Analysis
-
max time kernel
147s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
04/07/2023, 17:05
Behavioral task
behavioral1
Sample
easyMalicious30a4193ad7d4.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
easyMalicious30a4193ad7d4.exe
Resource
win10v2004-20230703-en
General
-
Target
easyMalicious30a4193ad7d4.exe
-
Size
884KB
-
MD5
2ab7091214b0ae5add03b6e353297986
-
SHA1
145de4be7e4206c6ad0fcb0419487fa86353579e
-
SHA256
c4fe37c4c08845f69dd5489287aea066ad8e13747d82f140b24ecc24c7cde105
-
SHA512
6e34681e3d9ac0f6a69b98df3ac4253c440a04eaefbb8baef68e61e50d06bb891aadc19937accbcaaf9c611c0e9d63a0e178cc6281499cb7f9650aced1ae5014
-
SSDEEP
24576:ZMMpXS0hN0V0HiCSGB2uJ2s4otqFCJrW9FqvSbqsHasgXhFHDAGtlRXZ+CP63n0J:Kwi0L0qi2
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" easyMalicious30a4193ad7d4.exe -
resource yara_rule behavioral1/files/0x000a0000000126ba-58.dat aspack_v212_v242 behavioral1/files/0x0009000000012707-71.dat aspack_v212_v242 -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk easyMalicious30a4193ad7d4.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk easyMalicious30a4193ad7d4.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\I: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\K: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\M: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\N: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\F: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\G: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\H: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\L: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\V: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\B: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\J: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\T: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\U: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\X: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\Z: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\W: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\Y: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\E: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\O: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\P: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\Q: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\R: easyMalicious30a4193ad7d4.exe File opened (read-only) \??\S: easyMalicious30a4193ad7d4.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AUTORUN.INF easyMalicious30a4193ad7d4.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\HelpMe.exe easyMalicious30a4193ad7d4.exe File created C:\Windows\SysWOW64\notepad.exe.exe easyMalicious30a4193ad7d4.exe File created C:\Windows\SysWOW64\HelpMe.exe easyMalicious30a4193ad7d4.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\iexplore.exe.exe easyMalicious30a4193ad7d4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 860 easyMalicious30a4193ad7d4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\easyMalicious30a4193ad7d4.exe"C:\Users\Admin\AppData\Local\Temp\easyMalicious30a4193ad7d4.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:860
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
884KB
MD591878bcfcc38acc3d96b2e27c2e038f3
SHA177971113f332769a83d1294387153cebeb91963a
SHA2563d39a7bb50d582cd3e721c61aa48df3e13aac8b5deb864241136f4c9df284f8e
SHA512fa14af556b72bb53c58d93631b58d1792bc06cf8d558e397ca53567623ed0297c3bb32b5243b550586561b650aa947b52d2fce2805e88fa825d5f2a04ef933dd
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
1.6MB
MD5d52fe7407fdf0c5293c8b4621f51ab95
SHA1dd0d65257ab7d286784e78581a5d6a7cdd840a6f
SHA2568ce9cec18ad0c72d59e11677a9495ba17b534963d486ce6e17537138968f33eb
SHA5125fb389af8fa1a82c29917f09f488c6d95c2a3efe504c087bd5490cdef1f7c18c31242c604b5f928cee12b46db5faa7f37b00d61da709ee76a36bf58fd99f8c9b
-
Filesize
1KB
MD59aef903d9475e7b8ee6281a1a6920b93
SHA1031bd38e7771122e9258ab44a7b81e168c74f380
SHA256776f06d3ad117b1147c505f19f78f473ff4fc091f4b055b1c152b7acd620e0d3
SHA5120f35b412889030f7cfdbe77560782b73704689f202cbaf2c4bebaf1927f79f9f8c4808f230b3e45ee657f54c775a59b9a7a16ca275d8c231215c81734a5ed812