Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:20
Behavioral task
behavioral1
Sample
0e435a6b11a79ade89f63a1a4f465176.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e435a6b11a79ade89f63a1a4f465176.exe
Resource
win10v2004-20231215-en
General
-
Target
0e435a6b11a79ade89f63a1a4f465176.exe
-
Size
2.5MB
-
MD5
0e435a6b11a79ade89f63a1a4f465176
-
SHA1
1c6b5d46b29f1a663d0ad725be76ad614acc2549
-
SHA256
b5c4707b95e18a0ed17732091b644fb2cc04b407546dbd8fe1977d88a1502ebb
-
SHA512
37daad440ea23cea48f286b933b4028a64b8a7fa25201756852fe1bf0272c11d2917f8043f3738dd376c2f569d7a2ef1404b96c29bd139ae1e8a99705582255d
-
SSDEEP
6144:LiMmXRH6pXfSb0ceR/VFAHh1kgcs0HW1kyApHhP+gDzvRAExJex5gfzDVtkhKbYM:5MMpXKb0hNGh1kG0HWnALbix5G+8NH
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 0e435a6b11a79ade89f63a1a4f465176.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x000e000000012232-2.dat aspack_v212_v242 behavioral1/files/0x0007000000015c6f-38.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-65.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 0e435a6b11a79ade89f63a1a4f465176.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 0e435a6b11a79ade89f63a1a4f465176.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe -
Executes dropped EXE 1 IoCs
pid Process 2000 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2852 0e435a6b11a79ade89f63a1a4f465176.exe 2852 0e435a6b11a79ade89f63a1a4f465176.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\L: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\N: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\Z: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\I: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\B: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\E: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\R: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\V: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\O: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\U: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\W: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\G: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\M: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\P: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\Y: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\J: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\S: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\T: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\X: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\A: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\Q: 0e435a6b11a79ade89f63a1a4f465176.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\K: 0e435a6b11a79ade89f63a1a4f465176.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 0e435a6b11a79ade89f63a1a4f465176.exe File opened for modification C:\AUTORUN.INF 0e435a6b11a79ade89f63a1a4f465176.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 0e435a6b11a79ade89f63a1a4f465176.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2000 2852 0e435a6b11a79ade89f63a1a4f465176.exe 28 PID 2852 wrote to memory of 2000 2852 0e435a6b11a79ade89f63a1a4f465176.exe 28 PID 2852 wrote to memory of 2000 2852 0e435a6b11a79ade89f63a1a4f465176.exe 28 PID 2852 wrote to memory of 2000 2852 0e435a6b11a79ade89f63a1a4f465176.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e435a6b11a79ade89f63a1a4f465176.exe"C:\Users\Admin\AppData\Local\Temp\0e435a6b11a79ade89f63a1a4f465176.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5432169ef4cc034b958b87099ffe4b311
SHA1561b385f4091b13cc305d593e8734246286be254
SHA256879bc5aa97aa470d39a55f1c2057c36197c9d1a64b17a628137cdf72edafda5a
SHA5120db6ba44346db197db1591c849b8064c12c5ff659de30a76ab241f99ac99ee38b3bb8e4095b1dc63a2a56906e53f67fdd0d4f96dc5d2b8dc4b2916fd1dfbad1d
-
Filesize
954B
MD54547000770f25a0468f248e3aed39c58
SHA1dc2be9639da171c9b8e41bc382845dad1b32b786
SHA256dc15f74a97fd05b46b4d7e786014c11c4a40edd87c3a1acbfedf5814c1ca8694
SHA51226ef21068057b0f89bdc35288ed14fc8cf231c49ff9a0a980d0c6f8ae004bf9370aa49c17f360690eab59f8e83b719d4c03282286e0d52bb62c39dfb34d42800
-
Filesize
1KB
MD5f6f324a3c0e5b9577e7c4ce70219380e
SHA1c46aea6d93bbdcbb83f5e136898a5ca2cd2b3581
SHA2565e4380ac889175d779b443d683cf55a0ffca531b991d6aefaf9287d7a0379d67
SHA51212904c284fd94811a7606308078ab48b3b3ca5b06d11ea2c868b358d7e0d2cdd59b70663d64d6e8e799ba2a8fa64f0f4f8887b98337928d1de0ba74ddb9b5877
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
2.5MB
MD50e435a6b11a79ade89f63a1a4f465176
SHA11c6b5d46b29f1a663d0ad725be76ad614acc2549
SHA256b5c4707b95e18a0ed17732091b644fb2cc04b407546dbd8fe1977d88a1502ebb
SHA51237daad440ea23cea48f286b933b4028a64b8a7fa25201756852fe1bf0272c11d2917f8043f3738dd376c2f569d7a2ef1404b96c29bd139ae1e8a99705582255d
-
Filesize
2.5MB
MD50351b0159dda3db5d4998f6ca8c9b210
SHA129f5223c31dc533820fa139249fb99c0d4b41826
SHA25642ecf8efc5bca0d591c38612a6e11fcf68ab036330d8c8795059959fee76f168
SHA512a9327fa24913afd52ecce1f94c5ebe5d7d7bcfa8e98f6780a17f4f0036c6dc979257e7591c8a40f7f25297ddc31f23fd17377c207d92c679d5945c6e0f53d287