Analysis
-
max time kernel
145s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
727176a93823f1e50143ed28a14527a4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
727176a93823f1e50143ed28a14527a4.exe
Resource
win10v2004-20231215-en
General
-
Target
727176a93823f1e50143ed28a14527a4.exe
-
Size
1.1MB
-
MD5
727176a93823f1e50143ed28a14527a4
-
SHA1
8974bacbffeaf72e739e98a8eed796cf2e081b0c
-
SHA256
c1a902ea477a36f56c456eb165f4a13d55362701f088b30df357a58093c6047f
-
SHA512
46dff2fcf0fca3e2b5fc36cc2575103e93ac2406736cf59a86efcdd8c5f3cdff98cbdb39a08e14327651a3658a43bc0911b545373ebfcf3946099f29f4aa9af2
-
SSDEEP
6144:k82p4pFHfzMepymgWPnviP6Koa0nArn20l96tCF2eKNBDRlC8HQQDhy5OwbYBilK:Cp4pNfz3ymJnJ8QCFkxCaQTOl210
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 727176a93823f1e50143ed28a14527a4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 727176a93823f1e50143ed28a14527a4.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 727176a93823f1e50143ed28a14527a4.exe -
Executes dropped EXE 1 IoCs
pid Process 1848 HelpMe.exe -
Loads dropped DLL 31 IoCs
pid Process 2152 727176a93823f1e50143ed28a14527a4.exe 2152 727176a93823f1e50143ed28a14527a4.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe 1848 HelpMe.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\B: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\E: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\U: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\I: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\P: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\Z: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\L: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\Y: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\A: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\M: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\S: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\O: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\Q: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\R: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\X: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\G: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\J: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\W: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\T: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\V: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\H: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\K: 727176a93823f1e50143ed28a14527a4.exe File opened (read-only) \??\N: 727176a93823f1e50143ed28a14527a4.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 727176a93823f1e50143ed28a14527a4.exe File opened for modification C:\AUTORUN.INF 727176a93823f1e50143ed28a14527a4.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 727176a93823f1e50143ed28a14527a4.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 1848 2152 727176a93823f1e50143ed28a14527a4.exe 28 PID 2152 wrote to memory of 1848 2152 727176a93823f1e50143ed28a14527a4.exe 28 PID 2152 wrote to memory of 1848 2152 727176a93823f1e50143ed28a14527a4.exe 28 PID 2152 wrote to memory of 1848 2152 727176a93823f1e50143ed28a14527a4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\727176a93823f1e50143ed28a14527a4.exe"C:\Users\Admin\AppData\Local\Temp\727176a93823f1e50143ed28a14527a4.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:1848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5c3e53ffde7c6e5f71c07f6f1e0244da1
SHA1e0f2781752d3a9293a5c2c532f4885c014a789b8
SHA2568adb98c67177c52f72a0244a6b3371951dc4eff0c0904d095282794e692e25c4
SHA5126d561c78dd9a2da4131c80f7b10e52fce14aef6357c9fcbc69950eacf5b6437bac72c599bb1a0a31d66e97e763b97e4022deec36f127cab3c79713dcde920b2a
-
Filesize
1KB
MD5a86582f2b52892997a0dfdacc769407b
SHA179739b17054dc81fce9081fae5030764b236cb74
SHA25677ee655e950ff091b005dbf0e53413491706d0a6cf7fac8e296b5790cd325f45
SHA5126e0186f1a002490ba3268892a2c7c248a3946dcb7c0dd0877cfd0b0ab07bae764307642e07ef8cf64256cb8133a8c4c5ca393493ebb42178b9f8cce1b375aec4
-
Filesize
954B
MD55dfeb5b86733e1e37b5adc0b35c533b4
SHA1400c437260055bae18507306a046690045f648be
SHA256a9a2766091d3531aabdcc727ba0788a296ba335e72762f00cc673a318963f40f
SHA512d35b09f8bef65ee2e37201cb1ae5aee9c3a085a6a31657eaf3652a1e7a81ec54e6532e0206f1d51a5fe4713d320f4819c5cd6d91c6d260550a388c89f8a82656
-
Filesize
435KB
MD573165a3b64fea356419ebebf93e78687
SHA1bdec62cf2d946543a7649262dfdbfb595402615e
SHA2567d46374fbc379a7e4d878b80f6f97fd1e9f46539f6d21e8c6b89dc650ad06a08
SHA512f2ed454fe06253c6804cd49929bd15ef32d4e6ae8d529b2a0fa2fc409b179c36e161c16091f0cdab951e1ba0892847ac5affe04ddf7b8839bcd77dbb58568f0d
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
1.1MB
MD5727176a93823f1e50143ed28a14527a4
SHA18974bacbffeaf72e739e98a8eed796cf2e081b0c
SHA256c1a902ea477a36f56c456eb165f4a13d55362701f088b30df357a58093c6047f
SHA51246dff2fcf0fca3e2b5fc36cc2575103e93ac2406736cf59a86efcdd8c5f3cdff98cbdb39a08e14327651a3658a43bc0911b545373ebfcf3946099f29f4aa9af2