Analysis

  • max time kernel
    145s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 05:44

General

  • Target

    0900d3c3c10879419b17809610e4b269.exe

  • Size

    2.9MB

  • MD5

    0900d3c3c10879419b17809610e4b269

  • SHA1

    2628631d4907d397c7fff1ef4c4881f3046c7b83

  • SHA256

    9a5b768679a82140e299f3845f53a7156a2c179d4f6e2ba11b883f0e98fb3174

  • SHA512

    bbafbe58d34362890f00b3c979057c4d33c6d211cefedadedf16646650bb3ec7b68581ea61a5c146e9b81d3ed3ea594c3c76fa3f1f1017cecfbcc1bcdf763227

  • SSDEEP

    12288:Tp4pNfz3ymJnJ8QCFkxCaQTOlOb47MMpXKb0hNGh1kG0HWnALue:tEtl9mRda1rMMpXS0hN0V0Hj

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (91) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0900d3c3c10879419b17809610e4b269.exe
    "C:\Users\Admin\AppData\Local\Temp\0900d3c3c10879419b17809610e4b269.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      PID:1948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    26cf24c444697ab99d4ffc5f1084b904

    SHA1

    2f5eb4bc6f386bd6c157e9e00de5c2f283d7fa79

    SHA256

    47ec3e552e57c974469c4f441301da6c45b038b721ff27117b2a3171146cea82

    SHA512

    7274918d6d192b913fcb425923289f6be2e06e71f75c68c85633dfd5f44f829d5dc9e698152894d44a385d065b18f311c70aefa01c5fa84bedf2a1f8b4b88a2c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    950B

    MD5

    d7570009cfe29459e03dfb86b5009ee5

    SHA1

    0c4a233a6142b1b4aa2861a5cba96b6d67bcc079

    SHA256

    537f0706138dee6e558e37a08065a46f5f27884c594965b8e3f7188f0814a086

    SHA512

    155b60adf5454fec181403268985a6cf7ed134aa35a5a732e9ebffed640cca20ee18b5c8a840fe2e67cbca970025e8d9f5e7307f1571b3cc3bbc3ebbd3cdb89e

  • C:\Windows\SysWOW64\HelpMe.exe

    Filesize

    382KB

    MD5

    cf2c4b8f64cd81e6d77f112ad2c64775

    SHA1

    87fa9de1aff51e5a50603c64483ee5283deb19cf

    SHA256

    02461c082cfc1484c96f3115d5eca036b9c08519440ec2c43e49dd6df96be9e7

    SHA512

    7ba6ac0fc7c47601c19e7cd567428214697c85e052b62622dcb0eacd96c500d7e137f6645e770666894ff47e38413326e1ef754f428eaae9f0199e5b97059194

  • C:\Windows\SysWOW64\HelpMe.exe

    Filesize

    93KB

    MD5

    c7845c37c6e1bf2d5706432ec146a170

    SHA1

    cbb7a615648861486b5f699112b07df50c59389b

    SHA256

    60983193cd99b861549003273da2432c6a92e4f4fce21add3d2a7d0c952121bd

    SHA512

    bd79db710f2f3cf5116db98a2c2992cd27e02263a18e00d72b589b3c4fd4447775656faa4ae19d73687b9131db8a73d7f7c7406bb6db69ea6565f0ad838abfe7

  • \Windows\SysWOW64\HelpMe.exe

    Filesize

    1.1MB

    MD5

    5064acda65535020428af7c454cfb3be

    SHA1

    00c5c09feff1865b254c381fb5c3cbcdc7ad9028

    SHA256

    a9dcc75c400147f9a1f14fdc29bfecc83564f308fa7f80e0c93be58b102b7a65

    SHA512

    cbc5a1e452ae9d89cb351830f9079097a66fd5dcc0bb7b5b736c06babce01ce1888585a9ee537fd130bc394d5d64d40b47eff9dcd1bd6d99efd9e46386a594cf

  • \Windows\SysWOW64\HelpMe.exe

    Filesize

    412KB

    MD5

    5def5fc8bab701675dd5df461cd9c25a

    SHA1

    8d69d7ca9a38e66bb01452d3b2372e3304666adf

    SHA256

    8bc6beccf39af410f92ba5e3a65ab4c204ef1c81061b560ed3e9bee76e23f30d

    SHA512

    762e0dfe86c480a6b8a8cab6d15cf5d68f07151a8d6624815a3345d2e43f582e44be883ce7d00a1f07e59612c3e8da8f9a761daf96d0603a375c30a5a04e1ddd

  • memory/1948-9-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1948-236-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2252-1-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB