Analysis
-
max time kernel
145s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 05:44
Static task
static1
Behavioral task
behavioral1
Sample
0900d3c3c10879419b17809610e4b269.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0900d3c3c10879419b17809610e4b269.exe
Resource
win10v2004-20231222-en
General
-
Target
0900d3c3c10879419b17809610e4b269.exe
-
Size
2.9MB
-
MD5
0900d3c3c10879419b17809610e4b269
-
SHA1
2628631d4907d397c7fff1ef4c4881f3046c7b83
-
SHA256
9a5b768679a82140e299f3845f53a7156a2c179d4f6e2ba11b883f0e98fb3174
-
SHA512
bbafbe58d34362890f00b3c979057c4d33c6d211cefedadedf16646650bb3ec7b68581ea61a5c146e9b81d3ed3ea594c3c76fa3f1f1017cecfbcc1bcdf763227
-
SSDEEP
12288:Tp4pNfz3ymJnJ8QCFkxCaQTOlOb47MMpXKb0hNGh1kG0HWnALue:tEtl9mRda1rMMpXS0hN0V0Hj
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 0900d3c3c10879419b17809610e4b269.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 0900d3c3c10879419b17809610e4b269.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 0900d3c3c10879419b17809610e4b269.exe -
Executes dropped EXE 1 IoCs
pid Process 1948 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2252 0900d3c3c10879419b17809610e4b269.exe 2252 0900d3c3c10879419b17809610e4b269.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\R: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\S: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\Y: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\A: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\E: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\H: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\Z: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\N: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\P: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\I: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\K: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\W: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\G: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\O: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\T: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\V: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\X: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\B: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\J: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\L: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\U: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\M: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\Q: 0900d3c3c10879419b17809610e4b269.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 0900d3c3c10879419b17809610e4b269.exe File opened for modification C:\AUTORUN.INF 0900d3c3c10879419b17809610e4b269.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 0900d3c3c10879419b17809610e4b269.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 1948 2252 0900d3c3c10879419b17809610e4b269.exe 28 PID 2252 wrote to memory of 1948 2252 0900d3c3c10879419b17809610e4b269.exe 28 PID 2252 wrote to memory of 1948 2252 0900d3c3c10879419b17809610e4b269.exe 28 PID 2252 wrote to memory of 1948 2252 0900d3c3c10879419b17809610e4b269.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0900d3c3c10879419b17809610e4b269.exe"C:\Users\Admin\AppData\Local\Temp\0900d3c3c10879419b17809610e4b269.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:1948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD526cf24c444697ab99d4ffc5f1084b904
SHA12f5eb4bc6f386bd6c157e9e00de5c2f283d7fa79
SHA25647ec3e552e57c974469c4f441301da6c45b038b721ff27117b2a3171146cea82
SHA5127274918d6d192b913fcb425923289f6be2e06e71f75c68c85633dfd5f44f829d5dc9e698152894d44a385d065b18f311c70aefa01c5fa84bedf2a1f8b4b88a2c
-
Filesize
950B
MD5d7570009cfe29459e03dfb86b5009ee5
SHA10c4a233a6142b1b4aa2861a5cba96b6d67bcc079
SHA256537f0706138dee6e558e37a08065a46f5f27884c594965b8e3f7188f0814a086
SHA512155b60adf5454fec181403268985a6cf7ed134aa35a5a732e9ebffed640cca20ee18b5c8a840fe2e67cbca970025e8d9f5e7307f1571b3cc3bbc3ebbd3cdb89e
-
Filesize
382KB
MD5cf2c4b8f64cd81e6d77f112ad2c64775
SHA187fa9de1aff51e5a50603c64483ee5283deb19cf
SHA25602461c082cfc1484c96f3115d5eca036b9c08519440ec2c43e49dd6df96be9e7
SHA5127ba6ac0fc7c47601c19e7cd567428214697c85e052b62622dcb0eacd96c500d7e137f6645e770666894ff47e38413326e1ef754f428eaae9f0199e5b97059194
-
Filesize
93KB
MD5c7845c37c6e1bf2d5706432ec146a170
SHA1cbb7a615648861486b5f699112b07df50c59389b
SHA25660983193cd99b861549003273da2432c6a92e4f4fce21add3d2a7d0c952121bd
SHA512bd79db710f2f3cf5116db98a2c2992cd27e02263a18e00d72b589b3c4fd4447775656faa4ae19d73687b9131db8a73d7f7c7406bb6db69ea6565f0ad838abfe7
-
Filesize
1.1MB
MD55064acda65535020428af7c454cfb3be
SHA100c5c09feff1865b254c381fb5c3cbcdc7ad9028
SHA256a9dcc75c400147f9a1f14fdc29bfecc83564f308fa7f80e0c93be58b102b7a65
SHA512cbc5a1e452ae9d89cb351830f9079097a66fd5dcc0bb7b5b736c06babce01ce1888585a9ee537fd130bc394d5d64d40b47eff9dcd1bd6d99efd9e46386a594cf
-
Filesize
412KB
MD55def5fc8bab701675dd5df461cd9c25a
SHA18d69d7ca9a38e66bb01452d3b2372e3304666adf
SHA2568bc6beccf39af410f92ba5e3a65ab4c204ef1c81061b560ed3e9bee76e23f30d
SHA512762e0dfe86c480a6b8a8cab6d15cf5d68f07151a8d6624815a3345d2e43f582e44be883ce7d00a1f07e59612c3e8da8f9a761daf96d0603a375c30a5a04e1ddd