Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 10:03
Behavioral task
behavioral1
Sample
7f8e93f336b2bf2c99e14ed63228fedc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7f8e93f336b2bf2c99e14ed63228fedc.exe
Resource
win10v2004-20231215-en
General
-
Target
7f8e93f336b2bf2c99e14ed63228fedc.exe
-
Size
1.1MB
-
MD5
7f8e93f336b2bf2c99e14ed63228fedc
-
SHA1
186e534213f07843e341a69b57f6a6e3c9b9446e
-
SHA256
f7d4a00e95238423ea0c19e44cef16830b488afb2ac3cbb18c0a1aae3750f88c
-
SHA512
09d2f22ecb49c4f7880a23a1a0a838d5f8e589dd23d4d5038bb50d3bffe6631881a5b8136604855b826c86c74d0c17875392b61e15031ac4c7160210feccc235
-
SSDEEP
12288:zMMpXKb0hNGh1kG0HWNAuCsltHlYzU+Wgn:zMMpXS0hN0V0HDIHyos
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 7f8e93f336b2bf2c99e14ed63228fedc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x000b000000012263-2.dat aspack_v212_v242 behavioral1/files/0x000700000001422b-38.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-55.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 7f8e93f336b2bf2c99e14ed63228fedc.exe -
Executes dropped EXE 1 IoCs
pid Process 2236 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 1364 7f8e93f336b2bf2c99e14ed63228fedc.exe 1364 7f8e93f336b2bf2c99e14ed63228fedc.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\K: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\V: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\G: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\M: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\R: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\U: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\W: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\Z: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\J: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\N: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\S: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\H: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\I: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\Q: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\B: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\A: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\O: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\T: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\L: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\Y: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\P: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\X: 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened (read-only) \??\Q: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened for modification C:\AUTORUN.INF 7f8e93f336b2bf2c99e14ed63228fedc.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe File created C:\Windows\SysWOW64\HelpMe.exe 7f8e93f336b2bf2c99e14ed63228fedc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2236 1364 7f8e93f336b2bf2c99e14ed63228fedc.exe 28 PID 1364 wrote to memory of 2236 1364 7f8e93f336b2bf2c99e14ed63228fedc.exe 28 PID 1364 wrote to memory of 2236 1364 7f8e93f336b2bf2c99e14ed63228fedc.exe 28 PID 1364 wrote to memory of 2236 1364 7f8e93f336b2bf2c99e14ed63228fedc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f8e93f336b2bf2c99e14ed63228fedc.exe"C:\Users\Admin\AppData\Local\Temp\7f8e93f336b2bf2c99e14ed63228fedc.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD50c8111da1eb3225397359b01d57513ba
SHA1553a7480c34e0d220c7a99a590ebac2a480be4eb
SHA256474968f9755d96658fdbb339d70c1c2a92870d91a6ba7aaba4e55263801e3258
SHA512a4124d1a39670da8c8f073330bf17127e5c4d3df21c381f8280387b8d8a4f78330a7c3962426289cf8c3d539987ef241f333e50da6031b3592b17d9fe1c8c2b6
-
Filesize
1KB
MD53fa5878aa40d31915874ab896f766071
SHA181f25a20a7c81c1f1895324940d0362cb5de54fb
SHA256535e30f090e88097685d10f8efaf38c93826f09c6605639890f31203f703d76d
SHA51206704aee1e3dd0f3c886cbe754a108ffadf4b1b9e0a1c2bd47431d0cfddc172b48a29c8d13b0ab029f23613512e2024bdc3ab7c3ce8ba56a8dfd7e4976f45ffc
-
Filesize
954B
MD544aae7306907d42e838eeeb4c1225b65
SHA14909c7e4d7f71dd939e7fd0a9b1a4df7249f5e5d
SHA2567f279267b559bca261a52e7e1d4c44055a0af08ad503390d9fa77ff98599b8dd
SHA51206af96085b8f6229b32c4a6020b0024a33f6613847e43ac7fc551232f05245af2bfbabfc9e45371e4d71fba556629ae982aead984202e659f6d1dbe25f6d99be
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
1.1MB
MD57f8e93f336b2bf2c99e14ed63228fedc
SHA1186e534213f07843e341a69b57f6a6e3c9b9446e
SHA256f7d4a00e95238423ea0c19e44cef16830b488afb2ac3cbb18c0a1aae3750f88c
SHA51209d2f22ecb49c4f7880a23a1a0a838d5f8e589dd23d4d5038bb50d3bffe6631881a5b8136604855b826c86c74d0c17875392b61e15031ac4c7160210feccc235
-
Filesize
1.1MB
MD57930f19c44280f3b5228bff5bb968ce5
SHA1a4e04359fb5c6e5f59f6881109f58ea6c32ed5d4
SHA2564cd5b7e79c9958a711b425aeb9e37886c7c9f56bb5e4b708d3b480cd071f39be
SHA5122347f8539d59119cd80eae40993110c56d54cd51612dec3918bd587720fbf1e8a22903db7afe0711fe4dfa3db7f697277c846c778bccf3a4f841a46e4d612656