Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
72s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 19:38
Behavioral task
behavioral1
Sample
4f0a7b8523cea2af5411490ec5a94333.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4f0a7b8523cea2af5411490ec5a94333.exe
Resource
win10v2004-20231222-en
General
-
Target
4f0a7b8523cea2af5411490ec5a94333.exe
-
Size
666KB
-
MD5
4f0a7b8523cea2af5411490ec5a94333
-
SHA1
291f3a0e32334823c41da2e1013819bd9b133bd4
-
SHA256
e61e016f08831015aa39a818fc430b786f13f3611d269a8a88165c899730a4f7
-
SHA512
62488dd26192fcc487785e09f7493b990d54fba6b97aa1b201f3a746dd0b789e16b98d5bbd3f5e96f7b6b2cb0acc6266b29b558e52612bddbaf6e4c6873eb9bd
-
SSDEEP
12288:5MMpXKb0hNGh1kG0HWnAL7MMpXKb0hNGh1kG0HWnAL+:5MMpXS0hN0V0H7MMpXS0hN0V0H+
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 4f0a7b8523cea2af5411490ec5a94333.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x000e0000000122f6-2.dat aspack_v212_v242 behavioral1/files/0x000e0000000122f6-8.dat aspack_v212_v242 behavioral1/files/0x000e0000000122f6-9.dat aspack_v212_v242 behavioral1/files/0x000e0000000122f6-7.dat aspack_v212_v242 behavioral1/files/0x000e0000000122f6-4.dat aspack_v212_v242 behavioral1/files/0x0007000000014bf8-38.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-55.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 4f0a7b8523cea2af5411490ec5a94333.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 4f0a7b8523cea2af5411490ec5a94333.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe -
Executes dropped EXE 1 IoCs
pid Process 1788 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2172 4f0a7b8523cea2af5411490ec5a94333.exe 2172 4f0a7b8523cea2af5411490ec5a94333.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\E: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\P: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\V: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\Q: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\R: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\T: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\L: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\M: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\S: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\Z: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\A: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\O: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\N: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\U: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\I: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\K: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\Y: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\B: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\H: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\J: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\W: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\G: 4f0a7b8523cea2af5411490ec5a94333.exe File opened (read-only) \??\X: 4f0a7b8523cea2af5411490ec5a94333.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AUTORUN.INF 4f0a7b8523cea2af5411490ec5a94333.exe File opened for modification F:\AUTORUN.INF HelpMe.exe File opened for modification F:\AUTORUN.INF 4f0a7b8523cea2af5411490ec5a94333.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe File created C:\Windows\SysWOW64\HelpMe.exe 4f0a7b8523cea2af5411490ec5a94333.