Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 01:04
Behavioral task
behavioral1
Sample
3b85f3acf2f180907172ef7619b86404.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3b85f3acf2f180907172ef7619b86404.exe
Resource
win10v2004-20231215-en
General
-
Target
3b85f3acf2f180907172ef7619b86404.exe
-
Size
184KB
-
MD5
3b85f3acf2f180907172ef7619b86404
-
SHA1
a552fb20c05a44f3e01c32a1b6cee6e987c1634b
-
SHA256
1c382b2800f2d57ebb19bffae03b8ed679838a22520a212c19f051a84a75e977
-
SHA512
a7fb01bed6c5fa65868ec1e1ba6d2d5df8e6e71d727947ec45fc97c8d22a8a1aebcfef1cef15f03f5851b1b0be62da700a90645736602d5adf778628aa081906
-
SSDEEP
3072:rimsXXK9HRTOeriRfP6pXfSb0dspqc5oY0htVFAHT11Ual21Cxcs0HKAH057kyJu:riMmXRH6pXfSb0ceR/VFAHh1kgcs0HWU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 3b85f3acf2f180907172ef7619b86404.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x000a00000001224d-2.dat aspack_v212_v242 behavioral1/files/0x000a00000001224d-10.dat aspack_v212_v242 behavioral1/files/0x000a00000001224d-270.dat aspack_v212_v242 behavioral1/files/0x000a00000001224d-294.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 3b85f3acf2f180907172ef7619b86404.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe -
Executes dropped EXE 1 IoCs
pid Process 2096 HelpMe.exe -
Loads dropped DLL 31 IoCs
pid Process 2380 3b85f3acf2f180907172ef7619b86404.exe 2380 3b85f3acf2f180907172ef7619b86404.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe 2096 HelpMe.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\K: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\Q: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\J: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\L: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\R: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\T: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\A: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\I: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\U: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\H: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\P: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\V: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\S: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\X: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\Z: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\B: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\G: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\W: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\E: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\N: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\M: 3b85f3acf2f180907172ef7619b86404.exe File opened (read-only) \??\Y: 3b85f3acf2f180907172ef7619b86404.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 3b85f3acf2f180907172ef7619b86404.exe File opened for modification F:\AUTORUN.INF HelpMe.exe File opened for modification C:\AUTORUN.INF 3b85f3acf2f180907172ef7619b86404.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 3b85f3acf2f180907172ef7619b86404.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2096 2380 3b85f3acf2f180907172ef7619b86404.exe 14 PID 2380 wrote to memory of 2096 2380 3b85f3acf2f180907172ef7619b86404.exe 14 PID 2380 wrote to memory of 2096 2380 3b85f3acf2f180907172ef7619b86404.exe 14 PID 2380 wrote to memory of 2096 2380 3b85f3acf2f180907172ef7619b86404.exe 14
Processes
-
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2096
-
C:\Users\Admin\AppData\Local\Temp\3b85f3acf2f180907172ef7619b86404.exe"C:\Users\Admin\AppData\Local\Temp\3b85f3acf2f180907172ef7619b86404.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a6d60358a33b03bf63e63fcc044cafd0
SHA179ee0807aba650836bd10f947a98778f3f67c62e
SHA256a2a556c173fa2287c042fb1f96f2920d81ec2b00a20c9565c08bc8bb09512dd5
SHA51260f870160ac95a02b72868f47948553011282cc4b2f8ade20ce77128689f47fda39781d771c6e6465b188eb1b5eb3543492da409cde84c438e46c7a9be07d357
-
Filesize
950B
MD5803d329b7ff712e1c8812d83c6be79a4
SHA1982f77757fbd7a86022d1596c3b1861365dcc56c
SHA256d32296d8a020bc087e3e0157d75d8ea1bc714586d7637eb879652e00dac8e648
SHA51217f39d6e0d301a143c0c0a39d4c9c66897c9024d5ad3aec38366bdf7a34ab07dd0a8654217a97de31376e33b2ae9ffe81a0942acdeb66394a5eaa5a7c57365c1
-
Filesize
92KB
MD541f79d528c3ea94b7737c3ff9aa65c1b
SHA195987557e17366415d842f26d4d503782eb2edd7
SHA2567c26813d4344d1b015ecd08755b4651607a13ade0936b45826e77bd2e876be71
SHA512ff9d80fd3e9b5e287787eefc3092760101bb7c44edba895731916754114ad188b1dca3e6acfe9620ed49dc8e8af81daf56236d8bd2ecebd75adacfb6aa41e82f
-
Filesize
183KB
MD56a01f4cb70f7bf7af36dc6c1d6fc18a7
SHA1bacffe880cfc15d39109f796391e262a680b3f1a
SHA2569d1d5b811c4d5e45fc436f3e9d32774b6adbc2723a6393baa3cd84f1b24cf426
SHA51274fa550ee17a5f26a6b52602c3059a9d131f1bd99fb00e160d6e1793d597b077e6acfb5580cb81e187675a24f66def1fd0b5c04bd4db74902c4b2235d616fdd9
-
Filesize
108KB
MD56eb8a18a2a15d3c80458b234326cee89
SHA11d010819d6bcf289331f97145d213519422f1745
SHA256ca419a5a94384d9fb22ab26b367a1b673e2614ad2f65c214ffdae053bc93df91
SHA5129e276bb1e439c5ede45b8e1ac0b78bae1f1c7176559c6aa70e0b9c730aacdab04b563fd7b84a47facadd4fa4ed1976bcbff99e66e31d9a99efbf95d7869ec130