Analysis
-
max time kernel
145s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 03:28
Behavioral task
behavioral1
Sample
9620b7482d7daea279a6dfb366c1eb22.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9620b7482d7daea279a6dfb366c1eb22.exe
Resource
win10v2004-20231215-en
General
-
Target
9620b7482d7daea279a6dfb366c1eb22.exe
-
Size
432KB
-
MD5
9620b7482d7daea279a6dfb366c1eb22
-
SHA1
ff62752d12698cc515d39f430754345ceeb0866f
-
SHA256
1703308ea3e20f425f98440ad85cc737f8ed15fffdd870de6109967d1fba8c71
-
SHA512
58d754b2a6ca2bdd0ca3ea767173271ab0637d0e407ffd52c2ab1714cecd99575ecaa61dd43c9c8f06b36a5ff8ed991dcae722f7e611de97acc268ca3ea71d0c
-
SSDEEP
6144:LiMmXRH6pXfSb0ceR/VFAHh1kgcs0HW1kyApHhP+gDzvRAjZGrWmsu4F:5MMpXKb0hNGh1kG0HWnALbo
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 9620b7482d7daea279a6dfb366c1eb22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x000a000000013a1a-2.dat aspack_v212_v242 behavioral1/files/0x000a000000014534-42.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-59.dat aspack_v212_v242 behavioral1/files/0x000a000000013a1a-60.dat aspack_v212_v242 behavioral1/files/0x000a000000013a1a-250.dat aspack_v212_v242 behavioral1/files/0x000a000000013a1a-264.dat aspack_v212_v242 behavioral1/files/0x000a000000013a1a-276.dat aspack_v212_v242 behavioral1/files/0x000a000000013a1a-288.dat aspack_v212_v242 behavioral1/files/0x000a000000013a1a-341.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 9620b7482d7daea279a6dfb366c1eb22.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 9620b7482d7daea279a6dfb366c1eb22.exe -
Executes dropped EXE 1 IoCs
pid Process 1096 HelpMe.exe -
Loads dropped DLL 31 IoCs
pid Process 2948 9620b7482d7daea279a6dfb366c1eb22.exe 2948 9620b7482d7daea279a6dfb366c1eb22.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe 1096 HelpMe.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\O: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\K: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\L: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\R: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\U: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\X: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\A: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\V: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\J: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\W: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\Z: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\T: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\E: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\B: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\I: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\M: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\H: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\Y: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\N: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\P: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\Q: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\S: 9620b7482d7daea279a6dfb366c1eb22.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\G: 9620b7482d7daea279a6dfb366c1eb22.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AUTORUN.INF 9620b7482d7daea279a6dfb366c1eb22.exe File opened for modification F:\AUTORUN.INF HelpMe.exe File opened for modification F:\AUTORUN.INF 9620b7482d7daea279a6dfb366c1eb22.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe File created C:\Windows\SysWOW64\notepad.exe.exe HelpMe.exe File created C:\Windows\SysWOW64\HelpMe.exe 9620b7482d7daea279a6dfb366c1eb22.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\iexplore.exe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1096 HelpMe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 1096 2948 9620b7482d7daea279a6dfb366c1eb22.exe 28 PID 2948 wrote to memory of 1096 2948 9620b7482d7daea279a6dfb366c1eb22.exe 28 PID 2948 wrote to memory of 1096 2948 9620b7482d7daea279a6dfb366c1eb22.exe 28 PID 2948 wrote to memory of 1096 2948 9620b7482d7daea279a6dfb366c1eb22.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9620b7482d7daea279a6dfb366c1eb22.exe"C:\Users\Admin\AppData\Local\Temp\9620b7482d7daea279a6dfb366c1eb22.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD521435ba8df1a821cd895a9fa2fb8f7f5
