Analysis
-
max time kernel
147s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 12:49
Static task
static1
Behavioral task
behavioral1
Sample
36ba9d5937cb2c9674508dce3b1ee621.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36ba9d5937cb2c9674508dce3b1ee621.exe
Resource
win10v2004-20231215-en
General
-
Target
36ba9d5937cb2c9674508dce3b1ee621.exe
-
Size
3.8MB
-
MD5
36ba9d5937cb2c9674508dce3b1ee621
-
SHA1
2bcf0d1fbbb6aa290a886527cfa8bf7fb4a5d91f
-
SHA256
a73cecf45e6c81dd12408de21432cd47744dff621c076ce225ac4d27bcc9da11
-
SHA512
83c45d979c62ad184c7bdbbcc96090b7f2c0390df041d204cb7b562b5c51089916a44b6839553caadfd3084c94f7067c94aa7804574c922d419a203a235fe79b
-
SSDEEP
49152:iEs12B8NIMI8Sfpwotkzaxc1OGz89yBaf3WZ:iE2TIMzKpXOMGQ9EZ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 36ba9d5937cb2c9674508dce3b1ee621.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 36ba9d5937cb2c9674508dce3b1ee621.exe -
Executes dropped EXE 1 IoCs
pid Process 2140 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 836 36ba9d5937cb2c9674508dce3b1ee621.exe 836 36ba9d5937cb2c9674508dce3b1ee621.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\O: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\U: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\S: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\V: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\A: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\E: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\T: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\K: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\R: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\L: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\Y: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\Z: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\B: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\Q: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\M: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\N: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\W: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\X: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\H: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\I: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\J: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\P: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\G: 36ba9d5937cb2c9674508dce3b1ee621.exe File opened (read-only) \??\E: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 36ba9d5937cb2c9674508dce3b1ee621.exe File opened for modification F:\AUTORUN.INF HelpMe.exe File opened for modification C:\AUTORUN.INF 36ba9d5937cb2c9674508dce3b1ee621.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe File created C:\Windows\SysWOW64\HelpMe.exe 36ba9d5937cb2c9674508dce3b1ee621.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 836 wrote to memory of 2140 836 36ba9d5937cb2c9674508dce3b1ee621.exe 28 PID 836 wrote to memory of 2140 836 36ba9d5937cb2c9674508dce3b1ee621.exe 28 PID 836 wrote to memory of 2140 836 36ba9d5937cb2c9674508dce3b1ee621.exe 28 PID 836 wrote to memory of 2140 836 36ba9d5937cb2c9674508dce3b1ee621.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\36ba9d5937cb2c9674508dce3b1ee621.exe"C:\Users\Admin\AppData\Local\Temp\36ba9d5937cb2c9674508dce3b1ee621.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD580847bd40361995db98b914609dd1cc3
SHA19c52cc640d6126fc0ebef2779d624167fbd3b44c
SHA256b3700976d73d4de4ef4de87b9d5e92502d28457951d45e61a335b1fb09e562a8
SHA51299a9d672054e151f55dbdebeeea1dbf0557024b1672fe39d6956af073a2e6d7560e11c06198a357aee345e00348743323a752365cdbf4aa8ac1e68abd560655c
-
Filesize
1KB
MD5670d65c7634ea38b746ca98dba27a5a6
SHA1d9bd0907f3257d5377fefb4a1516c7873139a591
SHA256db7bd49ec4da77a0c239a2e6f15a564dda12a60ffdc3bbf84d563ea84d1a678b
SHA5121052737c05890a323c67a61dcfd63c94bbd08514d6b1d2b91db56533c6783612431a55626d192c93d7ff1fef2dd720d51bf3f3360c38851388762cb4ced7e639
-
Filesize
950B
MD526c63f48e270ac7d171b6f3ed58f889c
SHA1d8a0fe4fb687d1f3c639c13fea710056eb3ebb9a
SHA256efaff8d52c78a88023f08770131b99c88dacd70c152ebfadc9fd16bb1a504340
SHA512bb9ac63b1f31c761cec83d48ed816abdb19a83ea982eafd8ee5a88666b785985062d178bb8092497ea077a462bee6b34af5c17733091579a55fbc7570bcc6c41
-
Filesize
1KB
MD5fc757634376e5fd70ee71550624c56a6
SHA1ff6317b8fdc10e567ba06314799c89e55730addc
SHA256547aa00a661fc32d8f0938d6a7e3c5796a4ea67fddc5edf17321ca386a8488d6
SHA5120c7cad8095457f7b310d5baf20aaa94abc998d049bb6445a4c4102e9e4d4f585a1bf318b25660a843ab3d52ce610e0880ebe3bed39abc51315edd850769f7f3e
-
Filesize
3.2MB
MD58f307c097578d0f579a7ceb10bfd3e43
SHA1171a311776a968a2d7558337f62b3d0eee8fb76b
SHA256550c33088204f50626fd1d058f4062692397ea4f11d244dbe56aaabfdbcb2f59
SHA5121bbf70b4c21ee11297acac6154686224508873733334dde1cacc84410274c761202c6ccb0c9415a3c75a839052ffd8bfb00bc91c34b3f4596b3d17b3912b000e
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
3.8MB
MD536ba9d5937cb2c9674508dce3b1ee621
SHA12bcf0d1fbbb6aa290a886527cfa8bf7fb4a5d91f
SHA256a73cecf45e6c81dd12408de21432cd47744dff621c076ce225ac4d27bcc9da11
SHA51283c45d979c62ad184c7bdbbcc96090b7f2c0390df041d204cb7b562b5c51089916a44b6839553caadfd3084c94f7067c94aa7804574c922d419a203a235fe79b
-
Filesize
3.8MB
MD5908ea1fef70b683227776e6de047663f
SHA13ef310e360e1db0a5d9afe626a67ae8a413dc186
SHA2563209d3d9260bea0b846cf3549afb8cc445385729d8db17891d43dbecbeeeb9f3
SHA51202c550d79c9c423a75a7bc44a699430e6882179bc7cf663a8b3d9f8c2a4ec9f5f2a176bfff203d9b243c0cecb4a327e14a3482d9a08e34325e03fcc692c1291e