Analysis

  • max time kernel
    145s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 08:37

General

  • Target

    139231a2b6bd765a0a0f315270f255b6.exe

  • Size

    704KB

  • MD5

    139231a2b6bd765a0a0f315270f255b6

  • SHA1

    a9995484a3ebc3eeb1ee2ceea8e88016eaf07cea

  • SHA256

    e39d180c833e4047aa2ab2b8fa6f2e2e47d078739740889a77ce0bbe32f282d8

  • SHA512

    120c134e52e1e44c47137937db93165494a2c2bbb16f2d1dc5de676478029122b9a54d8d005cfbeee8ed89172eea0bf3429f690a4737913ce3f6039caa508957

  • SSDEEP

    12288:gp4pNfz3ymJnJ8QCFkxCaQTOl2GVq/ZFhTohS1:aEtl9mRda1VI/ZFhTohS1

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (91) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\139231a2b6bd765a0a0f315270f255b6.exe
    "C:\Users\Admin\AppData\Local\Temp\139231a2b6bd765a0a0f315270f255b6.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      PID:1124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    44adcbc58b81c702af79c2c6a1019581

    SHA1

    8305b2b35888d658fd7aed9e380906ad42a4dbc2

    SHA256

    bbc20f3ae451cf892b712a8b5b23c8ae7ebdf6795ad2c12f7ce75c95e2c8e571

    SHA512

    0fec1eaed31bccdea20c15a333f281dbf6770069ff64ccf39032f5c2ea4f1e0233ff08ccc2267079db9c8e49368816f496e3c9533500e68f7506370ee0a00aed

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    950B

    MD5

    33087ebc816518f84f4831bc6b0a013b

    SHA1

    315084118c94676404d166869df8b6f68023339d

    SHA256

    44ad3f462188b1b26d203219207d6b77c1946b8082a0df17fefe8497619da63c

    SHA512

    0443c7eec8a4b3b52029236e49b82dc90a6eba854a355cda9b421f14735ee9fa53b181333a716ecbe91e98dcb05413d1dc796d2b2bec5706bb249fac6c6a50ab

  • C:\Windows\SysWOW64\HelpMe.exe

    Filesize

    92KB

    MD5

    bf6776af1db02718fc39db2bd70b17af

    SHA1

    5b0d737841e2858616cf7e4186efb29d03a28acc

    SHA256

    eccfe353b6552c68d905773566180b079dd28004ae9120c590d68773ace23223

    SHA512

    cd198acf39eca69b75e1415a57509209d360289314069cdd39aa769edcfaf0cf9533a704d0a320bf6a6a4ab074e120aa589e60e0833e5c7ae8645ff8f6ca3fcf

  • \Windows\SysWOW64\HelpMe.exe

    Filesize

    689KB

    MD5

    843cf03f8b77640543fe0f815534c965

    SHA1

    63cbddb8cc7fc2c2c35d0d2eca1d09ec1ce9cd7b

    SHA256

    79286676e35d81d733843bba451209b954a17f27b80f28b210b3874b90b9864a

    SHA512

    77940984d9ddb44966c73d9309d502088873981b8d6b0c333247eb4ea0d26b8a0c1644ca108241b2b0c247e99cc8b8b4c2d43283b07d642ceba6e272549294aa

  • memory/1124-236-0x0000000000400000-0x000000000047894E-memory.dmp

    Filesize

    482KB

  • memory/1124-13-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/1124-11-0x0000000000400000-0x000000000047894E-memory.dmp

    Filesize

    482KB

  • memory/2976-4-0x0000000001E30000-0x0000000001EA9000-memory.dmp

    Filesize

    484KB

  • memory/2976-241-0x0000000001E30000-0x0000000001EA9000-memory.dmp

    Filesize

    484KB

  • memory/2976-235-0x0000000000400000-0x000000000047894E-memory.dmp

    Filesize

    482KB

  • memory/2976-0-0x0000000000400000-0x000000000047894E-memory.dmp

    Filesize

    482KB

  • memory/2976-2-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB