Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
8c25b0dc860a18b9ff96a9a8c8ab6468.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8c25b0dc860a18b9ff96a9a8c8ab6468.exe
Resource
win10v2004-20231215-en
General
-
Target
8c25b0dc860a18b9ff96a9a8c8ab6468.exe
-
Size
1.4MB
-
MD5
8c25b0dc860a18b9ff96a9a8c8ab6468
-
SHA1
947657839f9ce890667a6159f511f50f8dd560ef
-
SHA256
ebb5b56ba0b47c37b2ff05de65760214f69ef5d224869f1ccb7addf47f44a5f6
-
SHA512
d2fee0aa4db36ecacbfe5a78b8eeabd8f9337d841d7a92d640de996bdba5d98e55db50f918135fe5e58227c76836d5156b6d4384750fcc6a64cadf1b8d7f9824
-
SSDEEP
24576:8Etl9mRda1hSGB2uJ2s4otqFCJrW9FqvSbqsHasgXhFHDAGtlRXZ+CP63n0NuJvO:PEs1cM
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 8c25b0dc860a18b9ff96a9a8c8ab6468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 8c25b0dc860a18b9ff96a9a8c8ab6468.exe -
Executes dropped EXE 1 IoCs
pid Process 2284 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2080 8c25b0dc860a18b9ff96a9a8c8ab6468.exe 2080 8c25b0dc860a18b9ff96a9a8c8ab6468.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\S: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\Y: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\Z: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\A: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\K: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\N: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\O: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\U: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\I: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\Q: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\M: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\T: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\P: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\W: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\J: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\E: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\G: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\H: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\R: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\X: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\B: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\V: 8c25b0dc860a18b9ff96a9a8c8ab6468.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF HelpMe.exe File opened for modification F:\AUTORUN.INF 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File opened for modification C:\AUTORUN.INF 8c25b0dc860a18b9ff96a9a8c8ab6468.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 8c25b0dc860a18b9ff96a9a8c8ab6468.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2284 2080 8c25b0dc860a18b9ff96a9a8c8ab6468.exe 28 PID 2080 wrote to memory of 2284 2080 8c25b0dc860a18b9ff96a9a8c8ab6468.exe 28 PID 2080 wrote to memory of 2284 2080 8c25b0dc860a18b9ff96a9a8c8ab6468.exe 28 PID 2080 wrote to memory of 2284 2080 8c25b0dc860a18b9ff96a9a8c8ab6468.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c25b0dc860a18b9ff96a9a8c8ab6468.exe"C:\Users\Admin\AppData\Local\Temp\8c25b0dc860a18b9ff96a9a8c8ab6468.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD51d6249ecf813074ae220cc36a9a32d0c
SHA19389b8af7b84c1683b6a07ec46e61bc1e9b3854b
SHA256fb214bb84e82a799d35e2f23e27fcdf03772f35238cc3bbf787a0d94bf658b26
SHA512984022b3e00c6157899294f92fb8994305653433173ccd54dc1fa201641d806939d0b7db8754b1f6fe4162b4403bee36c0d0c0a7a85942e16fc109f7c56b6fb8
-
Filesize
1KB
MD56065094a85688013b5cc7f3f97d0fe36
SHA104516e58b7136f305b2752bcb6ba70c27719eb8b
SHA25608a36bbc21fbd55ddd7f259924893b1dd171f0bafb141e75312068b542634d15
SHA5122f06b77b76fc1f55d7583ea84e9bd08ab8d9a73a562a590c2371604718f1bc1ea87e52e78d05e42e787b203a6ee66efba27ba57cea6be1f0622181763b798fa5
-
Filesize
950B
MD58b1e9baa5c4bbb1065d673ce0f188636
SHA110944b55e6f46a4fab1634139aeb7116fcb914b2
SHA256e88d979fec83eef9a05e7a78cf9be6c5381f89b2e767c0f36a5155ba73c5e1e2
SHA5128b3cb68219e04af30abf458262e28c2b9c71ebc7886c3419819317b6c29720d670ed80d30aaa80c7bc5e678bd2eea31571660a49f20d0e588dc594d381a52b3d
-
Filesize
384KB
MD534d0c9c89de8cad087a60496c596f6ed
SHA1845070f72aafe97f2499c5d044eec16ea053e725
SHA2563ee4295484dac7d825453f3669e46d4c358ca0ac9a9d3cff79a96beee13f87e9
SHA512a8326ee4b448cd1dc25d5c675d9b5fa5b2db05a556aee888eda886f820aa257e4b74d529fdbb351b7f0df15356dd7a64395aba86f7ac6912f49aec77dd573908
-
Filesize
318KB
MD585890b8d75ba347d0310130708f16035
SHA117743fb027e031c3760ebeea31e17e2767adde9f
SHA2567af4aa4706c7e1a7ef41d55a76bf430bee403e745dc9226ba4b8e92539c13784
SHA512fb4a17288f50a43b751cff37c72561e36f4fc4a8132c515cfdab870025ab3f78bd5b29748621b1998a6c9905ac5ce9d9f797bae8451c8c74b3369007ca9ff257
-
Filesize
515KB
MD5b6c837d98a838705912dd2a54287dd21
SHA1320f12e29ac5b8079c23c333f37564fd07316217
SHA2561ec2c7cef9f2207b9dd326b49c3223f3fbfa4c43b9ca9d11deae196753652edf
SHA51277034e7d68bc37a7233852985e82209171dedf8cdd81dba7d40a920b67a03bc45ad3d33895a02c15206f939ae7b0fd2c2c20b6d2a29c255ee4493fe2dfc84e68
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
1.4MB
MD58c25b0dc860a18b9ff96a9a8c8ab6468
SHA1947657839f9ce890667a6159f511f50f8dd560ef
SHA256ebb5b56ba0b47c37b2ff05de65760214f69ef5d224869f1ccb7addf47f44a5f6
SHA512d2fee0aa4db36ecacbfe5a78b8eeabd8f9337d841d7a92d640de996bdba5d98e55db50f918135fe5e58227c76836d5156b6d4384750fcc6a64cadf1b8d7f9824
-
Filesize
413KB
MD58701cd9e743ec5bde431a3cfe7e32f60
SHA1114f548eb5f124819b4858959515c32637fba674
SHA256051dadc2d71f93a072a83442908e3df459fef9f92f9c55b01cb5a0676c6f78e7
SHA5129276d7bfd7fc5927755cafaba384834ef8305237a31477b067ce59ff032160d42b29a6633d09f262b5d86d9e39d37852e945ba6d4e5160f0b4d76732a6c332e5
-
Filesize
284KB
MD51206d708b444f11c369ae51fdcef9080
SHA121831e38e21afee5ebd98bec8541398b9752a0c9
SHA256269710b0dc6bcd92d828fda927c71794a8f1a23aad678a4795313d17c8343c5e
SHA5124f3fedbf1f1c19a6f253f45e6985d14c79acca877ddd81515e2e2ed90c46e501be7bd510c4f7ecb8836a0dbef8f82e0fac30a924ca5b7b5e2ae9220dccf65f6b