Analysis

  • max time kernel
    90s
  • max time network
    85s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 17:21

General

  • Target

    01acd7f843443b185b280ebc2ab30054.exe

  • Size

    1.1MB

  • MD5

    01acd7f843443b185b280ebc2ab30054

  • SHA1

    4f4b42c2bf49586c3baf6ae3a9324e29cb372841

  • SHA256

    af2b505a02a4c0d0195bf77dae03b8182b1ba3b8d6417e54487684b616e65a38

  • SHA512

    b9fd4f9dcd892c07b127af8b5fc26c5f34fdc1c8f1b50c7089bfe18ba2bd58e3eae4f26af9a37599d4c409aabefe9e6c0778e79515378033a122a1555ad0474c

  • SSDEEP

    12288:gp4pNfz3ymJnJ8QCFkxCaQTOl2GVqCw+v/tj8sW3:aEtl9mRda1VICwJsW3

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (5569) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01acd7f843443b185b280ebc2ab30054.exe
    "C:\Users\Admin\AppData\Local\Temp\01acd7f843443b185b280ebc2ab30054.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4952
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:3164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1497073144-2389943819-3385106915-1000\desktop.ini.exe

    Filesize

    109KB

    MD5

    05c0fc7289fab5c8dd1dbfd05d219b33

    SHA1

    8f8e434f620ccceb84fc5002fb7550b9ceaa285f

    SHA256

    1db3f8939624afab272839933ea4be17a1b4319bc04eb8eb7b4d359874d56338

    SHA512

    c6fe7b03c4167345be13f6f3076123120a94c83a60e48662d79f2592cc84ac8463e1c7c107d6769126b6cc0d29f45eec3a4f7036f1985cab8302b4c363d0493b

  • C:\Program Files (x86)\Internet Explorer\iexplore.exe.exe

    Filesize

    341KB

    MD5

    28f7c3331541fdb99a54a52f4c4845d5

    SHA1

    1ca5890f3ec6aad47bb9d06dcd55775baf2e3878

    SHA256

    e962c67c3f795a6b65f0d22b7d019ba6ccc387c2797228ef66a73b7556fdcefe

    SHA512

    40896e4f0dfaa01d72fce9e6bd5e5f143ffbb089a9ccdcd1a2e952a0cad1411c75fbda3364808fe91d5e0813df3605d77bd5cf13adc687377c03a066b76533d6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    c58c05c67392d0bc4f0b923d87ad41ca

    SHA1

    30d2fe833d7923ae4cd266f7d9266761fcc121a2

    SHA256

    2192f1ea057107b6d3ad66e4551a47d502d03b1b93b8684832375dcb22da95b5

    SHA512

    d4f9ab5af5de0fa981c436718938391c024aeb41209939b784fc76ceea6b8162eff553f0c2062b26a947431aa31627d8609d1a128468d7890a9c0b155f5e0930

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1023B

    MD5

    ec454ae457dac59ac4aee548c1f6357b

    SHA1

    f3c413400b76e7802118d7606fbea1fa3f837a4f

    SHA256

    9bb3e06ee3c447b48f58276e204f7b0ce0a81aeaefbf7da78bdfd0e2bdc2f10e

    SHA512

    8c690d419f480053e09f4f85ef6885cf93bd20e351ae7592b131d10a753bb69823233aea7876b7e7b79cf3a0166dddc23cf2697b3031657ff4281a59f36c4916

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1023B

    MD5

    66de64ac1a0d3307dd60d5474829f518

    SHA1

    f3e0b5aa3af8729d2d15fd9839527726f5302a26

    SHA256

    edc1b06e47bcb79f244b31575657bcbb8bb8938c185646e2181e19d6e232acbe

    SHA512

    37b5dba6e1eb29a1b5c668943d2c3955e0df9c9a8f7b6b7563e5c04e7a75452f0d63674b15f2e462a88a1412a4409b9d25be11bcc4437f0d89f017a5841f9aec

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    909d423c7d2ae9fffe13b70bb22c5c30

    SHA1

    ab4d05300b9531235e11715b3c242a93f4e60fbc

    SHA256

    ff6952b2d6eb1d3352c474cac830812d9db3c531ed8eea8dc3a429acfece75e8

    SHA512

    86b40afa7d2bc84d9563b2581249099d1d3c7a3ca71b87a37a63e02de25b21a252fdc60ecf754c4420b92ab99b230f7ad8f3241e1171e6654b21dc1343c72c52

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1023B

    MD5

    db5a62d4ad14513b73e5949eef36b90e

    SHA1

    6639115f55c71dd0fb97816e2dbd60f980d3e17d

    SHA256

    6affc0e2bb04e9b5cc7cd58f34959b8e953a8d9435c52d3e2449fc1b819be13e

    SHA512

    4400c9fe53b1f55bb7e40093c19a82f33da7144e4b4915c972d1c2bef93af04d2bfe1100ebdf1c68f183c66cc45e8ce06b1cc9ed0b714251ea5ac2d21843606b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1023B

    MD5

    0b5f31d4521e4ac8f82402267c2e241b

    SHA1

    3f4e44958fad85a91176ec030751ecdcc15d6137

    SHA256

    4fd1bb27d93adb6d286082def0685efa515f31cc0e76540690f6390c179234e5

    SHA512

    0f405d4b574814db30b6742eb93aa030645f90a2011e2308c8f70a13dfdc4c87b59364736c155720936b7f029dd6581bfe578faa8b0272483f1dff76ec513f33

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1023B

    MD5

    9e6ec1db951aa74650bde3398946d019

    SHA1

    8cee198535431526d8bdff0e78181bf3e1fc9582

    SHA256

    1b926eea1c67a5fec8f47c75f2302d329a02ef7239abceda5b4bee9bbe2d294f

    SHA512

    e48ca09b212716cfd00aadd9971790b60b1705313ee2068d77ef767a53ef98fdd490425600202bffabd9677fb309f66a5b9ba935c52cdcea5aac5e452d7c41e1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1023B

    MD5

    e0d4cfacfa8d90551ddfa85f25256fc0

    SHA1

    68d2aabeb0e7f5bae096d4e26186fc13357366bc

    SHA256

    c5d206a33e478cbbc06086e6bfa66375afeb41597edbc0ee6e36affc1e05db4c

    SHA512

    025ce2b6a9d2ab27085a4bd3c617359a163bb9074f414637bc7663558296b2a24bd4deca41b21380ec2695618972d65466ba36f15eb344a7ffaf66ecc4dd5405

  • C:\Windows\SysWOW64\HelpMe.exe

    Filesize

    497KB

    MD5

    f409c93fe64582be5fbc51224d88f589

    SHA1

    1c9343f5e5b4ce21043669869dd1e4245552caa4

    SHA256

    8a330076f1eda5ecfe50a6536e46f453a11ab6392b039d2d751ca96987ce9853

    SHA512

    06e155698292782e64b7860f753f68a382a8f3320caae23b836ce76bd20183d2c5eb623cb72b68416f1f94b3febe5a722396310a60757aa509ddbdede3f547da

  • C:\Windows\SysWOW64\HelpMe.exe

    Filesize

    656KB

    MD5

    42aeb35ba06d64d0dd6ad16a6a6267b1

    SHA1

    2d3008e48d0688f81ab4f135688c43ffaee50ca6

    SHA256

    f5e79f674bd393ae30df4133ead14857dc915fda93e35c1f98a89353f330a990

    SHA512

    cf64ebb3ab3c9eaa83a4e2b95f0d9e1c39941f6395916ea7798db20b6f84550968952e79ebbc1a80d326dc591b094f61093c9461007a51fc2d5591a2f99330d5

  • F:\AUTORUN.INF

    Filesize

    145B

    MD5

    ca13857b2fd3895a39f09d9dde3cca97

    SHA1

    8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

    SHA256

    cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

    SHA512

    55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

  • F:\AutoRun.exe

    Filesize

    75KB

    MD5

    9e8ef2fee1ade466bf7ea418d3e968e6

    SHA1

    f8e03b7c89ddf7b2444437ac773be33f2a6897c9

    SHA256

    f020d4f027c8b044772d389607d82380f2a6c2fa9df4b3cf119b86006f6a0a20

    SHA512

    90fde61a0fe2df5773a20f6618f255e98630a13f91b0ab5a14e1b6ca3c90347e2b059d479ab3cee15477289e8bc374bea9ef551d8121faaba339c43fb2520dbd

  • memory/3164-5540-0x0000000000400000-0x000000000047894E-memory.dmp

    Filesize

    482KB

  • memory/3164-7953-0x0000000000530000-0x0000000000531000-memory.dmp

    Filesize

    4KB

  • memory/3164-6-0x0000000000400000-0x000000000047894E-memory.dmp

    Filesize

    482KB

  • memory/3164-7-0x0000000000530000-0x0000000000531000-memory.dmp

    Filesize

    4KB

  • memory/4952-0-0x0000000000400000-0x000000000047894E-memory.dmp

    Filesize

    482KB

  • memory/4952-4521-0x0000000000400000-0x000000000047894E-memory.dmp

    Filesize

    482KB

  • memory/4952-1-0x0000000000770000-0x0000000000771000-memory.dmp

    Filesize

    4KB