Analysis

  • max time kernel
    6s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 13:41

General

  • Target

    1a5895dd6b1e8878086b3329020ff67a.exe

  • Size

    290KB

  • MD5

    1a5895dd6b1e8878086b3329020ff67a

  • SHA1

    4bbf9fb0b24eb120f0f1ee4d3440fc43ac381416

  • SHA256

    0cc1d0306f59a4e5d555928c128df6bb95e1916c3ebf535f3b4aa8b4b91b0453

  • SHA512

    c4acb4ce07b90c43813258986a34dd463ef11330fd06b66a7c275d9e6fe1219a3e77874968a06b809cae1f2df449095e9fb787c29d3a2d1ed811a255c3194166

  • SSDEEP

    6144:LiMmXRH6pXfSb0ceR/VFAHh1kgcs0HW1kyApHhP+gDzvRs:5MMpXKb0hNGh1kG0HWnALbs

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\L
    C:\Users\Admin\AppData\Local\Temp\\L
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Executes dropped EXE
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    PID:868
  • C:\Windows\SysWOW64\HelpMe.exe
    C:\Windows\system32\HelpMe.exe
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Executes dropped EXE
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    PID:2544
  • C:\Users\Admin\AppData\Local\Temp\1a5895dd6b1e8878086b3329020ff67a.exe
    "C:\Users\Admin\AppData\Local\Temp\1a5895dd6b1e8878086b3329020ff67a.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\HelpMe.exe

    Filesize

    92KB

    MD5

    b9e75584fbdfbce3e0814797a1219622

    SHA1

    a86f90440678e7c7b3728b21182b2b3b8fc170a9

    SHA256

    75e49936ba26131d7995b3fa38049882abd74db2fd4326af79fad341512866ab

    SHA512

    64d2d08ebdd00fed8de92e6e7ae4c83c6af809459d81eedc42945691b68ee832f37aa7bf0c3faa1e0b01fe6399b0b016edf2905ef0bfdad10e1166f11e34cfdb

  • memory/868-20-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2216-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2544-9-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB