Analysis

  • max time kernel
    189s
  • max time network
    201s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2022 05:04

General

  • Target

    f641d4e36be88ba77ab876cf53c8b65602d43fa93560f128a8ccf48cf3297dd7.exe

  • Size

    440KB

  • MD5

    7072bf381660ae357c61793d5c479700

  • SHA1

    51b273858735fe2b23c2e56456f72bf9039f5e1a

  • SHA256

    f641d4e36be88ba77ab876cf53c8b65602d43fa93560f128a8ccf48cf3297dd7

  • SHA512

    db441cf5ac412a8df6eb51edf33c58ba59398312cfd07810c446dd11150f578e0522c25ec6a8fb13373692314954b67d6d9533d39f1cf312de151fc614df8e6d

  • SSDEEP

    6144:k82p4pFHfzMepymgWPnviP6Koa0nArn20l96tCF2eKNBDRlC8HQQDhy5OwbYBilu:Cp4pNfz3ymJnJ8QCFkxCaQTOl2u

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops startup file 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f641d4e36be88ba77ab876cf53c8b65602d43fa93560f128a8ccf48cf3297dd7.exe
    "C:\Users\Admin\AppData\Local\Temp\f641d4e36be88ba77ab876cf53c8b65602d43fa93560f128a8ccf48cf3297dd7.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:456
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Drops startup file
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Program Files directory
      PID:3836

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2295526160-1155304984-640977766-1000\desktop.ini.exe

    Filesize

    434KB

    MD5

    20a0cb37dae6b73653950d206e0e91ac

    SHA1

    4f790a5486b6a7f43a08b37ffbd057d637d71f74

    SHA256

    cdad51ed90e235561757c8b40cba4ca93ed17e78949163f44583515a34325969

    SHA512

    1aa4535e2db628793ee86eaf14b6d5392fceb601dc1bee8b582e0a02073aedf36110448563e76755ed58e80215d01208260c33d23eb97eb16ff546f2cb11ef9a

  • C:\Windows\SysWOW64\HelpMe.exe

    Filesize

    434KB

    MD5

    335596ffc2f7b5664cf4ff527efbe304

    SHA1

    197683f4b769defe3b02d6df6213785e3357e4d7

    SHA256

    abc95fb81ba83dec5810478585eb6da4f57efd5140e645bbe85ef5fab3a7c88e

    SHA512

    3af1d8548e0359b60a414d81ce13a725781da99c4e5b7810fec5f0fe4e4afce2aead314d0dfb34467830278fa685635d690631de585c1587b44e4c84b87720cc

  • C:\Windows\SysWOW64\HelpMe.exe

    Filesize

    434KB

    MD5

    335596ffc2f7b5664cf4ff527efbe304

    SHA1

    197683f4b769defe3b02d6df6213785e3357e4d7

    SHA256

    abc95fb81ba83dec5810478585eb6da4f57efd5140e645bbe85ef5fab3a7c88e

    SHA512

    3af1d8548e0359b60a414d81ce13a725781da99c4e5b7810fec5f0fe4e4afce2aead314d0dfb34467830278fa685635d690631de585c1587b44e4c84b87720cc

  • memory/3836-132-0x0000000000000000-mapping.dmp