Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 09:53
Static task
static1
Behavioral task
behavioral1
Sample
96dfcbc0a357630ce67db6083cf5bf3d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
96dfcbc0a357630ce67db6083cf5bf3d.exe
Resource
win10v2004-20231222-en
General
-
Target
96dfcbc0a357630ce67db6083cf5bf3d.exe
-
Size
6.3MB
-
MD5
96dfcbc0a357630ce67db6083cf5bf3d
-
SHA1
e5c9b296e5d09e340f394a7ad751b7a71368823d
-
SHA256
345efb6e2d178dc9c57c9959d005a1f709340cc1e00a80960483ffbca6c4954d
-
SHA512
ac3a99dd49796883eccae155bda30c28dbdc0b4c637b6cbf0a99c23cd68d9112a687b65b494305e3327038f852bc9e4de4a9025974f183e9522b12d007d7b016
-
SSDEEP
49152:NEs1qB8NIMI8Sfpwotkzaxc1OGz8iB8NIMI8Sfpwotkzaxc1OGz8j:NE2HIMzKpXOMGQvIMzKpXOMGQj
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 96dfcbc0a357630ce67db6083cf5bf3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 96dfcbc0a357630ce67db6083cf5bf3d.exe -
Executes dropped EXE 1 IoCs
pid Process 2728 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 1884 96dfcbc0a357630ce67db6083cf5bf3d.exe 1884 96dfcbc0a357630ce67db6083cf5bf3d.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\A: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\M: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\Q: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\V: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\W: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\J: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\S: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\I: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\R: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\Y: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\N: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\E: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\L: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\O: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\P: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\T: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\U: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\G: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\H: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\X: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\Z: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\B: 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened (read-only) \??\K: 96dfcbc0a357630ce67db6083cf5bf3d.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened for modification C:\AUTORUN.INF 96dfcbc0a357630ce67db6083cf5bf3d.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 96dfcbc0a357630ce67db6083cf5bf3d.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2728 1884 96dfcbc0a357630ce67db6083cf5bf3d.exe 28 PID 1884 wrote to memory of 2728 1884 96dfcbc0a357630ce67db6083cf5bf3d.exe 28 PID 1884 wrote to memory of 2728 1884 96dfcbc0a357630ce67db6083cf5bf3d.exe 28 PID 1884 wrote to memory of 2728 1884 96dfcbc0a357630ce67db6083cf5bf3d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\96dfcbc0a357630ce67db6083cf5bf3d.exe"C:\Users\Admin\AppData\Local\Temp\96dfcbc0a357630ce67db6083cf5bf3d.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.3MB
MD51576187693f306c8b6eb9fc34528df2c
SHA1a41de0140d258bb8119cc1c896f627d24f2da52a
SHA256efadb1d3f63b4705639e81f5cb404a82a8bc4aa842cdd3e183bc0577350765d0
SHA512039fb8d73dc2b876305d88f0288a7eebbc99e9e0fc48e01e11381f03cdaa649d65df49375428969259e6e70a7e501aaa113fc120e224364af4f2045339a71930
-
Filesize
1KB
MD57b3b6fded0f49c8cca12fec7a9eac905
SHA111ca152c021673d3e500775c0c57d774b176da69
SHA25617e73ca0ab415b7dcf214a7d9f85498a56527851aec297dbdb61ff8ed7b14a15
SHA512fac7a01b25c06fc37549818bb2b10109944c63c964b6f982dd391893106f251bca4b1e7e4b9e52b56f922d449c56ad520de615f29269e8b19b68d0a0da450949
-
Filesize
954B
MD53ccb9b73c5f35d3cbad3333ea8c6d42b
SHA195a59d4b6b1e00171d1d74a9cd7b6026cb383478
SHA2568b01c8b0c5394e6ec1f77e18aa9b526f425299b1deb529cf0393057b4d7da527
SHA512a94ae905cb7c1c8c898225a7c315f7c8b23ea7a10b514e1caef6effcf9e85cc0666d6313097b7992f3eb3b7825cdd2dc9d09c36b21b0a62595fda9f0f2f30b8f
-
Filesize
864KB
MD5032f241650743ccb6f60bbe3e79b0a4d
SHA102e92b2e0ef8239e330c7db7f1d628b45f06b648
SHA256afd7fd746c3aa9fb48d2b7ed99f7709a46a419576488ab6d31d1982996fb667e
SHA5121e72fb11a0dfe95c70cc2e3b2987f13254be710348d533a523df9aae37cf9a414ef5755fd8e8c0d19fcd0eaefbf0fe5065053de80e29f6f15ef0dd214d0dac13
-
Filesize
1.3MB
MD55b84271bd7b7e1b34d07e7db4b786c32
SHA1d1ed30993c4670f98e372dbbc607e242a2bce452
SHA25666a47c1e844273dbd5447cc85189ad1d1c865029eb50587c92e61dc1d38c25df
SHA512970bcc9c410cc7b0481536befabc2c2f92986cfcac59c7b9002edc31d673df96943f4419ff244af53d30c33edda6b14a7231d352b4349cc818bba9069754817d
-
Filesize
1.3MB
MD56338d7d20b6605173ffc2cbac7e3fe98
SHA1e0017a73621ebd7d12475e11d202a0fb8b200507
SHA2564d994d4ef5a05116a97d948ecc8673118a530f6744a11fe2fec8c5aa7b67fa38
SHA512363a144be57873336ea2f7fdb7ba1eeb4f8b6f1b727918b2e078db8e62be32366d912a4047a18d3550d2797685d6c4440ea64fdc9ab2c1fbbb244a2172434881
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
6.3MB
MD596dfcbc0a357630ce67db6083cf5bf3d
SHA1e5c9b296e5d09e340f394a7ad751b7a71368823d
SHA256345efb6e2d178dc9c57c9959d005a1f709340cc1e00a80960483ffbca6c4954d
SHA512ac3a99dd49796883eccae155bda30c28dbdc0b4c637b6cbf0a99c23cd68d9112a687b65b494305e3327038f852bc9e4de4a9025974f183e9522b12d007d7b016
-
Filesize
2.1MB
MD5e248db26f49ab5dd99c8547deec49239
SHA1598e32cdc2713bab0af90b11a727725434eedf0b
SHA256b036b5264474d878115c5c22f1d98d53cf7eda8eee76b6422f7db1c507ba6038
SHA51201f563019af211bb987023bb4ac196ae1e8903bdd422f5bd78d7d6819152c4ae650dcf3fdcab71e010bc24d9384dfd27e7170d67ac6e273ef311aa4842fb9dd8
-
Filesize
1.2MB
MD50d6d051daa88dd1921344650d4657de3
SHA112ec0622125a08f94702ac6717c42ebf7c9bf69f
SHA25682b020c61d1117452f66bec2c0c2e5ccb40e3f9777e4b15f0005ebf6b9dfed2f
SHA512ab4baacc1efd0fa40728a655d58454c834eefac726d67183d7a766134b8fc6a1aa33c050da13414cd8deb506d209ecc6a124ed43b560966f70934eabd417ac19