Analysis

  • max time kernel
    5s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 21:33

General

  • Target

    1d204e87778aa4f2bc6ea57ec7e572bc.exe

  • Size

    355KB

  • MD5

    1d204e87778aa4f2bc6ea57ec7e572bc

  • SHA1

    c639e72776ec925045d9c132104c312322600aaf

  • SHA256

    7a88cb3b1d3f5af9c7ba8dad5b996422a00d825101e603552ba230c366643f3f

  • SHA512

    7fcab35831c6116e6e199efee2e91b1e3fc196cf67ebb1531b7c4aa83b2253d6db346247083b7d90c7a737e5124bb4fd5c2f2d6aa18ab1575f2c8eae375858e7

  • SSDEEP

    6144:riMmXRH6pXfSb0ceR/VFAHh1kgcs0HW1kyAp08wEYkCAMf:ZMMpXKb0hNGh1kG0HWnAOERho

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (63) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 57 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d204e87778aa4f2bc6ea57ec7e572bc.exe
    "C:\Users\Admin\AppData\Local\Temp\1d204e87778aa4f2bc6ea57ec7e572bc.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3208
    • C:\Users\Admin\AppData\Local\Temp\w¨Wƒ
      C:\Users\Admin\AppData\Local\Temp\\w¨Wƒ
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      PID:2020
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Program Files directory
      PID:1224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1023B

    MD5

    dc447428d6878387feb29db15c390240

    SHA1

    7d6c50866ec9fcbf1f655bcf3de03fbd44a2b586

    SHA256

    017573d38112f77073dae9d12dbbe6f8460e1e94d16a69e796924538491f4ae9

    SHA512

    95245064b8b6d8bcc08eba5c45e7740628dc2c4bc1ed03e83df19f5511391a82c9ef17d8709e4d32840fefcbd4b9b0491f327e20baa94dc7b87e0aec242fd58c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1023B

    MD5

    965de79ef2c176654b37f3b7fc1dc2c9

    SHA1

    157930662251e6cfcc6a3a6b6c44c6d8739ba1d9

    SHA256

    e84dd3c759342378e52008996a59be47d529e470d0249c4a46327fa6c15bbea6

    SHA512

    f5c073d7b6d11ffcdb43cbbe1969d478b88a0e1fcad9455b86695134f2530f6d1857a15cb509861f5a5b1237a973de51815bec17d98cbf14723d614c6db39b16

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1023B

    MD5

    afd5d0bc45c01a70c7a1b07ea2d4d4e5

    SHA1

    9f0a12c337cc8f3e6bb70d41236690bc6c5a5f24

    SHA256

    ce92e4b7c85a9d8424daa5a10a3db054b6cf28bf645bdc0a5814f4a97c3d5254

    SHA512

    d4fb18c329b5ce4e4d49c5b217fd52864456eda15bbd2a931a4c6deefcea5a7fa86c934704d9cdf173011c2075c34a47a5e3ef48e12f6113d66c6e58049fe334

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    106d32dbb2b0641803e30c9476bf438b

    SHA1

    d2a21d0ef42cf0ec93256fbe73d0ff5d6a0977c9

    SHA256

    197ed688f49070ab218caa03e003f5e08cb0e2d281c9f06af292aa0fab5c0c97

    SHA512

    20ed82b7211579319caf8b9078d1c749e8c6e6588e31a400c4734cd653bbb24a68582c40395dea5ab581a9c8e4c433765e08578d281293e1a41c2b95534a24ff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1023B

    MD5

    5a7a12d44412e6f33b40d65be3efbef6

    SHA1

    2a21651373e4c8629fc1dcbd6424c32a3abcb60c

    SHA256

    f59e4a4a676a60fcffd2af8b75f22e052c8f06b676f1be8246e81c80433757ae

    SHA512

    76f93f9bc7b8022973f0eede936b8bb9898d2acd93e5e1f2aa61adde3763eb8e65fbd21646037ab25178a36b6a35d2a4765e28abca13bc939a5ca01ff5428d60

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1023B

    MD5

    605195ef659334ac50397ac5973b3c27

    SHA1

    20d5e0d941dd77fac713cfc887c57116e97b274f

    SHA256

    f36a0d4b0c8772d6e1323cdb926e9bd3ff9b9193826dcbe78a3ebd81eb29c657

    SHA512

    7d6716631a14766247d39d1d7a90b98ce0274227b37fff2c8c007be984709655655523d8c48655e91b67249aa5cf52c4a31d0059bdb9c251f5243001c70262e3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    2453ea21ad349ecacbe478be80f851d2

    SHA1

    40142d8317d33b915871b0de0854ebac73005f0b

    SHA256

    4d24113791d1d276172e2ce729693b6d021d736045010ff3f9488c0ba52daa60

    SHA512

    ffbca3578431633e377442a1bb56a050706bae0ada4ec49f73be850dc731b4f3a8ec022040cc1c90e771fba0cd44ccfbd67d81fe631e462e784cca8134a3641b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1023B

    MD5

    10bade3c7bd2f1b05c54018cee7097ff

    SHA1

    6f786425415dc54cbda78bc7c40951d8849069d8

    SHA256

    4deddfd3f6d0b73a584857a03673517aa5b08f9822a6653a074b8b1712447626

    SHA512

    4e5f8e5997f756913d3fb544773952a983ccf5d354d20084c634105c2b8aa29daad96921a69f717b3cf4560e7ca78359c63b21e57d22539d28272168bf00c4dd

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    274cd1bd90abb6aa1d63a260a35ef331