SHA1979748828805984f255a8acac8b783d6b018e4ac
SHA25675f9907ce61302b54fe190903f81b1fb30c8283290d4915e40b31aa8c173db3d
SHA5127f8ed2dd40d609f6e54bc64dfabfee42e35be9795c0dac83e01dc7c3df139933b5dac6af5f5db9fca35374c76a8faadd992027152922d7d19419a3d5db3d5c5b
-
Filesize
1KB
MD5685fa83ea6d4fec5a749b94321b6fd9d
SHA1461005a637793362bd5709f6423719be8512a308
SHA2564476f98de5e3e46908682c7ae0db779124631a654ce7293203aab791f2c6bc6e
SHA512d89f32e94e64687a31a88b399d07a9e92598ccecd44ff6350cf833c12cda7b88dca359bd5361b5be0f7f7e0c6b43923a7dc80c8fed30ded712f822cd58ca563e
-
Filesize
950B
MD5c8e6803f368497fbfe5550cb304466c8
SHA1eed869783eb7d32309588f732c5988a645898899
SHA256bdc98e8330b80c53a9f0d20e029a8e40537c3c3bd21f57c8f398ba924d6cfead
SHA51220656b7717abc10feaa26979a787fa035afd278b78923fdbad7845c9be9fe67be26938732c8e73d4fb2c9d4e37b31d1e2b2bfbaac0101695596a8fa4086d1c90
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
425KB
MD500b23ffa3bc25d95fa242f701831b46a
SHA1e12fbac2fb3b28da0a9f1023cfd161527cd5d3cd
SHA25647edde1233915a9094a6d28240385d65421e58c287d746eb6c2092f430b99636
SHA512dee95e15f98961382a0aaa9529d67a00386e19ac265ba01b6d1d92bb956265b13b315c17b8026f61c9474aae1ae7471c65ac83292ce29bee1bb61037cb4b5915
-
Filesize
432KB
MD526cad3e27cc340f35739bcce86829751
SHA13114062cdfc324c79825dcb57ec1c6402b23f29f
SHA25618239a12185c830399268e0c988d48eb0132a9c77292a1a68d61872ab1e14f66
SHA5124a43d3e74fdd5027fd7fea0b6ec7607f0d0b3d5650edb2307e2d4ac55e1adfb0746b2833a84972332eb46bd031f4c125623d64b927027f55b30d3fce7721a24c
-
Filesize
372KB
MD55f388842dea059aa27f572420e4c98c5
SHA1299cc91b7a373152e688b5afbe54e58d67e41b55
SHA256afb6cb76d18a0491698bbbc3b8148babfdb24b668bb599fc058f277c5228c602
SHA512c0cae7cbc31ebb04f90d5a2f26e39ebc150495ffa9592e16280e88af5eb7d39c00d159f5c64fdd29beb68852f3b7b27ff1abe0ffe5a184961c678b9f94507277
-
Filesize
203KB
MD59be879f8a66edd3564624fac65cc94c5
SHA1c979ea8b37de30c63c8ed454d424760ede2dffdf
SHA2568dae3c6dcbcb98c2da5ad5113fe45ab5b519197329886adc71b34b415c6d3aa8
SHA512beb68ac0d84a5c1b25385f0d9b5475008e2e4d7ab0a8284754da3646ebeb468ef296f1664d8c24cb18798f33fcd787f0b2a5707eaa99b4684287d18841e3b484
-
Filesize
295KB
MD5b93480402a2f0509b73a0cc300fdc5cc
SHA1892aa07beb4ab25e31b2795b7c6851160c5627bc
SHA2569761bc7b49264c9be0b10f179829d805c17f9ba3f31f229a4883911b85e4c75b
SHA5129d5c5ed451bfee959f0859e3f2a26187e39b27654b64b17561ccadfc62aea47f3c400eca90315683cecf1d649a9831a03437b699b427e45aaa60bcf001616dd7
-
Filesize
79KB
MD546a0d2240676e7a5c92220aa5a1da7c5
SHA11326ec586f1ac5f0ac7dcd4d4bf3d3ad63cf8a54
SHA2562bc1db85b42cfb89e8bb114f4ddfe9e41f2c3f4b49b8d0b2cd34fa2080b8e8b4
SHA512f059aeae4d1bf1e70174020aab3ebf3a82f6bffb778e049a2ca760f267ea7a36d7126970c1ec0638e90b0806b158d0f85a8965b6a7a62485724e7c69d7671854
-
Filesize
140KB
MD5760f8566c14b9537807c9655ca5e5581
SHA11c46b84886a7e2dc50e376069229f4c75bff977d
SHA25661adf4ffd5b1589677d90c12b6522903746fc2ebfdcab35b95e12c12c6719c86
SHA512153882d2b2870ff1da159a9057a82559e64ddf82838e7168af2a467ca93a8348f5d91ca9923ee05ce80fb364babd51cad9cd62f743f6111b7976a0d8bca11ebc
-
Filesize
264KB
MD5f068850fb1f912d5b98dcc3256d94907
SHA10af54d0331114e1aeb4401ff7db7c13a0b74320d
SHA256338d9bef9b2efcef243c34c7186dd72ba3252827ebe3fe77199a5b124f3a2eaa
SHA5123b07c27ffb6a1be6153169f87c2ed3d7c21ee5ca156391aac8acc411e66954bcbf571e5bd3d8df3e928f7bb1e73b222e3c7afb001109ff36940e14be861e2669