Analysis

  • max time kernel
    147s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 12:49

General

  • Target

    36ba9d5937cb2c9674508dce3b1ee621.exe

  • Size

    3.8MB

  • MD5

    36ba9d5937cb2c9674508dce3b1ee621

  • SHA1

    2bcf0d1fbbb6aa290a886527cfa8bf7fb4a5d91f

  • SHA256

    a73cecf45e6c81dd12408de21432cd47744dff621c076ce225ac4d27bcc9da11

  • SHA512

    83c45d979c62ad184c7bdbbcc96090b7f2c0390df041d204cb7b562b5c51089916a44b6839553caadfd3084c94f7067c94aa7804574c922d419a203a235fe79b

  • SSDEEP

    49152:iEs12B8NIMI8Sfpwotkzaxc1OGz89yBaf3WZ:iE2TIMzKpXOMGQ9EZ

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (91) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36ba9d5937cb2c9674508dce3b1ee621.exe
    "C:\Users\Admin\AppData\Local\Temp\36ba9d5937cb2c9674508dce3b1ee621.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      PID:2140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-452311807-3713411997-1028535425-1000\desktop.ini.exe

    Filesize

    3.8MB

    MD5

    80847bd40361995db98b914609dd1cc3

    SHA1

    9c52cc640d6126fc0ebef2779d624167fbd3b44c

    SHA256

    b3700976d73d4de4ef4de87b9d5e92502d28457951d45e61a335b1fb09e562a8

    SHA512

    99a9d672054e151f55dbdebeeea1dbf0557024b1672fe39d6956af073a2e6d7560e11c06198a357aee345e00348743323a752365cdbf4aa8ac1e68abd560655c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    670d65c7634ea38b746ca98dba27a5a6

    SHA1

    d9bd0907f3257d5377fefb4a1516c7873139a591

    SHA256

    db7bd49ec4da77a0c239a2e6f15a564dda12a60ffdc3bbf84d563ea84d1a678b

    SHA512

    1052737c05890a323c67a61dcfd63c94bbd08514d6b1d2b91db56533c6783612431a55626d192c93d7ff1fef2dd720d51bf3f3360c38851388762cb4ced7e639

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    950B

    MD5

    26c63f48e270ac7d171b6f3ed58f889c

    SHA1

    d8a0fe4fb687d1f3c639c13fea710056eb3ebb9a

    SHA256

    efaff8d52c78a88023f08770131b99c88dacd70c152ebfadc9fd16bb1a504340

    SHA512

    bb9ac63b1f31c761cec83d48ed816abdb19a83ea982eafd8ee5a88666b785985062d178bb8092497ea077a462bee6b34af5c17733091579a55fbc7570bcc6c41

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    fc757634376e5fd70ee71550624c56a6

    SHA1

    ff6317b8fdc10e567ba06314799c89e55730addc

    SHA256

    547aa00a661fc32d8f0938d6a7e3c5796a4ea67fddc5edf17321ca386a8488d6

    SHA512

    0c7cad8095457f7b310d5baf20aaa94abc998d049bb6445a4c4102e9e4d4f585a1bf318b25660a843ab3d52ce610e0880ebe3bed39abc51315edd850769f7f3e

  • C:\Windows\SysWOW64\HelpMe.exe

    Filesize

    3.2MB

    MD5

    8f307c097578d0f579a7ceb10bfd3e43

    SHA1

    171a311776a968a2d7558337f62b3d0eee8fb76b

    SHA256

    550c33088204f50626fd1d058f4062692397ea4f11d244dbe56aaabfdbcb2f59

    SHA512

    1bbf70b4c21ee11297acac6154686224508873733334dde1cacc84410274c761202c6ccb0c9415a3c75a839052ffd8bfb00bc91c34b3f4596b3d17b3912b000e

  • F:\AUTORUN.INF

    Filesize

    145B

    MD5

    ca13857b2fd3895a39f09d9dde3cca97

    SHA1

    8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

    SHA256

    cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

    SHA512

    55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

  • F:\AutoRun.exe

    Filesize

    3.8MB

    MD5

    36ba9d5937cb2c9674508dce3b1ee621

    SHA1

    2bcf0d1fbbb6aa290a886527cfa8bf7fb4a5d91f

    SHA256

    a73cecf45e6c81dd12408de21432cd47744dff621c076ce225ac4d27bcc9da11

    SHA512

    83c45d979c62ad184c7bdbbcc96090b7f2c0390df041d204cb7b562b5c51089916a44b6839553caadfd3084c94f7067c94aa7804574c922d419a203a235fe79b

  • \Windows\SysWOW64\HelpMe.exe

    Filesize

    3.8MB

    MD5

    908ea1fef70b683227776e6de047663f

    SHA1

    3ef310e360e1db0a5d9afe626a67ae8a413dc186

    SHA256

    3209d3d9260bea0b846cf3549afb8cc445385729d8db17891d43dbecbeeeb9f3

    SHA512

    02c550d79c9c423a75a7bc44a699430e6882179bc7cf663a8b3d9f8c2a4ec9f5f2a176bfff203d9b243c0cecb4a327e14a3482d9a08e34325e03fcc692c1291e

  • memory/836-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/836-77-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2140-10-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB