Analysis
-
max time kernel
148s -
max time network
103s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
05-05-2021 02:27
Static task
static1
Behavioral task
behavioral1
Sample
e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe
Resource
win10v20210408
General
-
Target
e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe
-
Size
3.3MB
-
MD5
e9865c0cab1852f3c71aaa95ee93569e
-
SHA1
52a7b9ab1dba3a1ccb25cf878ca65e9c10d86e7c
-
SHA256
e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8
-
SHA512
4d92f74a3c4e591fd8cc040961a290fb6b81abd7d5bde165fa21f4ef2291176440d10b3e559474d0e9ea1b5cb0a83e9af7790187d6b8036ab011060ca0c1dd15
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
HelpMe.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Processes:
resource yara_rule \Windows\SysWOW64\HelpMe.exe aspack_v212_v242 \Windows\SysWOW64\HelpMe.exe aspack_v212_v242 C:\Windows\SysWOW64\HelpMe.exe aspack_v212_v242 C:\Windows\SysWOW64\HelpMe.exe aspack_v212_v242 C:\$Recycle.Bin\S-1-5-21-2513283230-931923277-594887482-1000\desktop.ini.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
HelpMe.exepid process 1796 HelpMe.exe -
Drops startup file 2 IoCs
Processes:
HelpMe.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe -
Loads dropped DLL 2 IoCs
Processes:
e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exepid process 1748 e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe 1748 e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
HelpMe.exedescription ioc process File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\F: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe -
Drops autorun.inf file 1 TTPs
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory 4 IoCs
Processes:
e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exeHelpMe.exedescription ioc process File created C:\Windows\SysWOW64\HelpMe.exe e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe File opened for modification C:\Windows\SysWOW64\HelpMe.exe e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe File created C:\Windows\SysWOW64\notepad.exe.exe e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe -
Drops file in Program Files directory 1 IoCs
Processes:
e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exedescription ioc process File created C:\Program Files (x86)\Internet Explorer\iexplore.exe.exe e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exepid process 1748 e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exedescription pid process target process PID 1748 wrote to memory of 1796 1748 e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe HelpMe.exe PID 1748 wrote to memory of 1796 1748 e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe HelpMe.exe PID 1748 wrote to memory of 1796 1748 e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe HelpMe.exe PID 1748 wrote to memory of 1796 1748 e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe HelpMe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe"C:\Users\Admin\AppData\Local\Temp\e8b6ebf0d66d4a9b0d15d08bb88353dced374bad9113d5595c00ba270853f8f8.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops startup file
- Enumerates connected drives
- Drops file in System32 directory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-2513283230-931923277-594887482-1000\desktop.ini.exeMD5
c16945d93302098c2e8224667f9502a1
SHA1dc797e80e48932e147fd398133f5113b17bb8567
SHA25685f4a9ef83841f249d255520b1ddef45fa579304897a838f4c32a9b7ac6baf6c
SHA51274d90e6fbfb6ebeaa350c7400511e45c32e174a8513db48b2a5ca5fdf6bc583f7bfeaed7d66b1e57b5c47f4a6f15343bd85595b29a7d56e5ab79c09ae944118e
-
C:\Windows\SysWOW64\HelpMe.exeMD5
2ad6debbfe83736d5daec29c1665e66a
SHA1d363121edf8ff81e585f9d2b5786bf697280afa9
SHA25695a0f0c116d51a6c371e52b4f22b9775d10f9fef69aceadb981ca2c53101591a
SHA51291ea5169508df3de2281aa977881a59a78e99ab32084b4758ef2ea55a25a38ad75c68d2f1aa240b6e31bf310f827de6e0424b26149a9256fada9393e6dd4f80e
-
C:\Windows\SysWOW64\HelpMe.exeMD5
2ad6debbfe83736d5daec29c1665e66a
SHA1d363121edf8ff81e585f9d2b5786bf697280afa9
SHA25695a0f0c116d51a6c371e52b4f22b9775d10f9fef69aceadb981ca2c53101591a
SHA51291ea5169508df3de2281aa977881a59a78e99ab32084b4758ef2ea55a25a38ad75c68d2f1aa240b6e31bf310f827de6e0424b26149a9256fada9393e6dd4f80e
-
\Windows\SysWOW64\HelpMe.exeMD5
2ad6debbfe83736d5daec29c1665e66a
SHA1d363121edf8ff81e585f9d2b5786bf697280afa9
SHA25695a0f0c116d51a6c371e52b4f22b9775d10f9fef69aceadb981ca2c53101591a
SHA51291ea5169508df3de2281aa977881a59a78e99ab32084b4758ef2ea55a25a38ad75c68d2f1aa240b6e31bf310f827de6e0424b26149a9256fada9393e6dd4f80e
-
\Windows\SysWOW64\HelpMe.exeMD5
2ad6debbfe83736d5daec29c1665e66a
SHA1d363121edf8ff81e585f9d2b5786bf697280afa9
SHA25695a0f0c116d51a6c371e52b4f22b9775d10f9fef69aceadb981ca2c53101591a
SHA51291ea5169508df3de2281aa977881a59a78e99ab32084b4758ef2ea55a25a38ad75c68d2f1aa240b6e31bf310f827de6e0424b26149a9256fada9393e6dd4f80e
-
memory/1748-60-0x00000000757E1000-0x00000000757E3000-memory.dmpFilesize
8KB
-
memory/1748-67-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/1796-63-0x0000000000000000-mapping.dmp
-
memory/1796-68-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB