a5794e958e26bc3ccf778a5f379afa3a956063294464c052f888da.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Windows\SysWOW64\net.exe
      net stop nethttpservice
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop nethttpservice
        3⤵
          PID:1784
      • C:\Windows\SysWOW64\net.exe
        net stop serviceupdater
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:624
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop serviceupdater
          3⤵
            PID:1432
        • C:\Windows\SysWOW64\installd.exe
          "C:\Windows\system32\installd.exe" nethfdrv
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:948
        • C:\Windows\SysWOW64\nethtsrv.exe
          "C:\Windows\system32\nethtsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1964
        • C:\Windows\SysWOW64\netupdsrv.exe
          "C:\Windows\system32\netupdsrv.exe" -nfdi
          2⤵
          • Executes dropped EXE
          PID:1668
        • C:\Windows\SysWOW64\net.exe
          net start nethttpservice
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:800
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start nethttpservice
            3⤵
              PID:328
          • C:\Windows\SysWOW64\net.exe
            net start serviceupdater
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1540
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start serviceupdater
              3⤵
                PID:2024
          • C:\Windows\SysWOW64\nethtsrv.exe
            C:\Windows\SysWOW64\nethtsrv.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1176
          • C:\Windows\SysWOW64\netupdsrv.exe
            C:\Windows\SysWOW64\netupdsrv.exe
            1⤵
            • Executes dropped EXE
            PID:896

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            4a76aade9913e57d723d86b33f27fd1e

            SHA1

            6918f3caa0c0b434c59b5c46651bb29ff001959b

            SHA256

            8e2790d899e3d8c98eaee883352d42463b618c5b8ee4c5a47b1c34ff7a412703

            SHA512

            4da622972930d0b6d8001a82286972f244ff72d4b93fa7ee8067b439a2d2615312e64b0b09c455a8009594870f7d132124263111f01a1635fd7212ccd4fe18ea

          • C:\Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            a1ebc04ee6c848c80dd2a0be20a517aa

            SHA1

            ba9d12ab1ece4192d588ae4e61b0bb2bb936ed13

            SHA256

            42364bdcdbf8f3deb57f4ed80fe3eb2b42ead968c547eac9a4a62b5fd9e5c40d

            SHA512

            485daefbd2b369c3e96de63ecdde2aa89afae59a5add9bb5b6b6203420fa125a304d2ae331a48ea1ab298d91244350337f8b3223f99cb7c20410e69e632f76ae

          • C:\Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            ca6e50709d995ee0d0ea564bf76f11d7

            SHA1

            1317959151fded664d35efe1b3c653d7abdd8d59

            SHA256

            d9eadce22f64f59777d2141373efd86a0e0a7ff2219f97e9b990abd1c527a78d

            SHA512

            50cc45347312fa186e7a8b4cb9d0dd6769e1e695d6928d276591058950fcb1c321d0d6b1b5a903d485ae55992332efcc27602ffa5ff6b6ab30303b817b57e9ac

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            af411d6c044bc57e534192970da9da9e

            SHA1

            bfff874ee83510f980c6699c1d9ece1331048c2c

            SHA256

            bf1a1ec660db76cca0be21691fbcc5e2819e1ecce62ffd464ef866460ff74844

            SHA512

            2a5563e1db15ab81b9ca07514be94bb696f6d130848535d1755b255a8d7cffb15af78fa2187378baef7522ca072cc354a65d0e3151151bd1fb8ef9e2468d2ef6

          • C:\Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            af411d6c044bc57e534192970da9da9e

            SHA1

            bfff874ee83510f980c6699c1d9ece1331048c2c

            SHA256

            bf1a1ec660db76cca0be21691fbcc5e2819e1ecce62ffd464ef866460ff74844

            SHA512

            2a5563e1db15ab81b9ca07514be94bb696f6d130848535d1755b255a8d7cffb15af78fa2187378baef7522ca072cc354a65d0e3151151bd1fb8ef9e2468d2ef6

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            14a34744a9dcb9ba6fd648397b3bccb2

            SHA1

            f2690b25eff79906a99abae049f905ba305d2845

            SHA256

            562131429ff1adfb51fd4d6b1ae999a38bceb8dc588d2456531e3882eafb7a6d

            SHA512

            13b0c13b7c059db00ce9b9407c3ff33edfcc1bba5a7c489125dc86d3e741e2797c15f2662e5a438e2a949dc0ace5833eda283c3d5ab931a259d79725e858fac9

          • C:\Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            14a34744a9dcb9ba6fd648397b3bccb2

            SHA1

            f2690b25eff79906a99abae049f905ba305d2845

            SHA256

            562131429ff1adfb51fd4d6b1ae999a38bceb8dc588d2456531e3882eafb7a6d

            SHA512

            13b0c13b7c059db00ce9b9407c3ff33edfcc1bba5a7c489125dc86d3e741e2797c15f2662e5a438e2a949dc0ace5833eda283c3d5ab931a259d79725e858fac9

          • \Users\Admin\AppData\Local\Temp\nso83A4.tmp\System.dll

            Filesize

            11KB

            MD5

            960a5c48e25cf2bca332e74e11d825c9

            SHA1

            da35c6816ace5daf4c6c1d57b93b09a82ecdc876

            SHA256

            484f8e9f194ed9016274ef3672b2c52ed5f574fb71d3884edf3c222b758a75a2

            SHA512

            cc450179e2d0d56aee2ccf8163d3882978c4e9c1aa3d3a95875fe9ba9831e07ddfd377111dc67f801fa53b6f468a418f086f1de7c71e0a5b634e1ae2a67cd3da

          • \Users\Admin\AppData\Local\Temp\nso83A4.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            51e63a9c5d6d230ef1c421b2eccd45dc

            SHA1

            c499cdad5c613d71ed3f7e93360f1bbc5748c45d

            SHA256

            cd8496a3802378391ec425dec424a14f5d30e242f192ec4eb022d767f9a2480f

            SHA512

            c23d713c3c834b3397c2a199490aed28f28d21f5781205c24df5e1e32365985c8a55be58f06979df09222740ffa51f4da764ebc3d912cd0c9d56ab6a33cab522

          • \Users\Admin\AppData\Local\Temp\nso83A4.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            51e63a9c5d6d230ef1c421b2eccd45dc

            SHA1

            c499cdad5c613d71ed3f7e93360f1bbc5748c45d

            SHA256

            cd8496a3802378391ec425dec424a14f5d30e242f192ec4eb022d767f9a2480f

            SHA512

            c23d713c3c834b3397c2a199490aed28f28d21f5781205c24df5e1e32365985c8a55be58f06979df09222740ffa51f4da764ebc3d912cd0c9d56ab6a33cab522

          • \Users\Admin\AppData\Local\Temp\nso83A4.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            51e63a9c5d6d230ef1c421b2eccd45dc

            SHA1

            c499cdad5c613d71ed3f7e93360f1bbc5748c45d

            SHA256

            cd8496a3802378391ec425dec424a14f5d30e242f192ec4eb022d767f9a2480f

            SHA512

            c23d713c3c834b3397c2a199490aed28f28d21f5781205c24df5e1e32365985c8a55be58f06979df09222740ffa51f4da764ebc3d912cd0c9d56ab6a33cab522

          • \Users\Admin\AppData\Local\Temp\nso83A4.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            51e63a9c5d6d230ef1c421b2eccd45dc

            SHA1

            c499cdad5c613d71ed3f7e93360f1bbc5748c45d

            SHA256

            cd8496a3802378391ec425dec424a14f5d30e242f192ec4eb022d767f9a2480f

            SHA512

            c23d713c3c834b3397c2a199490aed28f28d21f5781205c24df5e1e32365985c8a55be58f06979df09222740ffa51f4da764ebc3d912cd0c9d56ab6a33cab522

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            4a76aade9913e57d723d86b33f27fd1e

            SHA1

            6918f3caa0c0b434c59b5c46651bb29ff001959b

            SHA256

            8e2790d899e3d8c98eaee883352d42463b618c5b8ee4c5a47b1c34ff7a412703

            SHA512

            4da622972930d0b6d8001a82286972f244ff72d4b93fa7ee8067b439a2d2615312e64b0b09c455a8009594870f7d132124263111f01a1635fd7212ccd4fe18ea

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            4a76aade9913e57d723d86b33f27fd1e

            SHA1

            6918f3caa0c0b434c59b5c46651bb29ff001959b

            SHA256

            8e2790d899e3d8c98eaee883352d42463b618c5b8ee4c5a47b1c34ff7a412703

            SHA512

            4da622972930d0b6d8001a82286972f244ff72d4b93fa7ee8067b439a2d2615312e64b0b09c455a8009594870f7d132124263111f01a1635fd7212ccd4fe18ea

          • \Windows\SysWOW64\hfnapi.dll

            Filesize

            106KB

            MD5

            4a76aade9913e57d723d86b33f27fd1e

            SHA1

            6918f3caa0c0b434c59b5c46651bb29ff001959b

            SHA256

            8e2790d899e3d8c98eaee883352d42463b618c5b8ee4c5a47b1c34ff7a412703

            SHA512

            4da622972930d0b6d8001a82286972f244ff72d4b93fa7ee8067b439a2d2615312e64b0b09c455a8009594870f7d132124263111f01a1635fd7212ccd4fe18ea

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            a1ebc04ee6c848c80dd2a0be20a517aa

            SHA1

            ba9d12ab1ece4192d588ae4e61b0bb2bb936ed13

            SHA256

            42364bdcdbf8f3deb57f4ed80fe3eb2b42ead968c547eac9a4a62b5fd9e5c40d

            SHA512

            485daefbd2b369c3e96de63ecdde2aa89afae59a5add9bb5b6b6203420fa125a304d2ae331a48ea1ab298d91244350337f8b3223f99cb7c20410e69e632f76ae

          • \Windows\SysWOW64\hfpapi.dll

            Filesize

            244KB

            MD5

            a1ebc04ee6c848c80dd2a0be20a517aa

            SHA1

            ba9d12ab1ece4192d588ae4e61b0bb2bb936ed13

            SHA256

            42364bdcdbf8f3deb57f4ed80fe3eb2b42ead968c547eac9a4a62b5fd9e5c40d

            SHA512

            485daefbd2b369c3e96de63ecdde2aa89afae59a5add9bb5b6b6203420fa125a304d2ae331a48ea1ab298d91244350337f8b3223f99cb7c20410e69e632f76ae

          • \Windows\SysWOW64\installd.exe

            Filesize

            108KB

            MD5

            ca6e50709d995ee0d0ea564bf76f11d7

            SHA1

            1317959151fded664d35efe1b3c653d7abdd8d59

            SHA256

            d9eadce22f64f59777d2141373efd86a0e0a7ff2219f97e9b990abd1c527a78d

            SHA512

            50cc45347312fa186e7a8b4cb9d0dd6769e1e695d6928d276591058950fcb1c321d0d6b1b5a903d485ae55992332efcc27602ffa5ff6b6ab30303b817b57e9ac

          • \Windows\SysWOW64\nethtsrv.exe

            Filesize

            176KB

            MD5

            af411d6c044bc57e534192970da9da9e

            SHA1

            bfff874ee83510f980c6699c1d9ece1331048c2c

            SHA256

            bf1a1ec660db76cca0be21691fbcc5e2819e1ecce62ffd464ef866460ff74844

            SHA512

            2a5563e1db15ab81b9ca07514be94bb696f6d130848535d1755b255a8d7cffb15af78fa2187378baef7522ca072cc354a65d0e3151151bd1fb8ef9e2468d2ef6

          • \Windows\SysWOW64\netupdsrv.exe

            Filesize

            158KB

            MD5

            14a34744a9dcb9ba6fd648397b3bccb2

            SHA1

            f2690b25eff79906a99abae049f905ba305d2845

            SHA256

            562131429ff1adfb51fd4d6b1ae999a38bceb8dc588d2456531e3882eafb7a6d

            SHA512

            13b0c13b7c059db00ce9b9407c3ff33edfcc1bba5a7c489125dc86d3e741e2797c15f2662e5a438e2a949dc0ace5833eda283c3d5ab931a259d79725e858fac9

          • memory/1376-54-0x0000000075C51000-0x0000000075C53000-memory.dmp

            Filesize

            8KB