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1788 2172 4f0a7b8523cea2af5411490ec5a94333.exe 28 PID 2172 wrote to memory of 1788 2172 4f0a7b8523cea2af5411490ec5a94333.exe 28 PID 2172 wrote to memory of 1788 2172 4f0a7b8523cea2af5411490ec5a94333.exe 28 PID 2172 wrote to memory of 1788 2172 4f0a7b8523cea2af5411490ec5a94333.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f0a7b8523cea2af5411490ec5a94333.exe"C:\Users\Admin\AppData\Local\Temp\4f0a7b8523cea2af5411490ec5a94333.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:1788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD57d7bcab4c52b3be5ebc36ec15edf67e2
SHA16296f2005338b45b819e9684ddced8a519c34b14
SHA256be60141cd555935f945f6ad1d52cc1a18a593a9aace4d9e673fc8d5328ae6d9b
SHA5127131ac44103437fbdf8214e6a407b52869e365cf570256e88afdedc8f6e76d93bc8ea04d9e1cfd046e443ae1940187e2710e38835ea808370892b2bb43b3b76a
-
Filesize
1KB
MD52cbfeb8588fbaefa4a6a775bd3c55a82
SHA159e1c63cbf5991cedf2245ee2299ab6da00a6fa3
SHA256035b4453dabc32f71d17d072c60c6674228743e951a331043b0f352994b43c27
SHA512c24504a7d3facd6af3bde7af61a771d92a1bfc418925d762d521cbfc87b1441ecffc1bbe342ee3589d32e4900c2dc970cd0aecc8020a3a3060d1ff33bf8c1cc5
-
Filesize
954B
MD5d8a3bc21ad5c8a4a0b48409d38dc287a
SHA126641bc3cf7e3300fc07f33a6a147316826f7ab0
SHA2566ce25b904980ae0370f2e8f3bd14988018f40cd0c4c6451421578ba37997b6dc
SHA5126f8aa574ca6d4c2e4f9c8f8b4cfe676c5b2a24ab6b9a5dba7874754c982232b16febe568599723e2c1b69126caf03e71e0d0b2a2b7a88fe190da0045d538e280
-
Filesize
173KB
MD55aa0bc02d1a8f4997ab590a0b3320563
SHA15673df495f279b0aadb87f7c3bcc6818c0658781
SHA2564f17efb9b3ef88b1470b52e898fe93ab3462383c6d98a715541960ce18dd9316
SHA512844ebe52c048d846f7e579198293fa7ffb1dd338a8253b2e8bb06f231b1d26c78432c8a8cfbb6266d85cfd1b0bd3222a1c9fdf122d72cce6b0d757767785c617
-
Filesize
143KB
MD5a987c6c591bfa789987c146958ccd7b1
SHA1ba7e99a5819691fa448ff7a5a26595c3aad2c0d0
SHA2564f7bdf42861ffdd23b8d094c160040e85a34a6ece24b4508ffdb5422bd53936a
SHA512508fa310fe5fe1c3dd351d2ba412e600042cfa9cb789b0efd60d1090e246383dbb3902f53b21347be2485476ff272a1a1e459d668fc7291cc36c8f6cb2d7bc00
-
Filesize
212KB
MD57238f6ec30c3e7a8d144a205b083c663
SHA1b8c7a72536c4bc401b37f1a29bc2c57d0e27bf16
SHA256d8143b4c1f0b0192919ba9bd9e087b152a8cef336f6397baa17aaa5b357ecc52
SHA512eabb83ba1aea577f7e5f2dc9a053ff61eda7743949416ed2ddc817641e0719b7a08862d95a24e4b1200dde2f54409cc81fe41aa72d5cc045313e4f13744dfb7f
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
167KB
MD5c4dbd886096e72123aec2f3aeb40fa8e
SHA11330810707305405b61c0ada9244aded2ba4bb48
SHA256f32440a9e1921e06b94839c8d4baf173bded28fbda2e45427be69b6bd3e00a91
SHA512f1e7e481f676ed8d03b35794c83213c58325deb0f5450be6aa0f1249396cac85c409d4cc01feda13fbcf8d531cc5c86c015cab9bd07f1f02f3ad80b7f37cd342
-
Filesize
60KB
MD59f449d8cda8191bb116b9c2522a378f2
SHA1ad187fe7366fc37a20207a00f83c0360cf518335
SHA256914f57654933701c0b913373e5b8c537da4ced607717de2b7fa0ed4cc23fc605
SHA51259bc16f2cc18f66e594a464cb0daa119a3461a385c45e25ba245113cde659899661e7e2177292baf428db5d11cd761d8b3fa5f71da96c210628c244a5d9689ee
-
Filesize
137KB
MD5487122fe7e1fce57e066c292624b498a
SHA1fe90ffa1a139d8e5e850d27c712feed3ae33291d
SHA256566b1a3a7d46ba426f0593e6193954894187ee225eeacdad1b2547f0ec7a077b
SHA512cb341588fbe224d01d86b49c749f4f388b02e2f2e055287b6c5a91865bde3e645143e7ff078e543585fd2ca699efe8081f88d3f5ba976513e0cdbfda62203183