Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 23:16
Behavioral task
behavioral1
Sample
ff491936f7b08fc81b348605bffeecfd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ff491936f7b08fc81b348605bffeecfd.exe
Resource
win10v2004-20231215-en
General
-
Target
ff491936f7b08fc81b348605bffeecfd.exe
-
Size
1.4MB
-
MD5
ff491936f7b08fc81b348605bffeecfd
-
SHA1
1464a3b886d2d047bece397e376cee756c1f8479
-
SHA256
8ab2b12fc4468e752db72f828f2b0d676574a7c84212785193286d7748be6199
-
SHA512
568874092a7cc5441799fb45213bbc3f58f53903a6fb1fae44528deac8bebbfd68f2613974e37ad81c7f11b9e06a2e785e06ca5ee47a1e0eb76f105f0a4824d7
-
SSDEEP
6144:ZiMmXRH6pXfSb0ceR/VFAHh1kgcs0HWHkyApOhP/SgljwRwdX/1H9kM2AfQ2C4eD:zMMpXKb0hNGh1kG0HWNAuCsltH9K
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" ff491936f7b08fc81b348605bffeecfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x000b000000012234-2.dat aspack_v212_v242 behavioral1/files/0x0035000000016cb3-38.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-55.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk ff491936f7b08fc81b348605bffeecfd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk ff491936f7b08fc81b348605bffeecfd.exe -
Executes dropped EXE 1 IoCs
pid Process 1876 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2024 ff491936f7b08fc81b348605bffeecfd.exe 2024 ff491936f7b08fc81b348605bffeecfd.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\M: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\P: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\T: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\J: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\N: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\Q: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\K: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\A: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\E: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\O: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\W: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\V: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\Y: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\Z: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\B: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\G: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\H: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\R: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\L: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\S: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\U: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\X: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\I: ff491936f7b08fc81b348605bffeecfd.exe File opened (read-only) \??\P: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF ff491936f7b08fc81b348605bffeecfd.exe File opened for modification C:\AUTORUN.INF ff491936f7b08fc81b348605bffeecfd.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe ff491936f7b08fc81b348605bffeecfd.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1876 2024 ff491936f7b08fc81b348605bffeecfd.exe 28 PID 2024 wrote to memory of 1876 2024 ff491936f7b08fc81b348605bffeecfd.exe 28 PID 2024 wrote to memory of 1876 2024 ff491936f7b08fc81b348605bffeecfd.exe 28 PID 2024 wrote to memory of 1876 2024 ff491936f7b08fc81b348605bffeecfd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff491936f7b08fc81b348605bffeecfd.exe"C:\Users\Admin\AppData\Local\Temp\ff491936f7b08fc81b348605bffeecfd.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:1876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5fd4a05e7680d1a546e6fdfdfa68e8754
SHA1c900ffa6a67eb630902f32d1f9234dbc098b2573
SHA256c74639ba7390375d0d9f326459f993698101cf7b03f5d938711c6d37dc13f21b
SHA512d244f232150837a86f9e8a0f8d62798ffec5d9747dd4c4f4fc87e581446a50349f1b634033cedd4be7c001a693b6319a8abaed59e6749a146ed382debe0678c7
-
Filesize
1KB
MD59250bb104c31341bb58f55fe889905c7
SHA18613fb35f9fc4d49b179454e7790dc0b985951c1
SHA256a914dbc9fca1592902091c5cb5e708f13892e111e4258a1f3f971c809c881561
SHA512e75d53844c9cdd6b9ca3e061130c997589a00be40b629153bdd98d4ef9688fb471a54a5914744a214381bebfbcb61bf9050567c0c1a4aba364aa6f147886166f
-
Filesize
950B
MD5b751a89ddf66a2af108b435219b29477
SHA13913383f3f726d346a79d3dd5f5fd091f64f8268
SHA2565127a9afd0639b17c30370de9a51adb7324ff271987463ccb1455c8b7425f8a6
SHA5126ebb8a79a5b8c7e3b78fd1f445cc3f38cd265ecc82cbff08275fd27bc79359267b9186522fdd3d62a1adae3a23fe99bbbd70c65d872e5e725540b626a48c2f72
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
1.4MB
MD5ff491936f7b08fc81b348605bffeecfd
SHA11464a3b886d2d047bece397e376cee756c1f8479
SHA2568ab2b12fc4468e752db72f828f2b0d676574a7c84212785193286d7748be6199
SHA512568874092a7cc5441799fb45213bbc3f58f53903a6fb1fae44528deac8bebbfd68f2613974e37ad81c7f11b9e06a2e785e06ca5ee47a1e0eb76f105f0a4824d7
-
Filesize
1.4MB
MD5ef4fa4775d9d42e36d4478730921bd1c
SHA119021763513d8b561ee00b270fe9e7a627c4ed2d
SHA256de2f5bc6f099019155db6c7f38a7fc90fe6dd4d6c89e1764835f8711fb19cfc1
SHA512c34978daa3122e3ba5705bbeede99f5b5dc79fec441e567b6ed95b8fe6364cf7aea3f1b6bb098e06787f75811c02aca6eb44b7c36010f0e89984242bcfef7817