Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 22:11
Behavioral task
behavioral1
Sample
1e12f76b8242600b220cc17e8180f56f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1e12f76b8242600b220cc17e8180f56f.exe
Resource
win10v2004-20231215-en
General
-
Target
1e12f76b8242600b220cc17e8180f56f.exe
-
Size
1.1MB
-
MD5
1e12f76b8242600b220cc17e8180f56f
-
SHA1
298bb10733b96d4cb3aeedf9eff63482fb61aa89
-
SHA256
3f1e50578251b3285556a1498f3c958c8470dc98387eb595243e331084d353b4
-
SHA512
2f1a17408283868aac7284c9a37403daa5fe8b022b29121b84b7bb2650d3dddccaa0b8dd04c1e63f24f4fdf5e5f7dbb81b4d041f96d258e0896769133ced7e46
-
SSDEEP
6144:LiMmXRH6pXfSb0ceR/VFAHh1kgcs0HW1kyApHhP+gDzvRx:5MMpXKb0hNGh1kG0HWnALbx
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 1e12f76b8242600b220cc17e8180f56f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x000b000000012238-2.dat aspack_v212_v242 behavioral1/files/0x000700000001655c-42.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-59.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 1e12f76b8242600b220cc17e8180f56f.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 1e12f76b8242600b220cc17e8180f56f.exe -
Executes dropped EXE 1 IoCs
pid Process 2312 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2780 1e12f76b8242600b220cc17e8180f56f.exe 2780 1e12f76b8242600b220cc17e8180f56f.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\X: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\N: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\G: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\J: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\L: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\Q: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\Z: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\E: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\R: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\M: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\B: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\I: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\O: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\W: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\Y: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\H: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\U: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\T: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\V: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\K: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\S: 1e12f76b8242600b220cc17e8180f56f.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\A: 1e12f76b8242600b220cc17e8180f56f.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 1e12f76b8242600b220cc17e8180f56f.exe File opened for modification C:\AUTORUN.INF 1e12f76b8242600b220cc17e8180f56f.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 1e12f76b8242600b220cc17e8180f56f.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe File opened for modification C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe File created C:\Windows\SysWOW64\notepad.exe.exe HelpMe.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\iexplore.exe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2312 HelpMe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2312 2780 1e12f76b8242600b220cc17e8180f56f.exe 28 PID 2780 wrote to memory of 2312 2780 1e12f76b8242600b220cc17e8180f56f.exe 28 PID 2780 wrote to memory of 2312 2780 1e12f76b8242600b220cc17e8180f56f.exe 28 PID 2780 wrote to memory of 2312 2780 1e12f76b8242600b220cc17e8180f56f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e12f76b8242600b220cc17e8180f56f.exe"C:\Users\Admin\AppData\Local\Temp\1e12f76b8242600b220cc17e8180f56f.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5c00f3f4f90b6d604a455e2e269f1fa9b
SHA16443eb982a60e2e9749c86a5dd08e7973ed4ced6
SHA25698cbaaf3dfe4515b223389a1ffad33c65c1c37fd132826b8eab83add4cd8725c
SHA5128080d01725b57af841cadd83113da6d2b95aa434b5cd4d36ff472f8d05c14ec7119a8fc716e3be6851ff528378992acb7254c62556610e4990144cd184de8f5a
-
Filesize
1KB
MD5ef8f623931f69899913ce7c022af2c8f
SHA17cc8024512de179854eefd501f3c576ecb30b132
SHA256fa06e47096df80024980e05bbd3e1d4f1475e4b2441c7f653f0f3670850174b9
SHA512c802c8c62878d90fb73946718798d92226c2f3509c45ad6708ccf7f4e554ffa300b8de893afee74b55ee2ddee632f77a975469ad31bd25a655cd67a41b72587b
-
Filesize
954B
MD5aa51d9396e6d4d1e58156803de66df99
SHA129d38e75bd4b9bd82b924b62a9489430ea425ca6
SHA2564b88e37fd43fa103a959a1128f36d0c7914afc60dbccba7bee8502bedbbe0fe2
SHA5127accbcf8b01cc683f534e8063cdd16b9742181271e94b3ab01fc3885915fec0fff8a731b478024fa093344df9da2fe793ade92496321c3336f19a15da8de1e9f
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
1.1MB
MD51e12f76b8242600b220cc17e8180f56f
SHA1298bb10733b96d4cb3aeedf9eff63482fb61aa89
SHA2563f1e50578251b3285556a1498f3c958c8470dc98387eb595243e331084d353b4
SHA5122f1a17408283868aac7284c9a37403daa5fe8b022b29121b84b7bb2650d3dddccaa0b8dd04c1e63f24f4fdf5e5f7dbb81b4d041f96d258e0896769133ced7e46
-
Filesize
1.1MB
MD59777b4264fc449b6ae824e858ea8f135
SHA12d1c59f7bb3b8bc224127f77a4ccfda5f800e636
SHA2561239279f5d80640f5542229eed44880ceb47d8871dd091e62eaf3167c14ff180
SHA5121e810e4aa67395d469e4743a0b46c8808fbc30324b1ee2a0393ee47fd1edbc4d3f63908a29ba1196ccbdcd9503fbb1afc159097623ed77a23aa7c87d9277deea