Analysis

  • max time kernel
    145s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28-12-2023 23:16

General

  • Target

    ff491936f7b08fc81b348605bffeecfd.exe

  • Size

    1.4MB

  • MD5

    ff491936f7b08fc81b348605bffeecfd

  • SHA1

    1464a3b886d2d047bece397e376cee756c1f8479

  • SHA256

    8ab2b12fc4468e752db72f828f2b0d676574a7c84212785193286d7748be6199

  • SHA512

    568874092a7cc5441799fb45213bbc3f58f53903a6fb1fae44528deac8bebbfd68f2613974e37ad81c7f11b9e06a2e785e06ca5ee47a1e0eb76f105f0a4824d7

  • SSDEEP

    6144:ZiMmXRH6pXfSb0ceR/VFAHh1kgcs0HWHkyApOhP/SgljwRwdX/1H9kM2AfQ2C4eD:zMMpXKb0hNGh1kG0HWNAuCsltH9K

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (91) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff491936f7b08fc81b348605bffeecfd.exe
    "C:\Users\Admin\AppData\Local\Temp\ff491936f7b08fc81b348605bffeecfd.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      PID:1876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3601492379-692465709-652514833-1000\desktop.ini.exe

    Filesize

    1.4MB

    MD5

    fd4a05e7680d1a546e6fdfdfa68e8754

    SHA1

    c900ffa6a67eb630902f32d1f9234dbc098b2573

    SHA256

    c74639ba7390375d0d9f326459f993698101cf7b03f5d938711c6d37dc13f21b

    SHA512

    d244f232150837a86f9e8a0f8d62798ffec5d9747dd4c4f4fc87e581446a50349f1b634033cedd4be7c001a693b6319a8abaed59e6749a146ed382debe0678c7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    9250bb104c31341bb58f55fe889905c7

    SHA1

    8613fb35f9fc4d49b179454e7790dc0b985951c1

    SHA256

    a914dbc9fca1592902091c5cb5e708f13892e111e4258a1f3f971c809c881561

    SHA512

    e75d53844c9cdd6b9ca3e061130c997589a00be40b629153bdd98d4ef9688fb471a54a5914744a214381bebfbcb61bf9050567c0c1a4aba364aa6f147886166f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    950B

    MD5

    b751a89ddf66a2af108b435219b29477

    SHA1

    3913383f3f726d346a79d3dd5f5fd091f64f8268

    SHA256

    5127a9afd0639b17c30370de9a51adb7324ff271987463ccb1455c8b7425f8a6

    SHA512

    6ebb8a79a5b8c7e3b78fd1f445cc3f38cd265ecc82cbff08275fd27bc79359267b9186522fdd3d62a1adae3a23fe99bbbd70c65d872e5e725540b626a48c2f72

  • F:\AUTORUN.INF

    Filesize

    145B

    MD5

    ca13857b2fd3895a39f09d9dde3cca97

    SHA1

    8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

    SHA256

    cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

    SHA512

    55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

  • F:\AutoRun.exe

    Filesize

    1.4MB

    MD5

    ff491936f7b08fc81b348605bffeecfd

    SHA1

    1464a3b886d2d047bece397e376cee756c1f8479

    SHA256

    8ab2b12fc4468e752db72f828f2b0d676574a7c84212785193286d7748be6199

    SHA512

    568874092a7cc5441799fb45213bbc3f58f53903a6fb1fae44528deac8bebbfd68f2613974e37ad81c7f11b9e06a2e785e06ca5ee47a1e0eb76f105f0a4824d7

  • \Windows\SysWOW64\HelpMe.exe

    Filesize

    1.4MB

    MD5

    ef4fa4775d9d42e36d4478730921bd1c

    SHA1

    19021763513d8b561ee00b270fe9e7a627c4ed2d

    SHA256

    de2f5bc6f099019155db6c7f38a7fc90fe6dd4d6c89e1764835f8711fb19cfc1

    SHA512

    c34978daa3122e3ba5705bbeede99f5b5dc79fec441e567b6ed95b8fe6364cf7aea3f1b6bb098e06787f75811c02aca6eb44b7c36010f0e89984242bcfef7817

  • memory/1876-9-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2024-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB