Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 20:16
Behavioral task
behavioral1
Sample
756bab043d61134b32672f731922b9ad.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
756bab043d61134b32672f731922b9ad.exe
Resource
win10v2004-20231215-en
General
-
Target
756bab043d61134b32672f731922b9ad.exe
-
Size
5.9MB
-
MD5
756bab043d61134b32672f731922b9ad
-
SHA1
cd259f4a8e1ff1d0713b03bf6a36044eb94d0e4d
-
SHA256
7818e559bd7eb1a59e44bae2781519ee345c4213a96eb4fd587f6c31aaa0f58c
-
SHA512
8984e42b966a057898ce641d892b8fa599efae68fa1f50cf134e2e8dae6eebfe3087b6c5805ab5f5057f3e70a02304fa22548f3f5a6d172ae038a94b87b77d14
-
SSDEEP
24576:ZMMpXS0hN0V0HZSGB2uJ2s4otqFCJrW9FqvSbqsHasgXhFHDAGtlRXZ+CP63n0Nf:Kwi0L0qk
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 756bab043d61134b32672f731922b9ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x000c000000012327-2.dat aspack_v212_v242 behavioral1/files/0x000c000000012327-8.dat aspack_v212_v242 behavioral1/files/0x000c000000012327-7.dat aspack_v212_v242 behavioral1/files/0x000c000000012327-4.dat aspack_v212_v242 behavioral1/files/0x000c000000012327-9.dat aspack_v212_v242 behavioral1/files/0x0007000000015651-38.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-61.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 756bab043d61134b32672f731922b9ad.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 756bab043d61134b32672f731922b9ad.exe -
Executes dropped EXE 1 IoCs
pid Process 2144 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 3028 756bab043d61134b32672f731922b9ad.exe 3028 756bab043d61134b32672f731922b9ad.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\N: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\P: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\V: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\Z: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\J: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\Q: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\A: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\B: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\G: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\M: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\S: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\Y: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\X: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\R: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\W: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\E: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\H: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\K: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\L: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\O: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\T: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\I: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\U: 756bab043d61134b32672f731922b9ad.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 756bab043d61134b32672f731922b9ad.exe File opened for modification C:\AUTORUN.INF 756bab043d61134b32672f731922b9ad.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 756bab043d61134b32672f731922b9ad.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2144 3028 756bab043d61134b32672f731922b9ad.exe 28 PID 3028 wrote to memory of 2144 3028 756bab043d61134b32672f731922b9ad.exe 28 PID 3028 wrote to memory of 2144 3028 756bab043d61134b32672f731922b9ad.exe 28 PID 3028 wrote to memory of 2144 3028 756bab043d61134b32672f731922b9ad.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\756bab043d61134b32672f731922b9ad.exe"C:\Users\Admin\AppData\Local\Temp\756bab043d61134b32672f731922b9ad.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD56a71c7c9aae8a4d111b014697ab699d3
SHA1f2ac96dc726bd5b1fb9aab5683f5e70bc0d72e41
SHA256f9831837c9d16617d32669d394b0bb87f2b431ded6104658a5e12c952ec1ff04
SHA512222efd0983544031ac24e953162976116741dec53e1f0da55bb827c53973fc10c25c8bdeca4ccf0e55f1098da8b070cded61421b61d3818cf6db54ee8f16a343
-
Filesize
1KB
MD53519f0563b26b33e610ba18281622789
SHA1004a2b4f4c014ca9d75f95d0690d9f6c25abb9aa
SHA25698238dcf66967ccc0ce81ae865e32145ea19511879e0a05ec1b0c6c51df98a9b
SHA5129bacfbe4f9443b66123097dea74c8f891ea243bd2b547e93a32cc6eb4e69ce72e5d259aec0a639dab3649f92ed670d0931f6bcac56f1763473a029bbc4a55a2b
-
Filesize
950B
MD5bc85055336665e4a538e071c81a20e2a
SHA1a1158a0a5c3d0a97795c3ede7b2b576b8ac1e924
SHA256f4c25112c7daf9b5fb1429a48584e113b80f2b818a6730cf154e015901c005e9
SHA512e0f5202a878cbba3112cdae0bcf8b25fe22a2e2a92ba9ad4798faabe8390d91ea71ff7001ce162f2d5801022819d55566086097ee95d44201788fc384c3d4374
-
Filesize
636KB
MD542f26ed376f4e7894330e59d77dc5af1
SHA1a7ce6afc8ef1b2406ad7936cd6a24a3a574f29a0
SHA2566087fca4e2056141f9739d1ce66d4b326f40cc34cc26bb73af3364baccf231cd
SHA512941541a32aaa1792d194ae9961b1bc518e8850e4462b45b67101ff1be6923c925f3e2373e3eed063a551533cead94e7675e941a16e9ac1759488e6eb3d4ece6c
-
Filesize
567KB
MD52fa9fe1ef28eb0fb3ec393360780324a
SHA1fc4762440762130bdcc7fdb1e602c9115e96c65a
SHA25620fe9585600f53600da6ed8c7be36522e8e97d9dd5b14f5a3ec94744344dead4
SHA512a4b643b3695fa5a0a4d3311c532c8772f95580b1a00457ecb91d07bcef19cc4a3db9c9b1d349dc625c6d490d3571ba5158229610a2789fbc4bb9b52d5769f63e
-
Filesize
1.0MB
MD57c5050979402512dfb9b221b5784cba8
SHA1a7270f67bf4c0aefc52c18e61b19b6ab3803f3b5
SHA256ff45805fea350a65f5294af85d5094aff996fa7f690b24fd36ec1b3c802ef4f7
SHA51268f8a567e00bf4e3b619e9099e2afa356767eb1c1a4ace031fa150a00a77e5075754b8c823ead0d376234042ae656f8f96156502ab07c587f8ae558bbba6fce8
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
1.6MB
MD5e9f694ef9ab552b4d2751ffb287263f7
SHA12b76a611d30cf2009842f7ff60f62faede7b501a
SHA2560647f8983b53291b502d5e73347768e7178cd6ebf5dcf43211f58a0b4c23d5d2
SHA51256f907a0a373d557a36c60338920d79d26f5a7b70e174ad5855ff5f79199b9d492840d2e204be77bf71ac6da6ad2dbf3c6311a698e91176d15b301a8d6540c98
-
Filesize
1.7MB
MD5e4fa1e6b63a13629d5a857ead5a8130a
SHA169b3c042eced1ad70bbd3f5f87f9156b50dad80a
SHA25634211fac055018f7ab22f4496aff391ad2537b86154ef4d540eaf53ec7b4ea66
SHA512a3eece92396e9a70d484aa40c488f48ca4e733c287de1f0672fc418d9f2eb284e68c04e6b996138432228821aefebd39909ee3407495e51542564e21d66ef5f8
-
Filesize
957KB
MD5ef72f3821a26a31d33a44a7d93a0634d
SHA15b6fc3575cb1958a20396084fcd707243ca5b45c
SHA256fe3334a3d6be292911d73d74cbbaa095fac664eaa043ad1af20364ff8d749a26
SHA5126e034fddeced0ce01b3bb67bf8e5a0d3395aa17bae01926e0142c8dbffcbdb4aeaf3f554fa102f0c5b0cdc5121b63ba640a171c8c9403c91fbab02166ca32c67