Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
41e48ab0a542c733e1825705d8b6346c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41e48ab0a542c733e1825705d8b6346c.exe
Resource
win10v2004-20231215-en
General
-
Target
41e48ab0a542c733e1825705d8b6346c.exe
-
Size
533KB
-
MD5
41e48ab0a542c733e1825705d8b6346c
-
SHA1
5a24f2bfa964577538307390f303e49ca8ffcd65
-
SHA256
9dbc93c5c4d375ef336f38f29311099229c8b93ba6106baa034ca6ef21ac4ec2
-
SHA512
c411b19d38d266eadd8daef8ae54b996630a46670d43c93e5115d94a7557f3588e971f9b0a397ee12b48d3fbc5f480b6522f01aadcced98bfaf21619f5db948b
-
SSDEEP
6144:282p4pFHfzMepymgWPnviP6Koa0nArn20l96tCF2eKNBDRlC8HQQDhy5OwbYBilK:gp4pNfz3ymJnJ8QCFkxCaQTOl2GVqi
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 41e48ab0a542c733e1825705d8b6346c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 41e48ab0a542c733e1825705d8b6346c.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 41e48ab0a542c733e1825705d8b6346c.exe -
Executes dropped EXE 1 IoCs
pid Process 1944 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 1708 41e48ab0a542c733e1825705d8b6346c.exe 1708 41e48ab0a542c733e1825705d8b6346c.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\E: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\M: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\P: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\W: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\X: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\Z: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\A: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\L: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\N: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\O: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\V: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\G: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\K: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\S: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\J: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\B: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\I: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\R: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\U: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\H: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\Y: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\Q: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\T: 41e48ab0a542c733e1825705d8b6346c.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 41e48ab0a542c733e1825705d8b6346c.exe File opened for modification C:\AUTORUN.INF 41e48ab0a542c733e1825705d8b6346c.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 41e48ab0a542c733e1825705d8b6346c.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1944 1708 41e48ab0a542c733e1825705d8b6346c.exe 22 PID 1708 wrote to memory of 1944 1708 41e48ab0a542c733e1825705d8b6346c.exe 22 PID 1708 wrote to memory of 1944 1708 41e48ab0a542c733e1825705d8b6346c.exe 22 PID 1708 wrote to memory of 1944 1708 41e48ab0a542c733e1825705d8b6346c.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\41e48ab0a542c733e1825705d8b6346c.exe"C:\Users\Admin\AppData\Local\Temp\41e48ab0a542c733e1825705d8b6346c.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
534KB
MD5cb29631004484b972a31a839e9f0f535
SHA15450df729921db4df54a264fb66c27b4c753c802
SHA256404c081dbeda5a9e73b4155e063a06241c0393ae9f2de9e3a64d8910c2147c18
SHA5126ffa31694e55689cea8d8cb93cce959a16e023e6f4176cb309fd86d25e6f2d1de5bd52e3f0137a1eee8195d6b236036b7fbb05e9dfd1c486d9c79bac0406d5e2
-
Filesize
954B
MD5ea1495cd4029f59eb0214b562571cd23
SHA131a95d027fb340a0d56fa439cb111c44e0855e2e
SHA256172743d77381b5c14fc4fe292f9b766a334916c89f221a412ebad14468c638a9
SHA5123b3bb863c43a787173d92dba134c616be7b251fe49cd7ce4905b4f08824b25332303656b6d7192ac22946243bb9f88c0a387b88bffce4bf2e5472c0fad9572b9
-
Filesize
1KB
MD5fb5fac50facd0a0906c32ac10315a46e
SHA1a686265c5fb41b9ac2e9d18c64113a01de168ff7
SHA256d8c1ad1ad4387e76edf96caefabb5d3b2e74a08875dd74f843c6e5cf0eaa91a2
SHA512cff6e22de182ff9591e871eb3a2a0f3d736c3902e8fc5c7073941fbfadf8cf2cfc89b63c25a3063f7a30becbad455d7c230e8a9f8a344cf6f518f74c9fb76df0
-
Filesize
11KB
MD5871fc1e779d2a9672cc881215a2c9a9f
SHA1c1ad0aff0f193f508ea7323ae05439f967f9585b
SHA256f1198e4ea7166ef79bd892fa68681c8e626b7bb052a902b834319efccf6f6b1d
SHA5128b3f40c8211ea9acd903ea813ca63cc6b6822b32061a2524912eae7cddcce023f08ccd20d8ddb732595cb73592e9ac48014171f937a1b8a90d9359487032f27e
-
Filesize
37KB
MD51ab98f1c6086a72df0f3cb416823b63c
SHA1504d34cf546106b44183846ba712136a0ecaacd9
SHA2565e89ea79db8b4b6fd939c50de33951e8c3e65ce0973e00fbaa7b2d2fa9f9b571
SHA51254f0003c909d638fd8eeb88a4908c5cd8de593b35c041363ed54343370183499e33a41d74a74aebcf550bb9eefdc6c59ee543b14d75a9ab03c96ac3aaa2c22c5
-
Filesize
532KB
MD506d024193cba53313355193c97398ce0
SHA10a5bebe99736c3cdd7c0dbb389ab22db0289236c
SHA25668e435cf21ef3c47298ec0f2f125eddb9cdd8682653759de9657fafa95880b05
SHA5127aaa1df60e3feac296487b65c2a0d59ef3671f11f56c62a5bec83142f11edbb1ca4a610d75f87a95df3c21f875316572fa1e2f1e8b2aabd25c254f947f46a048
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
533KB
MD541e48ab0a542c733e1825705d8b6346c
SHA15a24f2bfa964577538307390f303e49ca8ffcd65
SHA2569dbc93c5c4d375ef336f38f29311099229c8b93ba6106baa034ca6ef21ac4ec2
SHA512c411b19d38d266eadd8daef8ae54b996630a46670d43c93e5115d94a7557f3588e971f9b0a397ee12b48d3fbc5f480b6522f01aadcced98bfaf21619f5db948b
-
Filesize
151KB
MD58b70d3bb695f98d6d1ecaa874cce8252
SHA1aed2e21b034fdc0b1a92dad952ef36e4bbb90440
SHA256f6324c457ba69eb2e478c3d04107c361bb25b58102816268d77d1ef2fe545dd7
SHA512f89fba11acc4fb5f544918fd9bccb2d2cd4bc2c72aff5338e8f8cde40adc91bbc333de79cafbd0b528f1043eaa7efd5bffe4ec0f246810b7a1328dafa8439d05