Analysis
-
max time kernel
146s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-01-2024 01:53
Behavioral task
behavioral1
Sample
54a2421684a8654ea923b803200ff0ab.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54a2421684a8654ea923b803200ff0ab.exe
Resource
win10v2004-20231222-en
General
-
Target
54a2421684a8654ea923b803200ff0ab.exe
-
Size
292KB
-
MD5
54a2421684a8654ea923b803200ff0ab
-
SHA1
ca0aea6f09f91328ba44d68ac351babecb6f2686
-
SHA256
108add0ebd32c694d4cccadac85aa0c19b70c36eb6c69a4002b9c3d4a5c208cf
-
SHA512
19f6f6b9470f366029213aed261108efdaf030721d9f3a9e2d176ef8f93d9ddad663b4f36c35fb6043b1e9ac2b11102db04ff09ffd83789797a9c80ddb96f6e7
-
SSDEEP
6144:LiMmXRH6pXfSb0ceR/VFAHh1kgcs0HW1kyApHhP+gDzvR7:5MMpXKb0hNGh1kG0HWnALb7
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 54a2421684a8654ea923b803200ff0ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x0009000000012262-2.dat aspack_v212_v242 behavioral1/files/0x000a000000015584-38.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-55.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 54a2421684a8654ea923b803200ff0ab.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 54a2421684a8654ea923b803200ff0ab.exe -
Executes dropped EXE 1 IoCs
pid Process 3000 HelpMe.exe -
Loads dropped DLL 31 IoCs
pid Process 2976 54a2421684a8654ea923b803200ff0ab.exe 2976 54a2421684a8654ea923b803200ff0ab.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe 3000 HelpMe.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\Z: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\G: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\J: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\L: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\R: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\S: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\B: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\O: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\E: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\H: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\T: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\U: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\K: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\V: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\M: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\A: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\I: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\Q: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\P: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\X: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\N: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\Y: 54a2421684a8654ea923b803200ff0ab.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 54a2421684a8654ea923b803200ff0ab.exe File opened for modification C:\AUTORUN.INF 54a2421684a8654ea923b803200ff0ab.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 54a2421684a8654ea923b803200ff0ab.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 3000 2976 54a2421684a8654ea923b803200ff0ab.exe 28 PID 2976 wrote to memory of 3000 2976 54a2421684a8654ea923b803200ff0ab.exe 28 PID 2976 wrote to memory of 3000 2976 54a2421684a8654ea923b803200ff0ab.exe 28 PID 2976 wrote to memory of 3000 2976 54a2421684a8654ea923b803200ff0ab.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\54a2421684a8654ea923b803200ff0ab.exe"C:\Users\Admin\AppData\Local\Temp\54a2421684a8654ea923b803200ff0ab.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
293KB
MD5a0fe5bc4f8767cca7dc92109242620f2
SHA19f0ca6a3a1da1fe4041d93cc555bc8947c584bf7
SHA256ecb3f761f98fd8d8d5c62fd6c31d0228b79a3fa0efc839c63a8d9afc05c4a3f5
SHA5123b0cc0eb622e6d759d5a7dad2cdae75a9249b63056845d5090fe8e6f1d9a70f3b46b81f1345ba3ecdeb9fc952b59c1a91101b98256edb53d338290564516d1b1
-
Filesize
954B
MD56eb9026279cd18b2d37dbbff8a26bf33
SHA1734b3f436d1b4fb143cf6599ff359c7ad5162057
SHA256a16831330358fb3f25fda8ac1ea16f303cdb5976123e6ea8b2e5c98d3202d138
SHA51204c8a885fa9546403f458b16b0befe2f44e3547322cc6509358deb41ece094bc5f2a6757c697185c3403213ccae80f6dc9d7d1232b917ed1e71dc53c8dca4ce4
-
Filesize
1KB
MD529683fa2091b7f0cf2a45b6fd7698ed8
SHA1b3157404e17f85f536423f026618e5907f06163d
SHA256d172b9bb150cc3ccadc4070f98e40d5bf08c301082ee3e9c08cf599d06901f13
SHA512dd52781d8958bbc1bf62c787ba535183e788afe0fe0e015df1f3c5f7dbb2a8b5346447285e6f5607143434444ac9dc3abcc7c3fd1eca4108211f6a154b727faf
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
292KB
MD554a2421684a8654ea923b803200ff0ab
SHA1ca0aea6f09f91328ba44d68ac351babecb6f2686
SHA256108add0ebd32c694d4cccadac85aa0c19b70c36eb6c69a4002b9c3d4a5c208cf
SHA51219f6f6b9470f366029213aed261108efdaf030721d9f3a9e2d176ef8f93d9ddad663b4f36c35fb6043b1e9ac2b11102db04ff09ffd83789797a9c80ddb96f6e7
-
Filesize
290KB
MD5a19195bf4edc5139859d26792fdac06f
SHA164fa5ef40ff54fb07e88654a5e0f6e817fd04df0
SHA25660c3e8d7f3c7afcd378524784b61f28c9611c02df14a4101f1a4c8d0265f3412
SHA512e78e2b3d327081b47b90852c143f344ec9a0f738b5c9e7690f7a37b850aaa5c633c22ef2798f9fda86c9c70a4213611630ebbf2c29ac3f21e282c2f4273e4495