Analysis

  • max time kernel
    147s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 09:54

General

  • Target

    150fd74be3ab268ea9578e39b962a0df.exe

  • Size

    1.3MB

  • MD5

    150fd74be3ab268ea9578e39b962a0df

  • SHA1

    b045cf497a57c73988a251fea099bd950e18900c

  • SHA256

    f431b39b0f9296ce42315649d6bf9a0c180f8f802d0fbba26effb52cb491e1bc

  • SHA512

    0ca8efc6f9cd929fe6c6905ae94ea69daa04caf8644d9c1418a9ab1fd81d65296bfe14178983385dd2045fc7c3a7c1355dbda29e9eaed32d7157cc9d7b842983

  • SSDEEP

    6144:ZiMmXRH6pXfSb0ceR/VFAHh1kgcs0HWHkyApOhP/SgljwRwdX/1H9kM2AfQ2C4ef:zMMpXKb0hNGh1kG0HWNAuCsltHC

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (91) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Drops startup file 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\150fd74be3ab268ea9578e39b962a0df.exe
    "C:\Users\Admin\AppData\Local\Temp\150fd74be3ab268ea9578e39b962a0df.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      PID:2000
    • C:\Users\Admin\AppData\Local\Temp\ÿØÿà
      C:\Users\Admin\AppData\Local\Temp\\ÿØÿà
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      PID:2044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3427588347-1492276948-3422228430-1000\desktop.ini.exe

    Filesize

    1.3MB

    MD5

    9a3f30944e77f656ad256706c85a8459

    SHA1

    92dfd026cf1f411b88fec8d174ad7e19393b8d5c

    SHA256

    697b22c250b63568874f424aad02ac7c6a1a33063bd5bfeee4803ed09c5500f5

    SHA512

    e44657969adb00794bd95c4e021dd2a127a9b9f9e73275ef971421fcd997c82cc4923a7e067496b8189c9684ab2f3f18551bb38a261a7e3a012bdd8610622a81

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    954B

    MD5

    4a36a855c23c44127197ea9d451538e3

    SHA1

    6b1a51b7a8e62f27a3852c8c9cf35130d0b523ee

    SHA256

    b24b89ae8a90053694a98b70914ff2885cc36983a247d40000f326513ea1c832

    SHA512

    a31bb651a8e96cfa714d960fa82a2f5ae45eed45ab76e5ddfb0a989f27a2eb8cc5d6d298d5054d200125764e919b1f861f20a81d7b5982549329f4fcb4a2c933

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    999B

    MD5

    707fcb74af04b5e6e8de3a554e2998b5

    SHA1

    e0f39c51ed405c94fda0e05e5a311912b88d8808

    SHA256

    bc528b9038a908f07c9031b6da9fbca4e7ad3b693d178002e004646aa9600636

    SHA512

    c65deb0bc3c27639a568c4501c471abde0851e127bd7e366fdc7868f4cc09947dcb9edc8841caf55bce61ae2e4760a1a661e0aa2aaa3609a8f5b0e7c6eb157fc

  • F:\AUTORUN.INF

    Filesize

    145B

    MD5

    ca13857b2fd3895a39f09d9dde3cca97

    SHA1

    8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

    SHA256

    cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

    SHA512

    55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

  • \Users\Admin\AppData\Local\Temp\ÿØÿà

    Filesize

    1.3MB

    MD5

    150fd74be3ab268ea9578e39b962a0df

    SHA1

    b045cf497a57c73988a251fea099bd950e18900c

    SHA256

    f431b39b0f9296ce42315649d6bf9a0c180f8f802d0fbba26effb52cb491e1bc

    SHA512

    0ca8efc6f9cd929fe6c6905ae94ea69daa04caf8644d9c1418a9ab1fd81d65296bfe14178983385dd2045fc7c3a7c1355dbda29e9eaed32d7157cc9d7b842983

  • \Windows\SysWOW64\HelpMe.exe

    Filesize

    1.3MB

    MD5

    c3f86cc58e8c67fc65f18cdbbe294130

    SHA1

    aa4b0da41b652c0730a38c4dadd5e0fc7cf9705c

    SHA256

    ffe8102099dd2e2d96c8ae983b660f5a851cb9d1f9edc0993ae31612e7265d60

    SHA512

    314628b7f405837f958e255d72085de0cc3aa45e30605ef42276ebc39894153ee36bfc02dd854988b1fddb2b6d1db5e1f670f78d63976f78aef27d86106812e1

  • memory/1928-0-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2000-10-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2044-19-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB