Analysis

  • max time kernel
    148s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03/02/2024, 17:01

General

  • Target

    8cdcf8cbfe19eb634aad49ddea05b721.exe

  • Size

    881KB

  • MD5

    8cdcf8cbfe19eb634aad49ddea05b721

  • SHA1

    71d1d5378bcdbb3c176194dd648a9571789f4d5d

  • SHA256

    5efb103d520a1107fbaa200b8cbeafced0a36ad2355c4dd765f7638e5621313e

  • SHA512

    6524a0910a70b33b006bdf8525d32cbcedf5e8677e881943ce737fc68b70f8ba00a688e0d53175d1b4f670b2ec0dc69cb78b24e980d01edd474702ec58310f56

  • SSDEEP

    24576:aEtl9mRda1VITSGB2uJ2s4otqFCJrW9FqvSbqsHasgXhFHDAGtlRXZ+CP63n0Num:xEs12Gr4kfxuN

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (91) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8cdcf8cbfe19eb634aad49ddea05b721.exe
    "C:\Users\Admin\AppData\Local\Temp\8cdcf8cbfe19eb634aad49ddea05b721.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      PID:608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2444714103-3190537498-3629098939-1000\desktop.ini.exe

    Filesize

    881KB

    MD5

    3d96794d5b1ad8b224ab8f155a0a9afd

    SHA1

    a755abe77e95c22bdb1b6fee0b08b2c8a22395d8

    SHA256

    4fbdfe908ddae02ae49a31f62ad05e04dfb749047878b3f4bc24ec042db661a8

    SHA512

    b5054b89a9360ad2bdf81fa9ae4d5afbbf0ad6d09cf56fc025d8278093a00dc575976d0587b677f14d19f80028db24a4267a4ed4ed4c9f0d2d8233ec18625cf5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    954B

    MD5

    a6f19ce52ec33397fc1f4aaf50cc1e32

    SHA1

    1a5059417277b5b41f6ef75276002fd7109a0f4d

    SHA256

    bc77af5f49cd3be56bfcbd52952946fe3a0b8cf841d6485bdb1a79aa0380c141

    SHA512

    4e4884a3e508340f7c237491de1017b4fc4b08ccda5ded399319acca1a382737c02cec44a89e7c1e7894463170f77fea84813b101cb2accdf027d9ccf19c2f87

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    6cb4877c99742bef0f620cf29ae2c1c9

    SHA1

    e2a4cfa1d25cd495700e5d9950c811734ec27d45

    SHA256

    d5be63fc20f7ba21d37a735a5e6e43073890f601bed41b56bf3dee99b7d2feed

    SHA512

    550e5faa686687d1a96f43222bea78294b5f17602d2558ad21bb77cd2aad9cf5024a98238ffb79d66636c9cb9d09a49d84229c4d06a271bced5596b0575086fd

  • F:\AUTORUN.INF

    Filesize

    145B

    MD5

    ca13857b2fd3895a39f09d9dde3cca97

    SHA1

    8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

    SHA256

    cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

    SHA512

    55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

  • F:\AutoRun.exe

    Filesize

    881KB

    MD5

    8cdcf8cbfe19eb634aad49ddea05b721

    SHA1

    71d1d5378bcdbb3c176194dd648a9571789f4d5d

    SHA256

    5efb103d520a1107fbaa200b8cbeafced0a36ad2355c4dd765f7638e5621313e

    SHA512

    6524a0910a70b33b006bdf8525d32cbcedf5e8677e881943ce737fc68b70f8ba00a688e0d53175d1b4f670b2ec0dc69cb78b24e980d01edd474702ec58310f56

  • \Windows\SysWOW64\HelpMe.exe

    Filesize

    880KB

    MD5

    d174c7dd21726a41ab5d085624ace76e

    SHA1

    5fd7193db058fdf4f84ac35a03d49f83d597efae

    SHA256

    894fce776e04dea6a884cea5a16cf84dfff049eb1f6e6357d7e70384b0f62ea0

    SHA512

    4028f40bb5ead06c3ae07c4c043f29916960340398a278bcad28732465a59b6404f13e8021712a83617f8943cb50d93b10aaeadcf5805d7bf9bf99613eefbc81

  • memory/608-11-0x0000000000400000-0x000000000047894E-memory.dmp

    Filesize

    482KB

  • memory/608-13-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2236-0-0x0000000000400000-0x000000000047894E-memory.dmp

    Filesize

    482KB

  • memory/2236-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2236-4-0x0000000001E00000-0x0000000001E79000-memory.dmp

    Filesize

    484KB