Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 14:17
Behavioral task
behavioral1
Sample
398646f1bca7b2630599fe83a5e7501b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
398646f1bca7b2630599fe83a5e7501b.exe
Resource
win10v2004-20231215-en
General
-
Target
398646f1bca7b2630599fe83a5e7501b.exe
-
Size
10.7MB
-
MD5
398646f1bca7b2630599fe83a5e7501b
-
SHA1
2de320aad4ac27e790cdc1eceeb5d60f51370b83
-
SHA256
d9ee97ebfca901fc2296137e2219d4115a9b4a68799cbfcf7a09224b2addf481
-
SHA512
7bdcb6c4fa70d09905fbf5b6696934f4a5adfc662cf606321d5f5a6fda0ae6383df937657fe7ff40f0eb9d884a79482fee646a168aedb1e8e1cf0f72099ea483
-
SSDEEP
98304:1i0li07IMzKpXOMGQKIMzKpXOMGQFIMzKpXOMGQJ:40I07I2lyKI2lyFI2lyJ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 398646f1bca7b2630599fe83a5e7501b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x000e000000012232-2.dat aspack_v212_v242 behavioral1/files/0x0008000000015c63-39.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-43.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 398646f1bca7b2630599fe83a5e7501b.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 398646f1bca7b2630599fe83a5e7501b.exe -
Executes dropped EXE 1 IoCs
pid Process 2416 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2300 398646f1bca7b2630599fe83a5e7501b.exe 2300 398646f1bca7b2630599fe83a5e7501b.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\B: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\I: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\J: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\K: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\W: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\X: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\H: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\P: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\T: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\V: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\L: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\M: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\Q: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\E: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\N: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\Y: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\Z: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\G: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\U: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\O: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\R: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\S: 398646f1bca7b2630599fe83a5e7501b.exe File opened (read-only) \??\B: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 398646f1bca7b2630599fe83a5e7501b.exe File opened for modification C:\AUTORUN.INF 398646f1bca7b2630599fe83a5e7501b.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe File created C:\Windows\SysWOW64\HelpMe.exe 398646f1bca7b2630599fe83a5e7501b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2416 2300 398646f1bca7b2630599fe83a5e7501b.exe 28 PID 2300 wrote to memory of 2416 2300 398646f1bca7b2630599fe83a5e7501b.exe 28 PID 2300 wrote to memory of 2416 2300 398646f1bca7b2630599fe83a5e7501b.exe 28 PID 2300 wrote to memory of 2416 2300 398646f1bca7b2630599fe83a5e7501b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\398646f1bca7b2630599fe83a5e7501b.exe"C:\Users\Admin\AppData\Local\Temp\398646f1bca7b2630599fe83a5e7501b.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.7MB
MD5515b300e842762dc5cc5cfd7c041c200
SHA112d24c1e43eb61bd145c5f3dc1d906cd503c72bb
SHA256ff665e8c23d785ce6ab281e9d59fd7154ce0a91ac82d1d1df7cb1e76f5716058
SHA512bfc726ec80438143b2bfddfbd31c94112b0c8a39f9a86242e942e77939a18d9d4910e6a174f54ad7f8e32b941bcc718f5134f8236a888f8b9ae241e36c56883e
-
Filesize
954B
MD5971b1bef53b51490021d5172520d7104
SHA1248c4a68a59664d7fa0df9266a5efc8e3119db4e
SHA256f34823371acf9a833f69a79cfb3f6a79b9c14db5151d3ef80e982d333ad31948
SHA51219638a797dd137155eb3a0224780cf4273544dcd56cee8d24024b2ab87d48fccef9c44dbf1b569f54a15155a5bd715915090a49fa6179182907b1c3a31b11fe4
-
Filesize
1KB
MD53156f7f7ee5fdfc39e93c7ae70ec06e3
SHA1f699f311d204c8c3d1770c78344c77510a7e23bb
SHA256f0fff8a59f9b342614b612b72c2bb6faa3bc8f6b0ea01c29be146ffd49075b94
SHA5120053b35b3aaa9fd42ca64907775204052476bffc39378d79daa0fb3b8768519cbad99156af850557fadbe0b73da310c50796c35cc903c6ee45ecf200e850399a
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
10.7MB
MD5398646f1bca7b2630599fe83a5e7501b
SHA12de320aad4ac27e790cdc1eceeb5d60f51370b83
SHA256d9ee97ebfca901fc2296137e2219d4115a9b4a68799cbfcf7a09224b2addf481
SHA5127bdcb6c4fa70d09905fbf5b6696934f4a5adfc662cf606321d5f5a6fda0ae6383df937657fe7ff40f0eb9d884a79482fee646a168aedb1e8e1cf0f72099ea483
-
Filesize
7.8MB
MD5e3e9192e9595b2626808e71d5173e993
SHA1584380d93188c7f0a2482bc10c33b344326f0486
SHA25686c62f85a28e939f6e2645287ed7952249211e798e44398c0bde742d307bda3e
SHA512d03c1b0795d69c26543255ea7f56a9424296b824a53f0a55da35bb96e34cbc69d14386188d7adc918d30edf4a5fd7541a8b9ac1ae37ee841b4afb9681b8cfa63