Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 20:42
Behavioral task
behavioral1
Sample
8d4c8ff1e3c0929b81020073df656a41.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8d4c8ff1e3c0929b81020073df656a41.exe
Resource
win10v2004-20231222-en
General
-
Target
8d4c8ff1e3c0929b81020073df656a41.exe
-
Size
7.2MB
-
MD5
8d4c8ff1e3c0929b81020073df656a41
-
SHA1
8b15ade3540f648999e13378c96ed5e42c8ac681
-
SHA256
4f24c1311642003c237780de49f39f46ceb450411490335a8048c36b9198053c
-
SHA512
a9d913b6cbd6badb836d1cc93342c72401b88a57afbda24f1862fd28153bf99276cd3517c441d2792ce332b8a50be2178986d0dc3f122834bd2be931f413dc8a
-
SSDEEP
49152:Kwi0L0q+wi0L0qRKqFYhrRB8NIMI8Sfpwotkzaxc1OGz84:Vi0fi0H/IMzKpXOMGQ4
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 8d4c8ff1e3c0929b81020073df656a41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x000a000000012255-2.dat aspack_v212_v242 behavioral1/files/0x00070000000186bd-38.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-53.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 8d4c8ff1e3c0929b81020073df656a41.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 8d4c8ff1e3c0929b81020073df656a41.exe -
Executes dropped EXE 1 IoCs
pid Process 2716 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2060 8d4c8ff1e3c0929b81020073df656a41.exe 2060 8d4c8ff1e3c0929b81020073df656a41.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\J: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\R: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\A: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\V: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\O: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\P: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\W: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\H: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\K: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\I: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\N: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\Q: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\Y: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\G: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\L: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\T: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\X: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\E: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\S: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\U: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\B: 8d4c8ff1e3c0929b81020073df656a41.exe File opened (read-only) \??\M: 8d4c8ff1e3c0929b81020073df656a41.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 8d4c8ff1e3c0929b81020073df656a41.exe File opened for modification C:\AUTORUN.INF 8d4c8ff1e3c0929b81020073df656a41.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 8d4c8ff1e3c0929b81020073df656a41.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2716 2060 8d4c8ff1e3c0929b81020073df656a41.exe 28 PID 2060 wrote to memory of 2716 2060 8d4c8ff1e3c0929b81020073df656a41.exe 28 PID 2060 wrote to memory of 2716 2060 8d4c8ff1e3c0929b81020073df656a41.exe 28 PID 2060 wrote to memory of 2716 2060 8d4c8ff1e3c0929b81020073df656a41.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d4c8ff1e3c0929b81020073df656a41.exe"C:\Users\Admin\AppData\Local\Temp\8d4c8ff1e3c0929b81020073df656a41.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.2MB
MD524eb3ddfa70a905085d3ff8660afed49
SHA1fc1126c420d65a08563d87f95deb19b3efd7e600
SHA256b489fced7b95faa7976d9756a30fb93f4d68a535cc73512b68742ac60ace7f93
SHA5120127f4cd265c7015db705f239af7d2acd1913f8f4a58b3435bb9544d13a0d5b53308f8fefb804504f807e7a6380e8c36af8673298b2f4368d2b4089abb24e2e2
-
Filesize
954B
MD510cfd64f1591c77a3648017d3bc9125a
SHA11099473181e5a5363b008a02c0a73e49339255e0
SHA256cf0eb9d9c25ebff8688235d5ad0a35219e22e9abc723cb09ea051ea4c1b96743
SHA512453f350eabf8091b3c5317d7a9d0982b97071cc00a597840f38315f0b5ce1400dab4a78f5544e38a654e028df46cf63f2e9c3abf7f2eba2ac11b5fba5ad7ad26
-
Filesize
1KB
MD5b45d725d0ee93fdc3467b2e4cafc755c
SHA18e81bce146bc2ae4da757dce3d880b837a5381ee
SHA256c3b5a2705aef6bf785bf46915ee0fbc95370f98daf93d41f06537fcd99efcd16
SHA5124baaa00ae994459df0d62a764214da47e3d8a0eab61db6b42b229b781921c81f148fc8b1ae88eef7dd30717cc43b682c006706cdfba5c56f86202f4152afe887
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
7.2MB
MD58d4c8ff1e3c0929b81020073df656a41
SHA18b15ade3540f648999e13378c96ed5e42c8ac681
SHA2564f24c1311642003c237780de49f39f46ceb450411490335a8048c36b9198053c
SHA512a9d913b6cbd6badb836d1cc93342c72401b88a57afbda24f1862fd28153bf99276cd3517c441d2792ce332b8a50be2178986d0dc3f122834bd2be931f413dc8a
-
Filesize
5.2MB
MD5d2542eb94c97a1b5f211a5566b000246
SHA121e4be8ea8116bc51222e5194f004b4fb5d7eb1e
SHA256b01e966d3db7a545250fa27e23078aac7d95535185ce47b17d91ab7a6be95f87
SHA512496627b3576ea1f0aa1294135910172f301335f43f0737d08061c5b750b1b56c15e056c62af9706c4ff8ec2a1aa549541c883100433087611a89139247ef3bc5