Analysis
-
max time kernel
146s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:48
Behavioral task
behavioral1
Sample
ada4478249b1b2541aa075a7fd36f792.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ada4478249b1b2541aa075a7fd36f792.exe
Resource
win10v2004-20231215-en
General
-
Target
ada4478249b1b2541aa075a7fd36f792.exe
-
Size
487KB
-
MD5
ada4478249b1b2541aa075a7fd36f792
-
SHA1
5e01950f4cd56a10e4f1933207de21d245fd5c7c
-
SHA256
e2ce47ec3a67d1a9d8a6aef277215852e9d44dd588dd49d7016b52c8dbed40d9
-
SHA512
15d734a62bf336b724048a80fdc3eda3ed71dd550a03c0530ccd44267380994f28d88f5d522ca65181a05b183b4f59803ef12bfc37d50b0a80476491209864d6
-
SSDEEP
6144:riMmXRH6pXfSb0ceR/VFAHh1kgcs0HW1kyAp0mgl8agveD6oMhNn9LV5EpRsxio:ZMMpXKb0hNGh1kG0HWnAlU8L
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" ada4478249b1b2541aa075a7fd36f792.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x0008000000012248-2.dat aspack_v212_v242 behavioral1/files/0x00080000000155ea-38.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-54.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk ada4478249b1b2541aa075a7fd36f792.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk ada4478249b1b2541aa075a7fd36f792.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe -
Executes dropped EXE 1 IoCs
pid Process 2760 HelpMe.exe -
Loads dropped DLL 31 IoCs
pid Process 2200 ada4478249b1b2541aa075a7fd36f792.exe 2200 ada4478249b1b2541aa075a7fd36f792.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe 2760 HelpMe.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\B: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\N: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\U: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\V: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\T: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\H: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\K: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\O: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\P: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\Q: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\X: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\A: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\G: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\L: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\M: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\Z: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\J: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\W: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\I: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\S: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\E: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\Y: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\R: ada4478249b1b2541aa075a7fd36f792.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF ada4478249b1b2541aa075a7fd36f792.exe File opened for modification C:\AUTORUN.INF ada4478249b1b2541aa075a7fd36f792.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe ada4478249b1b2541aa075a7fd36f792.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2760 2200 ada4478249b1b2541aa075a7fd36f792.exe 28 PID 2200 wrote to memory of 2760 2200 ada4478249b1b2541aa075a7fd36f792.exe 28 PID 2200 wrote to memory of 2760 2200 ada4478249b1b2541aa075a7fd36f792.exe 28 PID 2200 wrote to memory of 2760 2200 ada4478249b1b2541aa075a7fd36f792.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ada4478249b1b2541aa075a7fd36f792.exe"C:\Users\Admin\AppData\Local\Temp\ada4478249b1b2541aa075a7fd36f792.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD54130780581d266b4cf12e0aea2318268
SHA1c2b11a1db1282dd9d5b2fda879414693a143e987
SHA256c30aa9a977215b82e4b3097785ebe42ddfef704c37044b61d954601c8501fb72
SHA5127b4cb30a113f79e1fbda72cb2bdfb382e9959c38c04351f35984b8fba8b5e38cc65bd29f47e035687892b7722272eed6bf6f5c56683bbbc567100c8e8d100a43
-
Filesize
954B
MD55e0511d2633489333d94743ffb99c7ab
SHA1a82db27bc7d325740be067a4130556b64d7945f0
SHA25631ae4083b1a2b30260e440f593c978f2c09cf83c617914fcc6407d938f1fc981
SHA512fc6a92863711b59a083c272565527bf549234691bb19b39f878744050242b7b4607261fd2d0ec5c006730380f7f90a3f649e7c588580a9fe70c8c1742a01b90f
-
Filesize
1KB
MD5734cf57f3ea4399cfe32e8c008536857
SHA1348cfd963710fb0bad9348149c0a407b431ad048
SHA25676a736ef3518fe1e843f693f53617eb9a57663a4e53b8ef2047958be424ba8bb
SHA512319326cfc10b67b8f7bea1ee723204e266e412e6a96816465bcfda7dfb9903132477bf525662a619d4edeca0eb4540d444b6ad7620ac72bf6d36f71aead4b137
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
487KB
MD5ada4478249b1b2541aa075a7fd36f792
SHA15e01950f4cd56a10e4f1933207de21d245fd5c7c
SHA256e2ce47ec3a67d1a9d8a6aef277215852e9d44dd588dd49d7016b52c8dbed40d9
SHA51215d734a62bf336b724048a80fdc3eda3ed71dd550a03c0530ccd44267380994f28d88f5d522ca65181a05b183b4f59803ef12bfc37d50b0a80476491209864d6
-
Filesize
459KB
MD5c5a0b05b4b8d68124ce5d534a2e136df
SHA1475b7e558f975f2819bb670b094eddf6f7abca2f
SHA2567c7a6a9f5645968c7874c8df96d827a94100faf272885879247e316516c5b76e
SHA512a8b6819e83126f02d8cc350f416284ef54c9e20aa49e3ae568bc3e733d63923f9a0591a971f5f1128267b9c5eedeb46b4b6a6d5019c98e7d3507f57992ffbec4