Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
99df57dfbea20aabe363880940861e58.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
99df57dfbea20aabe363880940861e58.exe
Resource
win10v2004-20231215-en
General
-
Target
99df57dfbea20aabe363880940861e58.exe
-
Size
7.9MB
-
MD5
99df57dfbea20aabe363880940861e58
-
SHA1
43819c3da13e5441025d7b9e433dd58227db6074
-
SHA256
6f0ff6b48f67082fb42d6a48c5c5ce8d8ff7213560fea2e52b76f9f8efc102f2
-
SHA512
2f953d6cdbf65e60f900bc656bcf5deda45dc6da6c88e357d87500a2a8c75dcc9fa7a8841cb07764d1a660b1487cd3885b86b502ee3c54dc2a6916defbffaa03
-
SSDEEP
49152:iEs1CzRB8NIMI8Sfpwotkzaxc1OGz8hB8NIMI8Sfpwotkzaxc1OGz8:iE2tIMzKpXOMGQ+IMzKpXOMGQ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 99df57dfbea20aabe363880940861e58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 99df57dfbea20aabe363880940861e58.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 99df57dfbea20aabe363880940861e58.exe -
Executes dropped EXE 1 IoCs
pid Process 2664 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2236 99df57dfbea20aabe363880940861e58.exe 2236 99df57dfbea20aabe363880940861e58.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\E: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\W: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\Y: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\V: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\N: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\H: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\M: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\Q: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\R: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\U: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\A: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\J: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\L: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\S: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\G: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\O: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\I: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\T: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\X: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\K: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\Z: 99df57dfbea20aabe363880940861e58.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\B: 99df57dfbea20aabe363880940861e58.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF HelpMe.exe File opened for modification F:\AUTORUN.INF 99df57dfbea20aabe363880940861e58.exe File opened for modification C:\AUTORUN.INF 99df57dfbea20aabe363880940861e58.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 99df57dfbea20aabe363880940861e58.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2664 2236 99df57dfbea20aabe363880940861e58.exe 28 PID 2236 wrote to memory of 2664 2236 99df57dfbea20aabe363880940861e58.exe 28 PID 2236 wrote to memory of 2664 2236 99df57dfbea20aabe363880940861e58.exe 28 PID 2236 wrote to memory of 2664 2236 99df57dfbea20aabe363880940861e58.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\99df57dfbea20aabe363880940861e58.exe"C:\Users\Admin\AppData\Local\Temp\99df57dfbea20aabe363880940861e58.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.9MB
MD594358f90f85f490071fb5ed417972cb9
SHA1b564ad0bf43e3cc842f3b34b4ccf52fa0ac84825
SHA2562a3d9def80e934879596b899e8bcf178afbe221c432f5d2501e354a0854c03d6
SHA5128ecf8cfdb45fa066839baf2890945498282af2d6e98fb540650d7810e4c98b00be12e6bd3bee7e4df028454b439e1a10a9498f6bb64af1770084a27ed0f05ff1
-
Filesize
950B
MD5f68dc97001426589926b00ddc1a95ac1
SHA13d80ccdc17d02bcf9670147011fa3939eafb602a
SHA25646ddf900ff860f536cca1ccf5907fc312273bb21c9dffba7bb54522f0f0e4923
SHA512c3bed5092eb88522e897e3b10b0f91334e7afbd36110c2e4533f9e2208969a298a8ed4bc760d1647536038bc76d074670c02d72a85d582b593c268feefe319e8
-
Filesize
1KB
MD57bfd15b992a4e3ed733e894a83a9baad
SHA1b41b6a0902ad2f762d9812ceefd7d79f85c743a9
SHA2567ad0d73a8580370a4923d62aa6ce42bc6b9125190aa04a72b17e3e8925d709f7
SHA512235fe4b9f846a7230585c8665ee8da8c6aa4bd6cdc82ecad6d9604464ec1c8b1c0df61bcc3d910a144552e0678cc042c407797e2f470eb6c4a8cee2d21dccb65
-
Filesize
4.1MB
MD51c045287f39b25dfbe6b48be53f10c0f
SHA1232b839244b313cc4d683b1fc65af3f283c91334
SHA256e169fc9269e3954d8fee4cf2f14da649290000d8e9c711214b04e7189ffbf6f5
SHA5127c672752621ceb5ed972858b212575247a2c4805ac8eaa78bb99480ba931ee7f530cf94bc4e38d676310924c7afc9a5ab4275031487d732905a2676dd30c2f6c
-
Filesize
4.1MB
MD52c9ebd49a810b7506d35f70227632e1d
SHA107e7114e018e95245e428dc4a910ac4295287ddb
SHA256ee113f3d8559900019eeaa15408c8d43c0f5dad08fedc63f53e499109fe99eaf
SHA512025281c5a2303f4bbcb083e6de50200f5feaf79ac1dffd7d2182c0e84f0936e4441e0824eb98817126e8a78359b021e2dc84a068a4d6470c6e9354299223e66b
-
Filesize
5.2MB
MD534e6b73d7d38cd81ac8f416234343f30
SHA1adc06987b41e05358ebe673f38d8045384891539
SHA256aa256e85dd6141935958589d78907e4fd2c857b8f9cdfcc1498f018e28cfe317
SHA512d6d0ceb4d941268e7614e4121162b1547f3d23c3040021ea2c9877d3050408741672d095229d38ff7330b5318e8ff4c6eb177c810ccf882cf020ed7698ad38a9
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
7.9MB
MD599df57dfbea20aabe363880940861e58
SHA143819c3da13e5441025d7b9e433dd58227db6074
SHA2566f0ff6b48f67082fb42d6a48c5c5ce8d8ff7213560fea2e52b76f9f8efc102f2
SHA5122f953d6cdbf65e60f900bc656bcf5deda45dc6da6c88e357d87500a2a8c75dcc9fa7a8841cb07764d1a660b1487cd3885b86b502ee3c54dc2a6916defbffaa03
-
Filesize
7.9MB
MD54280cb7ca5347e32f1b678122bf377a8
SHA18f794bd62a2c4656499f84bd8267e15c7cc71100
SHA2560aac516e187ca61f42e3327b12e9615719b89ee37af202737b741e24e05ca7ec
SHA5124654362bab0998a5d5b29bcba351b53c526a2e20638143ecb4f770187ce0147a88e492979571dc13249d131bcd781721a79e64d1911fdc4df803c799e396ea6c
-
Filesize
7.2MB
MD5119e709e236b290f4782fd4bf5e42ad5
SHA1a3e768aacb7dbf874755ff394981eed01b7a586c
SHA256b6251f7d09d2049d6d0bd545358812fb44c5258aedf723941578a67eefe99109
SHA512d5db65243260fc8bb7436e1d1dd306b1279449d0c843ea4134eefc2995209a4488573b0c49af5cf565e9c952fe3dd3bada8fa7a06fd81f56562731dc11d3f68a