Analysis
-
max time kernel
10s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
458feaf157dc30c9aeebc7b939487648.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
458feaf157dc30c9aeebc7b939487648.exe
Resource
win10v2004-20231222-en
General
-
Target
458feaf157dc30c9aeebc7b939487648.exe
-
Size
3.4MB
-
MD5
458feaf157dc30c9aeebc7b939487648
-
SHA1
02ea664dae6229f391789e6d6debdc20d42deff9
-
SHA256
9a2050975d64a4555022767549de73a45570e0d492817541425c94b617a8fefc
-
SHA512
d556d490cae2471adddd5ed63a35479432cb52d0ea887335ddc673294abd1f9270e1e0e6a8d7efb5b2c4b6faca81de4093cf1294c414e5d56df95fc6cba6a5f7
-
SSDEEP
24576:OEtl9mRda1CKB8NIyXbacAfUSunEp+XRGEUvkXw6zezNFtcyyRvx+z94sY8x:NEs1hB8NIMI8Sfpwotkzaxc1OGz8x
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 458feaf157dc30c9aeebc7b939487648.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 458feaf157dc30c9aeebc7b939487648.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe -
Executes dropped EXE 1 IoCs
pid Process 2960 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2392 458feaf157dc30c9aeebc7b939487648.exe 2392 458feaf157dc30c9aeebc7b939487648.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\R: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\V: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\G: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\P: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\W: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\A: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\E: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\I: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\J: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\S: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\O: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\U: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\K: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\L: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\Z: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\H: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\N: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\T: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\Y: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\B: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\M: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\X: 458feaf157dc30c9aeebc7b939487648.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 458feaf157dc30c9aeebc7b939487648.exe File opened for modification C:\AUTORUN.INF 458feaf157dc30c9aeebc7b939487648.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 458feaf157dc30c9aeebc7b939487648.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2960 2392 458feaf157dc30c9aeebc7b939487648.exe 16 PID 2392 wrote to memory of 2960 2392 458feaf157dc30c9aeebc7b939487648.exe 16 PID 2392 wrote to memory of 2960 2392 458feaf157dc30c9aeebc7b939487648.exe 16 PID 2392 wrote to memory of 2960 2392 458feaf157dc30c9aeebc7b939487648.exe 16
Processes
-
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2960
-
C:\Users\Admin\AppData\Local\Temp\458feaf157dc30c9aeebc7b939487648.exe"C:\Users\Admin\AppData\Local\Temp\458feaf157dc30c9aeebc7b939487648.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2392