Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
802fb676e94d338ab31044d4d91df6e1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
802fb676e94d338ab31044d4d91df6e1.exe
Resource
win10v2004-20231215-en
General
-
Target
802fb676e94d338ab31044d4d91df6e1.exe
-
Size
812KB
-
MD5
802fb676e94d338ab31044d4d91df6e1
-
SHA1
84f330f304c5e61f03799c774d485c694edfb131
-
SHA256
06c374df71b088607533cae2db8dd7e2b8ad267bf617575fa2da287d006f1d69
-
SHA512
73dc1c2e199cfc5a0f7e9b8a17bf27a72d10326936bacd86eff35ab9c5af0daba94a111b6b61c788e0824ed22094392fbdb9ae6f8201aefaf1a43f1ccb961fe8
-
SSDEEP
12288:Tp4pNfz3ymJnJ8QCFkxCaQTOlOb4bcvpxH/d9:tEtl9mRda1oRxH/b
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 802fb676e94d338ab31044d4d91df6e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 802fb676e94d338ab31044d4d91df6e1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 802fb676e94d338ab31044d4d91df6e1.exe -
Executes dropped EXE 1 IoCs
pid Process 2888 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 1032 802fb676e94d338ab31044d4d91df6e1.exe 1032 802fb676e94d338ab31044d4d91df6e1.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\W: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\H: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\L: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\B: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\Q: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\J: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\M: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\I: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\P: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\X: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\S: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\T: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\Z: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\E: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\K: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\A: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\N: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\R: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\U: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\Y: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\G: 802fb676e94d338ab31044d4d91df6e1.exe File opened (read-only) \??\O: 802fb676e94d338ab31044d4d91df6e1.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 802fb676e94d338ab31044d4d91df6e1.exe File opened for modification C:\AUTORUN.INF 802fb676e94d338ab31044d4d91df6e1.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 802fb676e94d338ab31044d4d91df6e1.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1032 wrote to memory of 2888 1032 802fb676e94d338ab31044d4d91df6e1.exe 28 PID 1032 wrote to memory of 2888 1032 802fb676e94d338ab31044d4d91df6e1.exe 28 PID 1032 wrote to memory of 2888 1032 802fb676e94d338ab31044d4d91df6e1.exe 28 PID 1032 wrote to memory of 2888 1032 802fb676e94d338ab31044d4d91df6e1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\802fb676e94d338ab31044d4d91df6e1.exe"C:\Users\Admin\AppData\Local\Temp\802fb676e94d338ab31044d4d91df6e1.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
812KB
MD5e855f5d5f1fa2ea8e6cd2c7ea6022b3f
SHA1eb83a88d41bf9d564a8cccbec336d769540917b7
SHA25619497bc10d7f4df43c9633006f073425f5902590e8482e0e1aa77757a575e216
SHA5128f555b8423ce7dbdf82063c7c9eee8145e2d45b5701c9b4b04b15e2b6eb98d02ccc1b7e1d2eace72e545be24630a55f6d1357d2493b8309943f2ec0907ffd34b
-
Filesize
954B
MD5b00de8662e478c50215a0365a0992117
SHA1cb946d7924c4c9949e7a743891feccccf52f58c2
SHA256cf7f687670ddef762cd73f73970eacdb1c9230c83b2f524a3f8de66e008490c6
SHA51249061dfafe6d6e25f3a574909b117ce063992fc1a0f61192e46315626b2ecae2850ef5a19b1f4cbb32a36e2d59f5ba1e09f44847f71770d81a545801ae0e67e0
-
Filesize
1KB
MD5b66aef0dae3322941f185cdc4fdb057e
SHA1596c2ea8c22fb2fcb183710d68504161a5778148
SHA25654ffd0489540a12433e13b595737fb9d2a1d86808ba4e111df8aab38d9f9e221
SHA51220fcbb6455fd3625590f77f7798dfadc90d88a70df538c66c3b4cb78a0bd1bff1b73f5e59b2c6ea008abd1582a5d8e75c151b777fde01fe848b72c6c84a72472
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
812KB
MD5802fb676e94d338ab31044d4d91df6e1
SHA184f330f304c5e61f03799c774d485c694edfb131
SHA25606c374df71b088607533cae2db8dd7e2b8ad267bf617575fa2da287d006f1d69
SHA51273dc1c2e199cfc5a0f7e9b8a17bf27a72d10326936bacd86eff35ab9c5af0daba94a111b6b61c788e0824ed22094392fbdb9ae6f8201aefaf1a43f1ccb961fe8
-
Filesize
735KB
MD5dd3acf96e378a143e1336cfcacc895e7
SHA1e334e05ebce4538cfb3aed942acac8e7f59c4b26
SHA2567c5c757f4a44a5b537f6a1fb406c2c65071facd8b0d40428d9b943d7a76efc9a
SHA512fc616082e5afc63f61353158674746cf7b23fc0cedde01dbdf672c420d9f01bb5284e013335779a278a3206c26fda1176f649adcd8fcb7ce5981a7bb12ed67df