Analysis

  • max time kernel
    146s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03/02/2024, 10:52

General

  • Target

    8c25b0dc860a18b9ff96a9a8c8ab6468.exe

  • Size

    1.4MB

  • MD5

    8c25b0dc860a18b9ff96a9a8c8ab6468

  • SHA1

    947657839f9ce890667a6159f511f50f8dd560ef

  • SHA256

    ebb5b56ba0b47c37b2ff05de65760214f69ef5d224869f1ccb7addf47f44a5f6

  • SHA512

    d2fee0aa4db36ecacbfe5a78b8eeabd8f9337d841d7a92d640de996bdba5d98e55db50f918135fe5e58227c76836d5156b6d4384750fcc6a64cadf1b8d7f9824

  • SSDEEP

    24576:8Etl9mRda1hSGB2uJ2s4otqFCJrW9FqvSbqsHasgXhFHDAGtlRXZ+CP63n0NuJvO:PEs1cM

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (91) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c25b0dc860a18b9ff96a9a8c8ab6468.exe
    "C:\Users\Admin\AppData\Local\Temp\8c25b0dc860a18b9ff96a9a8c8ab6468.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      PID:2284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-928733405-3780110381-2966456290-1000\desktop.ini.exe

    Filesize

    1.4MB

    MD5

    1d6249ecf813074ae220cc36a9a32d0c

    SHA1

    9389b8af7b84c1683b6a07ec46e61bc1e9b3854b

    SHA256

    fb214bb84e82a799d35e2f23e27fcdf03772f35238cc3bbf787a0d94bf658b26

    SHA512

    984022b3e00c6157899294f92fb8994305653433173ccd54dc1fa201641d806939d0b7db8754b1f6fe4162b4403bee36c0d0c0a7a85942e16fc109f7c56b6fb8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    6065094a85688013b5cc7f3f97d0fe36

    SHA1

    04516e58b7136f305b2752bcb6ba70c27719eb8b

    SHA256

    08a36bbc21fbd55ddd7f259924893b1dd171f0bafb141e75312068b542634d15

    SHA512

    2f06b77b76fc1f55d7583ea84e9bd08ab8d9a73a562a590c2371604718f1bc1ea87e52e78d05e42e787b203a6ee66efba27ba57cea6be1f0622181763b798fa5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    950B

    MD5

    8b1e9baa5c4bbb1065d673ce0f188636

    SHA1

    10944b55e6f46a4fab1634139aeb7116fcb914b2

    SHA256

    e88d979fec83eef9a05e7a78cf9be6c5381f89b2e767c0f36a5155ba73c5e1e2

    SHA512

    8b3cb68219e04af30abf458262e28c2b9c71ebc7886c3419819317b6c29720d670ed80d30aaa80c7bc5e678bd2eea31571660a49f20d0e588dc594d381a52b3d

  • C:\Windows\SysWOW64\HelpMe.exe

    Filesize

    384KB

    MD5

    34d0c9c89de8cad087a60496c596f6ed

    SHA1

    845070f72aafe97f2499c5d044eec16ea053e725

    SHA256

    3ee4295484dac7d825453f3669e46d4c358ca0ac9a9d3cff79a96beee13f87e9

    SHA512

    a8326ee4b448cd1dc25d5c675d9b5fa5b2db05a556aee888eda886f820aa257e4b74d529fdbb351b7f0df15356dd7a64395aba86f7ac6912f49aec77dd573908

  • C:\Windows\SysWOW64\HelpMe.exe

    Filesize

    318KB

    MD5

    85890b8d75ba347d0310130708f16035

    SHA1

    17743fb027e031c3760ebeea31e17e2767adde9f

    SHA256

    7af4aa4706c7e1a7ef41d55a76bf430bee403e745dc9226ba4b8e92539c13784

    SHA512

    fb4a17288f50a43b751cff37c72561e36f4fc4a8132c515cfdab870025ab3f78bd5b29748621b1998a6c9905ac5ce9d9f797bae8451c8c74b3369007ca9ff257

  • C:\Windows\SysWOW64\HelpMe.exe

    Filesize

    515KB

    MD5

    b6c837d98a838705912dd2a54287dd21

    SHA1

    320f12e29ac5b8079c23c333f37564fd07316217

    SHA256

    1ec2c7cef9f2207b9dd326b49c3223f3fbfa4c43b9ca9d11deae196753652edf

    SHA512

    77034e7d68bc37a7233852985e82209171dedf8cdd81dba7d40a920b67a03bc45ad3d33895a02c15206f939ae7b0fd2c2c20b6d2a29c255ee4493fe2dfc84e68

  • F:\AUTORUN.INF

    Filesize

    145B

    MD5

    ca13857b2fd3895a39f09d9dde3cca97

    SHA1

    8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

    SHA256

    cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

    SHA512

    55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

  • F:\AutoRun.exe

    Filesize

    1.4MB

    MD5

    8c25b0dc860a18b9ff96a9a8c8ab6468

    SHA1

    947657839f9ce890667a6159f511f50f8dd560ef

    SHA256

    ebb5b56ba0b47c37b2ff05de65760214f69ef5d224869f1ccb7addf47f44a5f6

    SHA512

    d2fee0aa4db36ecacbfe5a78b8eeabd8f9337d841d7a92d640de996bdba5d98e55db50f918135fe5e58227c76836d5156b6d4384750fcc6a64cadf1b8d7f9824

  • \Windows\SysWOW64\HelpMe.exe

    Filesize

    413KB

    MD5

    8701cd9e743ec5bde431a3cfe7e32f60

    SHA1

    114f548eb5f124819b4858959515c32637fba674

    SHA256

    051dadc2d71f93a072a83442908e3df459fef9f92f9c55b01cb5a0676c6f78e7

    SHA512

    9276d7bfd7fc5927755cafaba384834ef8305237a31477b067ce59ff032160d42b29a6633d09f262b5d86d9e39d37852e945ba6d4e5160f0b4d76732a6c332e5

  • \Windows\SysWOW64\HelpMe.exe

    Filesize

    284KB

    MD5

    1206d708b444f11c369ae51fdcef9080

    SHA1

    21831e38e21afee5ebd98bec8541398b9752a0c9

    SHA256

    269710b0dc6bcd92d828fda927c71794a8f1a23aad678a4795313d17c8343c5e

    SHA512

    4f3fedbf1f1c19a6f253f45e6985d14c79acca877ddd81515e2e2ed90c46e501be7bd510c4f7ecb8836a0dbef8f82e0fac30a924ca5b7b5e2ae9220dccf65f6b

  • memory/2080-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2080-236-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2284-9-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2284-237-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB