Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
243s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 12:25
Behavioral task
behavioral1
Sample
9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe
Resource
win10v2004-20220901-en
General
-
Target
9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe
-
Size
189KB
-
MD5
fa1708db7d7d13c8a84c6fe88b9f75b5
-
SHA1
cccaab060b85af3f0e51c06e342d64e4e2bc5c67
-
SHA256
9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a
-
SHA512
1533d7e13c24a669c7920097d38b53d325a6f0785741c6ad559ca807669bfb6675cfcf75d6782df59d3d475f42058a2537a8d468a6da55290531e8d02a2bcf12
-
SSDEEP
3072:rimsXXK9HRTOeriRfP6pXfSb0dspqc5oY0htVFAHT11Ual21Cxcs0HKAH057kyJM:riMmXRH6pXfSb0ceR/VFAHh1kgcs0HWq
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
resource yara_rule behavioral1/files/0x000a0000000122f5-55.dat aspack_v212_v242 behavioral1/files/0x000a0000000122f5-56.dat aspack_v212_v242 behavioral1/files/0x000a0000000122f5-58.dat aspack_v212_v242 behavioral1/files/0x000a0000000122f5-60.dat aspack_v212_v242 behavioral1/files/0x00090000000122fa-61.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f2-62.dat aspack_v212_v242 behavioral1/files/0x000a0000000122f5-63.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 1660 HelpMe.exe -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe -
Loads dropped DLL 3 IoCs
pid Process 1884 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe 1884 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe 1660 HelpMe.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\V: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\Y: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\I: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\O: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\E: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\H: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\Q: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\R: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\W: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\A: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\F: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\J: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\K: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\S: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\X: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\G: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\Z: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\F: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\T: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\B: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\L: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\N: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\P: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\U: 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AUTORUN.INF 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File opened for modification C:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1884 wrote to memory of 1660 1884 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe 28 PID 1884 wrote to memory of 1660 1884 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe 28 PID 1884 wrote to memory of 1660 1884 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe 28 PID 1884 wrote to memory of 1660 1884 9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe"C:\Users\Admin\AppData\Local\Temp\9eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:1660
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190KB
MD57ae4a6dc3b9c107e8c20c5827cff0f9d
SHA13cb10c9c540e926f000fe32cd8c871e4beba652d
SHA256428336320f2a71b5c921d17fa6b3ea9df6be3d9ab3592a96a13c6d19305d104b
SHA51273a67fe68769176af3468bc5f1ff0d89e4db5e3b109ddd6d8be14052d741dee4331cb2be98486000d610e903edcdf0deb6c41d972a8f079ece9342b20c40b550
-
Filesize
189KB
MD5fa1708db7d7d13c8a84c6fe88b9f75b5
SHA1cccaab060b85af3f0e51c06e342d64e4e2bc5c67
SHA2569eed1ea810666e527f27df4d39e1a330280b569c42df87285a83dd0e27316e5a
SHA5121533d7e13c24a669c7920097d38b53d325a6f0785741c6ad559ca807669bfb6675cfcf75d6782df59d3d475f42058a2537a8d468a6da55290531e8d02a2bcf12
-
Filesize
950B
MD596f6c874673a958ffbaf2fc79c83f70b
SHA1b42a9a1e8d13a279a7c55a5c1f02439a03293dc1
SHA2568f990cab763f4686eb17fb1d03e8574de3a9b6d5fb8e5db8b8955d0b60f10fa5
SHA51276a48dd7fb357c4051befa65a9f747414e43d1fca4f398de5ed9de1665064e4d3dc89e226b971e9a75bda38fa8e678e61ddbd3c7690a7508e40c36a20c70bd84
-
Filesize
183KB
MD557f260903a34bf33a2c503df61f9403a
SHA11d1d528c3f43dec5c9c7a20c8c166fcdc742e7bb
SHA25649b3cd308e4da9f54b3b283225a13d962b27b5d033f8839fc7d36dc799371f10
SHA512d9d226e0fb4a2e9b985be04a1ce20b3763305a8867648041157dec6216defd21ca1aee0f801e0e6955d891facb14a5d2047da5f47b4dd1e4b6a8c7131ad533fd
-
Filesize
183KB
MD557f260903a34bf33a2c503df61f9403a
SHA11d1d528c3f43dec5c9c7a20c8c166fcdc742e7bb
SHA25649b3cd308e4da9f54b3b283225a13d962b27b5d033f8839fc7d36dc799371f10
SHA512d9d226e0fb4a2e9b985be04a1ce20b3763305a8867648041157dec6216defd21ca1aee0f801e0e6955d891facb14a5d2047da5f47b4dd1e4b6a8c7131ad533fd
-
Filesize
183KB
MD557f260903a34bf33a2c503df61f9403a
SHA11d1d528c3f43dec5c9c7a20c8c166fcdc742e7bb
SHA25649b3cd308e4da9f54b3b283225a13d962b27b5d033f8839fc7d36dc799371f10
SHA512d9d226e0fb4a2e9b985be04a1ce20b3763305a8867648041157dec6216defd21ca1aee0f801e0e6955d891facb14a5d2047da5f47b4dd1e4b6a8c7131ad533fd
-
Filesize
183KB
MD557f260903a34bf33a2c503df61f9403a
SHA11d1d528c3f43dec5c9c7a20c8c166fcdc742e7bb
SHA25649b3cd308e4da9f54b3b283225a13d962b27b5d033f8839fc7d36dc799371f10
SHA512d9d226e0fb4a2e9b985be04a1ce20b3763305a8867648041157dec6216defd21ca1aee0f801e0e6955d891facb14a5d2047da5f47b4dd1e4b6a8c7131ad533fd
-
Filesize
183KB
MD557f260903a34bf33a2c503df61f9403a
SHA11d1d528c3f43dec5c9c7a20c8c166fcdc742e7bb
SHA25649b3cd308e4da9f54b3b283225a13d962b27b5d033f8839fc7d36dc799371f10
SHA512d9d226e0fb4a2e9b985be04a1ce20b3763305a8867648041157dec6216defd21ca1aee0f801e0e6955d891facb14a5d2047da5f47b4dd1e4b6a8c7131ad533fd