Analysis
-
max time kernel
147s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
15/01/2024, 01:33
Behavioral task
behavioral1
Sample
5bca1ac080c6a1bd10d9313b0af9ff6d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5bca1ac080c6a1bd10d9313b0af9ff6d.exe
Resource
win10v2004-20231215-en
General
-
Target
5bca1ac080c6a1bd10d9313b0af9ff6d.exe
-
Size
428KB
-
MD5
5bca1ac080c6a1bd10d9313b0af9ff6d
-
SHA1
3a3fe86e6d957c7e91b76f6a0082595843594859
-
SHA256
befe3e7f3ebbf93994bc7cc4e03c18f8a74b04ceec56d60d8a34d384bbacd296
-
SHA512
76a920f19d189e69148efb2fb9ac078420683ede6c2772c3047fa69c34661fe7883d3ca1ccb7f1d0ffabaa1301a2897eb4ce8d99ba7b51bc3f7d82cff086149d
-
SSDEEP
6144:LiMmXRH6pXfSb0ceR/VFAHh1kgcs0HW1kyApHhP+gDzvRAjmDtDqKmk3O2NXw:5MMpXKb0hNGh1kG0HWnALb1BuKmXyw
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 5bca1ac080c6a1bd10d9313b0af9ff6d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x0008000000012254-2.dat aspack_v212_v242 behavioral1/files/0x0007000000016052-38.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-55.dat aspack_v212_v242 behavioral1/files/0x0008000000012254-278.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 5bca1ac080c6a1bd10d9313b0af9ff6d.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 HelpMe.exe -
Loads dropped DLL 31 IoCs
pid Process 2132 5bca1ac080c6a1bd10d9313b0af9ff6d.exe 2132 5bca1ac080c6a1bd10d9313b0af9ff6d.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe 2316 HelpMe.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\K: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\Y: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\E: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\G: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\L: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\M: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\N: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\Q: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\X: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\Z: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\O: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\P: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\J: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\W: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\S: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\V: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\A: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\B: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\H: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\R: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\T: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\U: 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened for modification C:\AUTORUN.INF 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 5bca1ac080c6a1bd10d9313b0af9ff6d.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2316 2132 5bca1ac080c6a1bd10d9313b0af9ff6d.exe 28 PID 2132 wrote to memory of 2316 2132 5bca1ac080c6a1bd10d9313b0af9ff6d.exe 28 PID 2132 wrote to memory of 2316 2132 5bca1ac080c6a1bd10d9313b0af9ff6d.exe 28 PID 2132 wrote to memory of 2316 2132 5bca1ac080c6a1bd10d9313b0af9ff6d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bca1ac080c6a1bd10d9313b0af9ff6d.exe"C:\Users\Admin\AppData\Local\Temp\5bca1ac080c6a1bd10d9313b0af9ff6d.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
429KB
MD5c85402a32fb260fc4361d30fcbdc7ebd
SHA1540f78c104a2a7e44a20e0165a89056da4a115ed
SHA25648112f79be9df40fa611dbcc977e3c601269ddcea402ea27307981ebaf38007e
SHA512e53791913e916f73783ca0700f91fd64bfef795961ddb9f47a95c9a700def660d67c077ab30720a85e29372ba4b834209db270577524ab5d68d32d99392c7f44
-
Filesize
1KB
MD5e7a5a86de1f0c1929b342b9c170a9b65
SHA1996e0fa6e326e323f70e9118aa91b2b50d533ec7
SHA256c4f721d07c322371ccdf1eae90436c7089013a04c51dc1e51315a630b2fde6f9
SHA512dcec6c0e2363a4325dbfa2db66d86bb0bdf4f1874e501573eede6540048305a0d8163caa3b7e91d45af948b4f6bcd7fb7bf92369789eabc3e27cc845f0bf9810
-
Filesize
954B
MD5328079b0490951ab3ece667f0bdae148
SHA118399252ea2eb4056f91f5c7818c041e9e4d94bb
SHA2564a8924321e4462f475dca079fead7dfbf90a673f69354a29cb9704040cb643aa
SHA512e643d12c51f9642f8f465839aa701e145b8edf5c832087110af489498639415015b9476ef36e58d0f5cecbb75f7b8bb731d84294ab3e0f71e19e5ef44899d775
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
428KB
MD55bca1ac080c6a1bd10d9313b0af9ff6d
SHA13a3fe86e6d957c7e91b76f6a0082595843594859
SHA256befe3e7f3ebbf93994bc7cc4e03c18f8a74b04ceec56d60d8a34d384bbacd296
SHA51276a920f19d189e69148efb2fb9ac078420683ede6c2772c3047fa69c34661fe7883d3ca1ccb7f1d0ffabaa1301a2897eb4ce8d99ba7b51bc3f7d82cff086149d
-
Filesize
423KB
MD5f52823b5860cab807b4b2fd07f27c2aa
SHA11e6f2503de8277a15afaccb585dfea32eed4e94d
SHA256e1754b97055c1a1576caa7bc695c83987014d2798a22735b296f6c9b2ced063f
SHA512a432d13a3857fccd0735811aafecc319b183ca6abe6f65060d6c6462db48c675db5b2e36d575f21631e66d0886db52487c3b31474854e376ed4f9b0755a85963
-
Filesize
222KB
MD51625edeee6d8b6a558a045d2545411d5
SHA11e14e7e0af6330696a81cf074def55aa831ceeb5
SHA256fc153cd6eb5569e2258945f6a1e948c186f394a8e89f4702c0d693e31b10922e
SHA512eca6a7ea0c47489523aabf3f2b823c76effc7b4576edaf5d5a135b5e6593e7fdf4a14fcb202c753067a55aca4caf869f1e196e2c62f276558e016b79c882c86b