Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
032dea2d1b675752515ca40898f051d2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
032dea2d1b675752515ca40898f051d2.exe
Resource
win10v2004-20231215-en
General
-
Target
032dea2d1b675752515ca40898f051d2.exe
-
Size
880KB
-
MD5
032dea2d1b675752515ca40898f051d2
-
SHA1
9c6a22799cb1c07f28095d314b4aed0d532846f0
-
SHA256
d7b1bfbe9ec9e5b7907d9bb193e777d180a9007ea369c9a287a18f486707fbaa
-
SHA512
e5833389342bf4d7bf2ee7a17e14407ab9f5e796e181823dc71e54ce17819b94c8c16d5d66944a04df6291f8d3705179e40b87203ead79327185eff72e7578a9
-
SSDEEP
12288:Cp4pNfz3ymJnJ8QCFkxCaQTOl2QU8E4vbAfxu/F0ShFgFDTf2:8Etl9mRda1hc4kfxueSG2
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 032dea2d1b675752515ca40898f051d2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 032dea2d1b675752515ca40898f051d2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 032dea2d1b675752515ca40898f051d2.exe -
Executes dropped EXE 1 IoCs
pid Process 2132 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2964 032dea2d1b675752515ca40898f051d2.exe 2964 032dea2d1b675752515ca40898f051d2.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\K: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\O: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\Q: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\Z: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\B: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\P: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\X: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\I: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\J: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\M: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\W: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\Y: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\R: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\S: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\V: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\A: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\E: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\N: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\H: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\T: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\G: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\L: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\U: 032dea2d1b675752515ca40898f051d2.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 032dea2d1b675752515ca40898f051d2.exe File opened for modification C:\AUTORUN.INF 032dea2d1b675752515ca40898f051d2.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 032dea2d1b675752515ca40898f051d2.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2132 2964 032dea2d1b675752515ca40898f051d2.exe 28 PID 2964 wrote to memory of 2132 2964 032dea2d1b675752515ca40898f051d2.exe 28 PID 2964 wrote to memory of 2132 2964 032dea2d1b675752515ca40898f051d2.exe 28 PID 2964 wrote to memory of 2132 2964 032dea2d1b675752515ca40898f051d2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\032dea2d1b675752515ca40898f051d2.exe"C:\Users\Admin\AppData\Local\Temp\032dea2d1b675752515ca40898f051d2.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
881KB
MD57d10b83296bdd4a1a9f3426b996613a9
SHA1fe4a95b2674b8a080ad3433df77f22ad0ad114ea
SHA256b587a8891c8203793d19aaf0f01df95a6db725c769439e16001fdfdfe588fc07
SHA5125c8e8be445e48872f3041d34a2750e0c15ff9928dbb3c49dd138b5e9f7cde6cf4d7d3199de037ed94cde8ecce4974bdcddef88767ebc72c7721b8b14bf952c45
-
Filesize
1KB
MD5c40f75236d5864f28b61ba5c57984f2b
SHA1ca513354cc7f8378539aa1bedc04bc9060d64bd6
SHA256dc417dfac40e5f6e2153970d93b36b0f182c3374c3137a61751f5ca766ff6fe6
SHA5121f2e91171a18c0e070458ae373ce2b33004851b1bdda3ee187ff56aa4957b74b7c4bb2fb1cebab380933f720858b218b2aff0b4409805c4fa90d2c0232c3a8b5
-
Filesize
950B
MD59630a3b908e0ffc039a75362e9c993d7
SHA14289d68ac224336b8a5821aed16af13e58f6f193
SHA2560f80e169abb4e59517844dbdd7d3fb2147d481ac0e1085162f40facdf26190a6
SHA512c52cd03f6adab8f7ac2552d83f00a0b57a4b38c796171ed90dc50d271523df1ae1ea636145f16de977d80f92b512c659f22966ae96237435502ed6247210117b
-
Filesize
19KB
MD51bc9c095bd00edb6aefe059d16304ff9
SHA14054058b62006bc7c826652b502be165dbd1b7df
SHA256f62ee1f7526d8503bc36aec5d26f6595f732f30b291b0899bf9ba88d1715d558
SHA512685166b9615e9c8d8c646cd4e3aa52ba3a82c895664a3e2cdbd3139c4723e38e3d2971552e985a02b04a7caebdec1f07eeb2ba667cf864849d0cf418f013dfbe
-
Filesize
11KB
MD5cf2b5a18be817815e0e4081b183990c4
SHA1dfbd771e3c609524509ea15894027946285a7bbd
SHA2560dce68e7f0e4b55ad1f182c60692049fd0ce9e6e74ed9f8fa07a5a9da1ba9349
SHA512f2111e3f4416e4690899709dbc37b0ad030cd2f4b73f41226d7759040071a62ba51fb9d70f4bcb3f01e5a3a6c27178abba2ab87f9372b935dd34e31a39cb8ed4
-
Filesize
412KB
MD57be81d8bcc63d5499682d65a9b65efa8
SHA197089a23ea16880081c5c5f8672254309789613f
SHA256e4e1210dcfa7b87b18f612779f42125b6416b43069538ef93885201409e8cbe7
SHA51205ae6bea58e66bbbba1f841a1b67a63d2dff2d83493e13f698ac988f1de5318ab9190d6db51d39726677a0c5c265a7510c7366300cb3cb5cb057cbef228c8b46
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
388KB
MD57a947bf3d74042976f4325fbd9b18aa7
SHA1391740372b61d4a60cdfcdbb3505ee9db7598603
SHA25671cae251c6554f30484dd633519715ea1216048d027ebfd6f00326d8af5fcbb3
SHA512af2b441e2a3553b7ac1869f0e51aa98e749dd7eb0d5da006daeb1ef28d26f656b7d1cf76590649305a1167366a5be77f8083f51dacca7c981ef72de2f70fcbba
-
Filesize
588KB
MD5bf29be0fd82db574dc96371e3af4f55a
SHA1e46a16d43a0c39f2a8c82349f31c21dff9f77b8d
SHA2568a8cac11a8c330d2d31dba06d52e35f702ffc94a648dbe2f2781b69c7ec530be
SHA512a390e629735121231fa97d5220bf5b95d4a0ce2bc3e1deb4e6c23e265ee1d0fce8c68f032e651d183a04050f076ba9a35bcd1b61f23fb5622012295eb032061d
-
Filesize
372KB
MD50731d8a812894006d538185c51f0f3bc
SHA17604d18bb4db867c4eb46e0e65eecad9e4819a54
SHA2560b39abfc005ba9769f7384cf8dc03fdd872a37946dd408a839f038111f132eb2
SHA51228c4885f25578ffb96c347411d41a305746fcf24a2aab2577ea0d5194eea29f7d6e2bb0f965e5cd597640269089e65d3a716bf469111380d20044b7241ebc72c