    SHA1

    e18f61514968dd25d1a404eaf4872e3d8876fddd

    SHA256

    526a1841dabaeb073082528c276f318e4561e14797448c17c20653ed57b09db0

    SHA512

    3b155b210fd631230de795712306bd0dbd8081c74368a7f3b379449ac3038c8d5ce2ee89cd20022d6389ef64e436a67ca3b1e06172ba393efdffab09cba4ca43

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1023B

    MD5

    e34c1b141186354f73e20fc6423e1aae

    SHA1

    2cb40a1bd9b6377b170fc25a004087735f46b86a

    SHA256

    bfeee72deffeac6283f82d9661169c24ce0a58a014f99c614d53e17a395d1856

    SHA512

    f4b5ca23282cf9ee90880d73c24f8e7856988d7ab927e2be00f0caa8e0045368e4a1b7d2e8ed6e1a3202c9bbbc530e669b06fbce39048b15af2230618819f476

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    bc93e0a5b4267b2f78091069d79b95bc

    SHA1

    f0cb51400328cc78453be8d074bb3e5e6d896a96

    SHA256

    4e685cee3c04823ec02ebd6c026caba034227d84851d2c6443f3665d08411ace

    SHA512

    86ab90719c917b763f0da063393ac03d6da97751432062521408800cf904d80f6d4c09dd75965fdd52c59ff2ddc5b8bccc715913180c7da1f37563b8ef0a2d54

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1023B

    MD5

    2f8c5687871bf6463ace1181cf84ee83

    SHA1

    72556dc43b06d9bc47d6d0816083cd9633172143

    SHA256

    f62059c4af01e31093425ae93ed9bc3844d82fc8b3123e80ab4a795801d55747

    SHA512

    14860560ee20215f5fe86550d19d526f5bee45f0923f55f35f206cc7467c0cec782efdf3a30c06c0917ebe505b23e6408f2ad219fbd8d450adba00d59056283d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1023B

    MD5

    133aedccc0110932b71607d6d239f82d

    SHA1

    0b4af1fa7d272612ed73e6e202500e5cbb3e9be7

    SHA256

    89ad67899619183bf37781c7626ef87132881b3babaaf9ca18ef7f5054566afe

    SHA512

    9b30cc148192a06c68cef9257df64cbfb0aa99dadbb077993107b8fef0df798f4182b6fde93d3efa9c8e2c69983ae3c2acba4986ab379de5d300d54ab1351ae5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1023B

    MD5

    82e0968f9dc07cb93dce9d45c54cfce1

    SHA1

    13704cfe1f00827a1077968a24cffef5a39af876

    SHA256

    478f0ebb15aac00ca490f553dc6c690eab4de64ab3bdc41cb0bf5af0ec498db9

    SHA512

    81d3f2ff2ac8a3e2eef74dbb8740ffced461b64afdb1c8c56087c1e29a48e0e7d7558b2a408a3837a01ac7b012cf458e3b1effd342cb9bfbce9baa979a842f45

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    b0ff99461cf4c5b6c8edb997eee7620b

    SHA1

    11b856168e78050f87537f9d2203dcccd65857d5

    SHA256

    f07e90a44b7c5f83fc07a709ab4ef6787ff488e2a0a9e7e6f7d31ab0008ee361

    SHA512

    bb2b290604025800ed9ba07ec3e92030268cd5f5fee292146ae3ad9fc3da3d74eecdfe5ee581964b06d2a5e6dff547766a4f9fc367f7f3ef87d1353a31949d56

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1023B

    MD5

    c254e155c5012c1089bfa99b905a6c25

    SHA1

    c583e5a9c502d70a3d91150bbc8decd4e5af2dd4

    SHA256

    40bf832dbbe6670b859f202f7c22744be24de88a716d20bae3be4a256ec6fb9c

    SHA512

    63743445a7fb4d77ec9d204df8469804b689420ae06da019f2c58d6b85bf8b8f2835937cbaa29abaea157df94b1c1240c00ca5a324061da552247bbd7f1f6eb2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1023B

    MD5

    4dddee55727ee5137e5973609b23ae55

    SHA1

    3dd590801fb22a2cace5af6d64e52d31b0ba4b14

    SHA256

    37ae4bf982fbb6518b1e91c65d8f732c2a5785e43cc5888408da3a54f19e271c

    SHA512

    a6b61a8ce6918e6e0cc1be3e80ed93631cfe7d2ed6134624dd95d7a98bfca616a79333007f6edb361ebcf60de9475f8b60a4e0f2038ddbbfb8a6c2abe8b7bee6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    0ffcb9331ec887c32507792f07be7a8e

    SHA1

    76419c691904a480e7fce621316f5499eea97a65

    SHA256

    cead4c1f574cf97dc78bc5653248848228de6753d2c8042a4aeb6a73312fbb0e

    SHA512

    07a34d23fdd05f45031793ac316224b2c0aa2151030beb49e8a8a5e48957899f13f18f0dd8ea41835ddacbd9073395d9959c1de17b44917e847ff59af70a1833

  • memory/1224-10447-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1224-5-0x00000000020E0000-0x00000000020E1000-memory.dmp

    Filesize

    4KB

  • memory/1224-11797-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1224-11889-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1224-11839-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1224-11809-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1224-6916-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1224-11879-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1224-11827-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1224-11849-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1224-11819-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1224-2051-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1224-11783-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1224-11867-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1224-11859-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2020-11850-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2020-6924-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2020-11798-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2020-11868-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2020-11860-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2020-11828-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2020-11788-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2020-2065-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2020-11880-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2020-10-0x0000000000560000-0x0000000000561000-memory.dmp

    Filesize

    4KB

  • memory/2020-11820-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2020-10448-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2020-11810-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2020-11890-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2020-11840-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3208-15-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3208-0-0x0000000002220000-0x0000000002221000-memory.dmp

    Filesize

    4KB