Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 00:22
Static task
static1
Behavioral task
behavioral1
Sample
70f267b878de849155db26eb85026868.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
70f267b878de849155db26eb85026868.exe
Resource
win10v2004-20231222-en
General
-
Target
70f267b878de849155db26eb85026868.exe
-
Size
1.2MB
-
MD5
70f267b878de849155db26eb85026868
-
SHA1
598e26d064075b4a471a85fbcca269f19a2ae394
-
SHA256
ca3c9fb0766ab97ddc2209189ca76335bc977c7e65bb8cecebbed94288017e80
-
SHA512
3173819bbc1693cc0627122a08ac288070ac6f2ed7648a2bbd4c89d6b21dedfabd2ee5952658f7a058aa9f6670c0e97da7cc6cea89812d64d2138f68793886c3
-
SSDEEP
12288:gp4pNfz3ymJnJ8QCFkxCaQTOl2GVq5w+kCbBmBCHm:aEtl9mRda1VI5wRCHm
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 70f267b878de849155db26eb85026868.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 70f267b878de849155db26eb85026868.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 70f267b878de849155db26eb85026868.exe -
Executes dropped EXE 1 IoCs
pid Process 2312 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2856 70f267b878de849155db26eb85026868.exe 2856 70f267b878de849155db26eb85026868.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\E: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\I: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\M: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\X: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\G: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\J: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\Y: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\Z: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\R: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\Q: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\V: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\H: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\K: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\L: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\P: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\O: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\S: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\W: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\B: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\N: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\T: 70f267b878de849155db26eb85026868.exe File opened (read-only) \??\U: 70f267b878de849155db26eb85026868.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 70f267b878de849155db26eb85026868.exe File opened for modification C:\AUTORUN.INF 70f267b878de849155db26eb85026868.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 70f267b878de849155db26eb85026868.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2312 2856 70f267b878de849155db26eb85026868.exe 28 PID 2856 wrote to memory of 2312 2856 70f267b878de849155db26eb85026868.exe 28 PID 2856 wrote to memory of 2312 2856 70f267b878de849155db26eb85026868.exe 28 PID 2856 wrote to memory of 2312 2856 70f267b878de849155db26eb85026868.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\70f267b878de849155db26eb85026868.exe"C:\Users\Admin\AppData\Local\Temp\70f267b878de849155db26eb85026868.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD54c3d15a8be9c98e103ada261c6d5b058
SHA1790819b22e74e72766e287ba0431be5d601d4484
SHA2563cbeed397684524e8a49bd4780b00a0dea3cac6895898cd413bd2f8b509feae2
SHA512c57ec41e1f58f9db7c513b66b7bfed6facede705b7f958cb8a4d827413a069a9529a963e5f6fa77560340d8c9f8fa885db4dc36af878b59e87409574d9ef6296
-
Filesize
954B
MD50bf6b9529bb34ee71782923e06579d4b
SHA1f68b27f6f3bc618cacfbb97ac574717c55f49c67
SHA256e22ff4e015b8ed46bed78cc106625b4299a1b27b7179d3a15f96ed28686f2cd3
SHA512d0645fd213ae0af970738cde07160629ff654a750921630b4dbd2f4fdccf95a97b4213a7e0c2da92cd3694170cb3a1662bdf3aa57f38d899ecfb86f89484d435
-
Filesize
1KB
MD585d7c2b1627d3d9ee6a34d10edd4d0ce
SHA1389913dd2bec45d7abc3bf0d2a0417678430fd48
SHA256cd0a3b0d4c14cdef1c89a667067cad12b0ff16e0d93361158c70904ac3b42677
SHA512370494acf1be2bac51435c3c669040e2a10211dfb8a7a67114f63ad4f978e0329802d653fbcf7d8a799796f5c9343a9e3b934a4d748d395df80ba3ded76b96a3
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
1.2MB
MD570f267b878de849155db26eb85026868
SHA1598e26d064075b4a471a85fbcca269f19a2ae394
SHA256ca3c9fb0766ab97ddc2209189ca76335bc977c7e65bb8cecebbed94288017e80
SHA5123173819bbc1693cc0627122a08ac288070ac6f2ed7648a2bbd4c89d6b21dedfabd2ee5952658f7a058aa9f6670c0e97da7cc6cea89812d64d2138f68793886c3
-
Filesize
689KB
MD556db2894bda06b10c8a37eb67b96d222
SHA1c076db71cc785b86d413dab6e9b44d47ecf9fcdd
SHA256a7017ef1d735225e816719af9d4f1bb425cba6d69d844c57c1661acbc5825a48
SHA512531fe39f7d2576bb56384f3b1f2fc9dfc8b30e05bddab406f3b3106049752e6bcf273cf15eb77b29ecf9f3856749297177e0aaf5685aee855846682bd46fd6a0