Analysis
-
max time kernel
168s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 12:53
Behavioral task
behavioral1
Sample
20011bd3c31203ba0c8601873099e09c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20011bd3c31203ba0c8601873099e09c.exe
Resource
win10v2004-20231215-en
General
-
Target
20011bd3c31203ba0c8601873099e09c.exe
-
Size
1.1MB
-
MD5
20011bd3c31203ba0c8601873099e09c
-
SHA1
d1878d02f3ae76fdd5ed8d53df784dc4223e7251
-
SHA256
0fc3a33196e96828b2855c78b84ecac050535a2fcbf0a84db3d0925e120fab00
-
SHA512
985086155ca19b4ce4d46894318fb335543d6651614ba5a92882a3a61814053264ed2c539cad98ea84d84a62b39c6cc37acffd421220f51c0636e0671bb7f72e
-
SSDEEP
12288:5MMpXKb0hNGh1kG0HWnAL7MMpXKb0hNGh1kG0HWnALt0:5MMpXS0hN0V0H7MMpXS0hN0V0H2
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 20011bd3c31203ba0c8601873099e09c.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x000b0000000132dc-2.dat aspack_v212_v242 behavioral1/files/0x0030000000016609-38.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-53.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 20011bd3c31203ba0c8601873099e09c.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 20011bd3c31203ba0c8601873099e09c.exe -
Executes dropped EXE 1 IoCs
pid Process 2704 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2860 20011bd3c31203ba0c8601873099e09c.exe 2860 20011bd3c31203ba0c8601873099e09c.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\B: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\E: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\U: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\Y: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\Z: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\N: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\P: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\R: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\T: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\G: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\Q: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\S: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\W: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\A: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\I: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\L: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\X: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\H: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\M: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\J: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\K: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\V: 20011bd3c31203ba0c8601873099e09c.exe File opened (read-only) \??\H: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF HelpMe.exe File opened for modification F:\AUTORUN.INF 20011bd3c31203ba0c8601873099e09c.exe File opened for modification C:\AUTORUN.INF 20011bd3c31203ba0c8601873099e09c.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 20011bd3c31203ba0c8601873099e09c.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2704 2860 20011bd3c31203ba0c8601873099e09c.exe 29 PID 2860 wrote to memory of 2704 2860 20011bd3c31203ba0c8601873099e09c.exe 29 PID 2860 wrote to memory of 2704 2860 20011bd3c31203ba0c8601873099e09c.exe 29 PID 2860 wrote to memory of 2704 2860 20011bd3c31203ba0c8601873099e09c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\20011bd3c31203ba0c8601873099e09c.exe"C:\Users\Admin\AppData\Local\Temp\20011bd3c31203ba0c8601873099e09c.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d2cd1fc1d16538b06acfd93c6b41d110
SHA1a9ba996506f64d77cb0927d926f3cc0474842785
SHA256a21a6c12bd8fe3e7867cc88c4d4c9d9aa22c9de7786054f6a35942840c685466
SHA512ea9bf469804eed25277b45df55f535ac5cea3ec0e9b2fb42cde957013badd076be44d29a7771bd76fc9b323736c3f369b96d2eb6078768aac463e2959d0d52d4
-
Filesize
954B
MD53be5c2263184c623843b54190cc65a2a
SHA14904be422e5dcec69f2a64058bb3feceb6113b8e
SHA25696c38df266a9f3dce2fcb5fecf6296ee6d22c251dfc089cccd2e8357ec3a8619
SHA512e4ee9e31336042501e8e6232712877e02176f598c69a6259764b057963e7d09672899354e95f61e7133310d06d57a7159ad75345e4dc9ab839898e6c15f30329
-
Filesize
1KB
MD54f9236fb932790ee5ddb43e7fdf064d8
SHA1b02ccd6fef1414956648bc643261ae62576592b9
SHA256569dc7cf5e2c7dac42a9a8c721962443a88157f28ae0dc4ce5e1a539e5cfe2af
SHA5128b2e6443492628cbaa6f962ee3088a8fb6bfe78d4ccdf7d8ae7e2a78fedd65ccb3aa6010daa033e96a7d303ab6ed33c5bf98523aaf61ae38edc65d1893b286b7
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
1.1MB
MD520011bd3c31203ba0c8601873099e09c
SHA1d1878d02f3ae76fdd5ed8d53df784dc4223e7251
SHA2560fc3a33196e96828b2855c78b84ecac050535a2fcbf0a84db3d0925e120fab00
SHA512985086155ca19b4ce4d46894318fb335543d6651614ba5a92882a3a61814053264ed2c539cad98ea84d84a62b39c6cc37acffd421220f51c0636e0671bb7f72e
-
Filesize
1.1MB
MD58dcf1d3cf8a65044536cf9dc94062acc
SHA11aeedf58783fab1904ccac3b7f2216925d2f9612
SHA2563622ddcb572a10fd37cc0ec4c5d679755a41cefb03c41e479372c5752a7039f0
SHA512c3df6e664d338b59279919a8769a91b3359bcb2ab0fd5c303b6b5140867e6063e9ebfbbecab1e400f32da17cdb8f95a7f40941ff6b3a159c0ef3ec9c559e4c5f