Analysis
-
max time kernel
146s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 10:59
Behavioral task
behavioral1
Sample
993f65ea49b033f781ec1c071f4e34df.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
993f65ea49b033f781ec1c071f4e34df.exe
Resource
win10v2004-20231215-en
General
-
Target
993f65ea49b033f781ec1c071f4e34df.exe
-
Size
2.2MB
-
MD5
993f65ea49b033f781ec1c071f4e34df
-
SHA1
0ef33b1149c38b975d770ccf55a5984af3823578
-
SHA256
8e5baf96f62fab27ddf02ded10ae29cca1946defcca9245e091b81359ebab83e
-
SHA512
92d161be2a37b68aea93fe01ad534948dba6c5b0ed83db4aebbfc116da98bf66c723d78d6ad7eb25d33c4218f945913711860ab9c3ba5364c40b324cdfe678c8
-
SSDEEP
24576:ZMMpXS0hN0V0HZHMMpXS0hN0V0HZCSGB2uJ2s4otqFCJrW9FqvSbqsHasgXhFHDT:Kwi0L0q+wi0L0qRyxd
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 993f65ea49b033f781ec1c071f4e34df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x000c0000000122db-2.dat aspack_v212_v242 behavioral1/files/0x00310000000146d4-38.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-57.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 993f65ea49b033f781ec1c071f4e34df.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 993f65ea49b033f781ec1c071f4e34df.exe -
Executes dropped EXE 1 IoCs
pid Process 2192 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 828 993f65ea49b033f781ec1c071f4e34df.exe 828 993f65ea49b033f781ec1c071f4e34df.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\L: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\X: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\B: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\I: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\K: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\N: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\Q: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\Z: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\P: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\R: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\M: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\T: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\V: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\A: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\E: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\S: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\J: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\W: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\H: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\O: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\U: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\Y: 993f65ea49b033f781ec1c071f4e34df.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 993f65ea49b033f781ec1c071f4e34df.exe File opened for modification C:\AUTORUN.INF 993f65ea49b033f781ec1c071f4e34df.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe File created C:\Windows\SysWOW64\HelpMe.exe 993f65ea49b033f781ec1c071f4e34df.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 828 wrote to memory of 2192 828 993f65ea49b033f781ec1c071f4e34df.exe 28 PID 828 wrote to memory of 2192 828 993f65ea49b033f781ec1c071f4e34df.exe 28 PID 828 wrote to memory of 2192 828 993f65ea49b033f781ec1c071f4e34df.exe 28 PID 828 wrote to memory of 2192 828 993f65ea49b033f781ec1c071f4e34df.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\993f65ea49b033f781ec1c071f4e34df.exe"C:\Users\Admin\AppData\Local\Temp\993f65ea49b033f781ec1c071f4e34df.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD55d4eb72226621d89ab558326c20d0019
SHA114997b4b03b41115a2e993d75e59937a5c7ad7b0
SHA256970d02a56a544c6920d5af82fd45b23b11d6df31ee2e3d28e04bc51c64c01c56
SHA512d7776e0b7b432b41a1513b530350561c7824aab40f7ccd9f880a0267602b565c5e712a913c6c7011c41b211b78245af44a380fd5f97395ff0fc67bdc4a69d827
-
Filesize
954B
MD58fce8fc7081cd076a4da3a925c528ffa
SHA131278f36250decdded108da62e55aca4c1953003
SHA2566a5f02a3c0da7bead1f5feddc60b27c48aac1af056589b4d558a1555941db2db
SHA512d0cad156e008e8ce2c6ffbcbb4c7c7626d81745d3cb8fb5ff48c0d491d67f49c847ca5640aa7f68d9e1100ebb03fd8ad1994cf4d5a18bfa6647217bb89d2fb42
-
Filesize
1KB
MD550830cea2c38fbd509cef15c93b0671c
SHA15fd4f2da8618220a35f4dcba5677bffb0b081893
SHA25620c85a0c5debdcfd019c42c1e4d935e6020484e3025f40e44c929e86ff83a385
SHA512e31aa994f2d54032fb0287bdb3d63bf4575bd97ab911a93ad72d7357c1e59be3c8e1f6ee36242a9062b3f6e83bf7cca8f2c50268d3c6f6b27656a4a84ef36afe
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
2.2MB
MD5993f65ea49b033f781ec1c071f4e34df
SHA10ef33b1149c38b975d770ccf55a5984af3823578
SHA2568e5baf96f62fab27ddf02ded10ae29cca1946defcca9245e091b81359ebab83e
SHA51292d161be2a37b68aea93fe01ad534948dba6c5b0ed83db4aebbfc116da98bf66c723d78d6ad7eb25d33c4218f945913711860ab9c3ba5364c40b324cdfe678c8
-
Filesize
2.2MB
MD56df927c145d46bcd2a9909abaa6470aa
SHA1a5f7f874a9461cd11eaa4e3a79a411c181be4acd
SHA2569f016a4b9a71e4030b3d890e30a0614c71cb1b5839a9c94fb3a594b4cbf8ddca
SHA512f45a78da843d51113918aa1e014baaaaa3b51b21dc86b169afa5a77249099315873dc29f98bdc7893af8f1394cd290ddadeb9cfeefbe897d01f0a97614c0e697