Analysis
-
max time kernel
5s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 21:33
Behavioral task
behavioral1
Sample
1d204e87778aa4f2bc6ea57ec7e572bc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d204e87778aa4f2bc6ea57ec7e572bc.exe
Resource
win10v2004-20231222-en
General
-
Target
1d204e87778aa4f2bc6ea57ec7e572bc.exe
-
Size
355KB
-
MD5
1d204e87778aa4f2bc6ea57ec7e572bc
-
SHA1
c639e72776ec925045d9c132104c312322600aaf
-
SHA256
7a88cb3b1d3f5af9c7ba8dad5b996422a00d825101e603552ba230c366643f3f
-
SHA512
7fcab35831c6116e6e199efee2e91b1e3fc196cf67ebb1531b7c4aa83b2253d6db346247083b7d90c7a737e5124bb4fd5c2f2d6aa18ab1575f2c8eae375858e7
-
SSDEEP
6144:riMmXRH6pXfSb0ceR/VFAHh1kgcs0HW1kyAp08wEYkCAMf:ZMMpXKb0hNGh1kG0HWnAOERho
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" w¨Wƒ -
Renames multiple (63) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe -
Executes dropped EXE 2 IoCs
pid Process 1224 HelpMe.exe 2020 w¨Wƒ -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: w¨Wƒ File opened (read-only) \??\P: w¨Wƒ File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\I: w¨Wƒ File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\B: w¨Wƒ File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\E: w¨Wƒ File opened (read-only) \??\R: w¨Wƒ File opened (read-only) \??\T: w¨Wƒ File opened (read-only) \??\V: w¨Wƒ File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\O: w¨Wƒ File opened (read-only) \??\X: w¨Wƒ File opened (read-only) \??\M: w¨Wƒ File opened (read-only) \??\W: w¨Wƒ File opened (read-only) \??\Z: w¨Wƒ File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\G: w¨Wƒ File opened (read-only) \??\L: w¨Wƒ File opened (read-only) \??\K: w¨Wƒ File opened (read-only) \??\Y: w¨Wƒ File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\A: w¨Wƒ File opened (read-only) \??\J: w¨Wƒ File opened (read-only) \??\Q: w¨Wƒ File opened (read-only) \??\U: w¨Wƒ File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\H: w¨Wƒ File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\S: w¨Wƒ -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF HelpMe.exe File opened for modification C:\AUTORUN.INF HelpMe.exe File opened for modification F:\AUTORUN.INF w¨Wƒ -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 1d204e87778aa4f2bc6ea57ec7e572bc.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe File created C:\Windows\SysWOW64\HelpMe.exe w¨Wƒ File opened for modification C:\Windows\SysWOW64\HelpMe.exe 1d204e87778aa4f2bc6ea57ec7e572bc.exe File created C:\Windows\SysWOW64\notepad.exe.exe 1d204e87778aa4f2bc6ea57ec7e572bc.exe -
Drops file in Program Files directory 57 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\ast.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\7z.sfx.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\da.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\el.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\es.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\co.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\en.ttt.exe HelpMe.exe File created C:\Program Files\7-Zip\History.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\et.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\eu.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\it.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\ba.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\de.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\ga.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\hr.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\ka.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\af.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\fi.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\an.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\bn.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\ext.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\fr.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\gl.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\hy.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\7-zip.dll.exe HelpMe.exe File created C:\Program Files\7-Zip\7zCon.sfx.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\az.