Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
421118bd571a834357ec49375308462e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
421118bd571a834357ec49375308462e.exe
Resource
win10v2004-20231215-en
General
-
Target
421118bd571a834357ec49375308462e.exe
-
Size
845KB
-
MD5
421118bd571a834357ec49375308462e
-
SHA1
30df90656713ea3847b0caf7296aa65d149c55c1
-
SHA256
1d516331c26fc4b1a10921da6c8866fefdaa138d8d9c8d3da021218e962a482a
-
SHA512
b8297a0ef67fa97942ef6849ff1fa564811d3b7529f9545224fa8913f0d75c028cf21f9404bb7802866543c18ca76f59d7e75108465b7c0293e100e0765303ec
-
SSDEEP
12288:Pp4pNfz3ymJnJ8QCFkxCaQTOl2K9KB8NIpYJTCiJ:xEtl9mRda1rKB8NIyX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 421118bd571a834357ec49375308462e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 421118bd571a834357ec49375308462e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 421118bd571a834357ec49375308462e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe -
Executes dropped EXE 1 IoCs
pid Process 2992 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2216 421118bd571a834357ec49375308462e.exe 2216 421118bd571a834357ec49375308462e.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\V: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\K: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\P: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\A: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\E: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\G: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\J: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\R: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\X: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\H: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\Q: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\T: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\M: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\O: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\Y: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\L: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\S: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\W: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\I: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\N: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\U: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\Z: 421118bd571a834357ec49375308462e.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AUTORUN.INF 421118bd571a834357ec49375308462e.exe File opened for modification F:\AUTORUN.INF HelpMe.exe File opened for modification F:\AUTORUN.INF 421118bd571a834357ec49375308462e.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 421118bd571a834357ec49375308462e.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2992 2216 421118bd571a834357ec49375308462e.exe 28 PID 2216 wrote to memory of 2992 2216 421118bd571a834357ec49375308462e.exe 28 PID 2216 wrote to memory of 2992 2216 421118bd571a834357ec49375308462e.exe 28 PID 2216 wrote to memory of 2992 2216 421118bd571a834357ec49375308462e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\421118bd571a834357ec49375308462e.exe"C:\Users\Admin\AppData\Local\Temp\421118bd571a834357ec49375308462e.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD508eb34506ff7fc730620eb840b9c4ae1
SHA10814525d1e88866a10f4085fd7c6fd622bf03dc7
SHA256969d0bc4bb71a5a2b551a3d46aee96cb04d6490ddf652a829fbe608887f1693a
SHA512056f42767970bae61a2d26a21163285a78b910f4588d1a19927af77bd4f131e7427e7e71f2f95c41912e187c10a92d429a556737bb5b1ed4126c42a479a5ca62
-
Filesize
1KB
MD54d515e55bdbfc89a7f7bdffc2604a389
SHA188418f75338f49afba5bc6398948dac330865734
SHA256fb235de09fa1a7756c2cd0a5792d2659a698487fb582edfc902db91d2cb0b766
SHA512efacf880da502638f206a126ce669b8f5bd2ea650a4ae0c1e0508e0a898d4aaa4db5663957509de91967b03560b9910478d5b9989ac847f27c48c47b44f11505
-
Filesize
950B
MD5cfd5104c82653e8c4cfe0e30d0930d9f
SHA14b0e16e5f64619fe8d0fb79efefc53967334d2a4
SHA2567ca2d708114b982011724bf304810ca56fa3e86f6b966ec9136bcc36ee0e9458
SHA5124360a895611d6efd1689dbae974d4074986fccfc42a928ea8f1b21b4653135eee62278a06007f4fe804e591cbd34aa8f7fc82b38e0144eecc02d7179dc3b4d0a
-
Filesize
385KB
MD51bcd4d59da0c647f940839276ac9e7d2
SHA111fae1d6c7dd6937fd5542df74058b0b4a5c105c
SHA256b7f46633e6e0ed83258284984406577aec7478605d56f55f4d4d1d82a98dd307
SHA512fb0caaa6d3f0c80c553a7cf6efc56da033ac3dfb0a890f6da66147a64783c1a5557627473875f1c72d7762f868b0bdfe5a8984b0c609f6afd20ed92bcedb6f12
-
Filesize
392KB
MD507a2155a07c53c924f83f17d31731a4a
SHA11cd9fd9198fc5641f5aaf1391fb627b362d624a4
SHA2562e6a83f156d5a21ea8692a8a5aa79fdaa98388cc45fbf3015f92953c5a2d08ef
SHA5127f42767a506be17a3e4159edf8b3d93f45f7babd102139328163a40143ca8e85619a4133f26da9ddc169744ebbfe8c456dae156bfc1dda8decc911ff17734ef6
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
193KB
MD5b5902c0f74063f326a876d44e64fdc86
SHA1a90efac297696f3238c04cb74effdd663671aca8
SHA25665a386833c968ec12457904b93e42d4b949e0774fa1061688fa65a66e9c46a04
SHA5122246358211eac0b7d3e69a9fa4bbba5f4d6ae267d4cdd45b0e3477c112f21ce9dd6e809fa0c35e9b393333a148fee7bdb93e1dd710b689923bb87556bbcf4bf2
-
Filesize
840KB
MD59ceab6b4251f70590a4cf63e4289e8ae
SHA1a554029c53b79af300aaff7d4949ce661d9f5df5
SHA25667c12fe54530b040271b70e8e746a5fe243c4efa9ddacaa058f9a7396888116a
SHA5124838407fd58a5b484cdf400197047a5ed24e4e5631fcde66646b11e49d56884192ddd06d217987a9379cc8c2b760732e02c9814ad9d2880878a3ab4fd92fd33e