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\be.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\cs.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\fur.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\7z.exe.exe HelpMe.exe File created C:\Program Files\7-Zip\descript.ion.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\ca.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\hu.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\kab.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\cy.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\is.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\7-zip.chm.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\bg.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\fy.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\ja.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\7-zip32.dll.exe HelpMe.exe File created C:\Program Files\7-Zip\7z.dll.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\ar.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\he.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\kaa.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\br.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\eo.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\gu.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\kk.txt.exe HelpMe.exe File created C:\Program Files (x86)\Internet Explorer\iexplore.exe.exe 1d204e87778aa4f2bc6ea57ec7e572bc.exe File created C:\Program Files\7-Zip\7zFM.exe.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\fa.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\hi.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\id.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\Lang\io.txt.exe HelpMe.exe File created C:\Program Files\7-Zip\7zG.exe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3208 1d204e87778aa4f2bc6ea57ec7e572bc.exe 3208 1d204e87778aa4f2bc6ea57ec7e572bc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3208 wrote to memory of 1224 3208 1d204e87778aa4f2bc6ea57ec7e572bc.exe 23 PID 3208 wrote to memory of 1224 3208 1d204e87778aa4f2bc6ea57ec7e572bc.exe 23 PID 3208 wrote to memory of 1224 3208 1d204e87778aa4f2bc6ea57ec7e572bc.exe 23 PID 3208 wrote to memory of 2020 3208 1d204e87778aa4f2bc6ea57ec7e572bc.exe 22 PID 3208 wrote to memory of 2020 3208 1d204e87778aa4f2bc6ea57ec7e572bc.exe 22 PID 3208 wrote to memory of 2020 3208 1d204e87778aa4f2bc6ea57ec7e572bc.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d204e87778aa4f2bc6ea57ec7e572bc.exe"C:\Users\Admin\AppData\Local\Temp\1d204e87778aa4f2bc6ea57ec7e572bc.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\w¨WƒC:\Users\Admin\AppData\Local\Temp\\w¨Wƒ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2020
-
-
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
PID:1224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1023B
MD5dc447428d6878387feb29db15c390240
SHA17d6c50866ec9fcbf1f655bcf3de03fbd44a2b586
SHA256017573d38112f77073dae9d12dbbe6f8460e1e94d16a69e796924538491f4ae9
SHA51295245064b8b6d8bcc08eba5c45e7740628dc2c4bc1ed03e83df19f5511391a82c9ef17d8709e4d32840fefcbd4b9b0491f327e20baa94dc7b87e0aec242fd58c
-
Filesize
1023B
MD5965de79ef2c176654b37f3b7fc1dc2c9
SHA1157930662251e6cfcc6a3a6b6c44c6d8739ba1d9
SHA256e84dd3c759342378e52008996a59be47d529e470d0249c4a46327fa6c15bbea6
SHA512f5c073d7b6d11ffcdb43cbbe1969d478b88a0e1fcad9455b86695134f2530f6d1857a15cb509861f5a5b1237a973de51815bec17d98cbf14723d614c6db39b16
-
Filesize
1023B
MD5afd5d0bc45c01a70c7a1b07ea2d4d4e5
SHA19f0a12c337cc8f3e6bb70d41236690bc6c5a5f24
SHA256ce92e4b7c85a9d8424daa5a10a3db054b6cf28bf645bdc0a5814f4a97c3d5254
SHA512d4fb18c329b5ce4e4d49c5b217fd52864456eda15bbd2a931a4c6deefcea5a7fa86c934704d9cdf173011c2075c34a47a5e3ef48e12f6113d66c6e58049fe334
-
Filesize
1KB
MD5106d32dbb2b0641803e30c9476bf438b
SHA1d2a21d0ef42cf0ec93256fbe73d0ff5d6a0977c9
SHA256197ed688f49070ab218caa03e003f5e08cb0e2d281c9f06af292aa0fab5c0c97
SHA51220ed82b7211579319caf8b9078d1c749e8c6e6588e31a400c4734cd653bbb24a68582c40395dea5ab581a9c8e4c433765e08578d281293e1a41c2b95534a24ff
-
Filesize
1023B
MD55a7a12d44412e6f33b40d65be3efbef6
SHA12a21651373e4c8629fc1dcbd6424c32a3abcb60c
SHA256f59e4a4a676a60fcffd2af8b75f22e052c8f06b676f1be8246e81c80433757ae
SHA51276f93f9bc7b8022973f0eede936b8bb9898d2acd93e5e1f2aa61adde3763eb8e65fbd21646037ab25178a36b6a35d2a4765e28abca13bc939a5ca01ff5428d60
-
Filesize
1023B
MD5605195ef659334ac50397ac5973b3c27
SHA120d5e0d941dd77fac713cfc887c57116e97b274f
SHA256f36a0d4b0c8772d6e1323cdb926e9bd3ff9b9193826dcbe78a3ebd81eb29c657
SHA5127d6716631a14766247d39d1d7a90b98ce0274227b37fff2c8c007be984709655655523d8c48655e91b67249aa5cf52c4a31d0059bdb9c251f5243001c70262e3
-
Filesize
1KB
MD52453ea21ad349ecacbe478be80f851d2
SHA140142d8317d33b915871b0de0854ebac73005f0b
SHA2564d24113791d1d276172e2ce729693b6d021d736045010ff3f9488c0ba52daa60
SHA512ffbca3578431633e377442a1bb56a050706bae0ada4ec49f73be850dc731b4f3a8ec022040cc1c90e771fba0cd44ccfbd67d81fe631e462e784cca8134a3641b
-
Filesize
1023B
MD510bade3c7bd2f1b05c54018cee7097ff
SHA16f786425415dc54cbda78bc7c40951d8849069d8
SHA2564deddfd3f6d0b73a584857a03673517aa5b08f9822a6653a074b8b1712447626
SHA5124e5f8e5997f756913d3fb544773952a983ccf5d354d20084c634105c2b8aa29daad96921a69f717b3cf4560e7ca78359c63b21e57d22539d28272168bf00c4dd
-
Filesize
1KB
MD5274cd1bd90abb6aa1d63a260a35ef331
SHA1e18f61514968dd25d1a404eaf4872e3d8876fddd
SHA256526a1841dabaeb073082528c276f318e4561e14797448c17c20653ed57b09db0
SHA5123b155b210fd631230de795712306bd0dbd8081c74368a7f3b379449ac3038c8d5ce2ee89cd20022d6389ef64e436a67ca3b1e06172ba393efdffab09cba4ca43
-
Filesize
1023B
MD5e34c1b141186354f73e20fc6423e1aae
SHA12cb40a1bd9b6377b170fc25a004087735f46b86a
SHA256bfeee72deffeac6283f82d9661169c24ce0a58a014f99c614d53e17a395d1856
SHA512f4b5ca23282cf9ee90880d73c24f8e7856988d7ab927e2be00f0caa8e0045368e4a1b7d2e8ed6e1a3202c9bbbc530e669b06fbce39048b15af2230618819f476
-
Filesize
1KB
MD5bc93e0a5b4267b2f78091069d79b95bc
SHA1f0cb51400328cc78453be8d074bb3e5e6d896a96
SHA2564e685cee3c04823ec02ebd6c026caba034227d84851d2c6443f3665d08411ace
SHA51286ab90719c917b763f0da063393ac03d6da97751432062521408800cf904d80f6d4c09dd75965fdd52c59ff2ddc5b8bccc715913180c7da1f37563b8ef0a2d54
-
Filesize
1023B
MD52f8c5687871bf6463ace1181cf84ee83
SHA172556dc43b06d9bc47d6d0816083cd9633172143
SHA256f62059c4af01e31093425ae93ed9bc3844d82fc8b3123e80ab4a795801d55747
SHA51214860560ee20215f5fe86550d19d526f5bee45f0923f55f35f206cc7467c0cec782efdf3a30c06c0917ebe505b23e6408f2ad219fbd8d450adba00d59056283d
-
Filesize
1023B
MD5133aedccc0110932b71607d6d239f82d
SHA10b4af1fa7d272612ed73e6e202500e5cbb3e9be7
SHA25689ad67899619183bf37781c7626ef87132881b3babaaf9ca18ef7f5054566afe
SHA5129b30cc148192a06c68cef9257df64cbfb0aa99dadbb077993107b8fef0df798f4182b6fde93d3efa9c8e2c69983ae3c2acba4986ab379de5d300d54ab1351ae5
-
Filesize
1023B
MD582e0968f9dc07cb93dce9d45c54cfce1
SHA113704cfe1f00827a1077968a24cffef5a39af876
SHA256478f0ebb15aac00ca490f553dc6c690eab4de64ab3bdc41cb0bf5af0ec498db9
SHA51281d3f2ff2ac8a3e2eef74dbb8740ffced461b64afdb1c8c56087c1e29a48e0e7d7558b2a408a3837a01ac7b012cf458e3b1effd342cb9bfbce9baa979a842f45
-
Filesize
1KB
MD5b0ff99461cf4c5b6c8edb997eee7620b
SHA111b856168e78050f87537f9d2203dcccd65857d5
SHA256f07e90a44b7c5f83fc07a709ab4ef6787ff488e2a0a9e7e6f7d31ab0008ee361
SHA512bb2b290604025800ed9ba07ec3e92030268cd5f5fee292146ae3ad9fc3da3d74eecdfe5ee581964b06d2a5e6dff547766a4f9fc367f7f3ef87d1353a31949d56
-
Filesize
1023B
MD5c254e155c5012c1089bfa99b905a6c25
SHA1c583e5a9c502d70a3d91150bbc8decd4e5af2dd4
SHA25640bf832dbbe6670b859f202f7c22744be24de88a716d20bae3be4a256ec6fb9c
SHA51263743445a7fb4d77ec9d204df8469804b689420ae06da019f2c58d6b85bf8b8f2835937cbaa29abaea157df94b1c1240c00ca5a324061da552247bbd7f1f6eb2
-
Filesize
1023B
MD54dddee55727ee5137e5973609b23ae55
SHA13dd590801fb22a2cace5af6d64e52d31b0ba4b14
SHA25637ae4bf982fbb6518b1e91c65d8f732c2a5785e43cc5888408da3a54f19e271c
SHA512a6b61a8ce6918e6e0cc1be3e80ed93631cfe7d2ed6134624dd95d7a98bfca616a79333007f6edb361ebcf60de9475f8b60a4e0f2038ddbbfb8a6c2abe8b7bee6
-
Filesize
1KB
MD50ffcb9331ec887c32507792f07be7a8e
SHA176419c691904a480e7fce621316f5499eea97a65
SHA256cead4c1f574cf97dc78bc5653248848228de6753d2c8042a4aeb6a73312fbb0e
SHA51207a34d23fdd05f45031793ac316224b2c0aa2151030beb49e8a8a5e48957899f13f18f0dd8ea41835ddacbd9073395d9959c1de17b44917e847ff59af70a1833