Analysis
-
max time kernel
146s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 10:01
Behavioral task
behavioral1
Sample
9b61060eeb9a633b57f05d36dc09a208.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9b61060eeb9a633b57f05d36dc09a208.exe
Resource
win10v2004-20231215-en
General
-
Target
9b61060eeb9a633b57f05d36dc09a208.exe
-
Size
3.1MB
-
MD5
9b61060eeb9a633b57f05d36dc09a208
-
SHA1
902d25a92b344642a858d3d8d789037d0037395d
-
SHA256
621730bc11685858a3538cde9eef471c1a55265228554e307ff5cd4d147b62a6
-
SHA512
05dcc808290429963ad869f9651c8644be6df3b09a6a853275c8690ca8df7d03367752da73fbb59516f31fd0c457f36d242ca7853afe0442a295a9011d232065
-
SSDEEP
24576:ZMMpXS0hN0V0HZSGB2uJ2s4otqFCJrW9FqvSbqsHasgXhFHDAGtlRXZ+CP63n0Nj:Kwi0L0qkO+2NHm1C
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 9b61060eeb9a633b57f05d36dc09a208.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x000c000000012242-2.dat aspack_v212_v242 behavioral1/files/0x00080000000164ad-38.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-65.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 9b61060eeb9a633b57f05d36dc09a208.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 9b61060eeb9a633b57f05d36dc09a208.exe -
Executes dropped EXE 1 IoCs
pid Process 3016 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2968 9b61060eeb9a633b57f05d36dc09a208.exe 2968 9b61060eeb9a633b57f05d36dc09a208.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\X: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\A: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\M: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\U: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\K: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\T: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\W: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\V: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\B: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\G: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\H: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\J: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\O: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\R: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\S: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\Z: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\N: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\L: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\Q: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\Y: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\E: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\P: 9b61060eeb9a633b57f05d36dc09a208.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 9b61060eeb9a633b57f05d36dc09a208.exe File opened for modification C:\AUTORUN.INF 9b61060eeb9a633b57f05d36dc09a208.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 9b61060eeb9a633b57f05d36dc09a208.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 3016 2968 9b61060eeb9a633b57f05d36dc09a208.exe 28 PID 2968 wrote to memory of 3016 2968 9b61060eeb9a633b57f05d36dc09a208.exe 28 PID 2968 wrote to memory of 3016 2968 9b61060eeb9a633b57f05d36dc09a208.exe 28 PID 2968 wrote to memory of 3016 2968 9b61060eeb9a633b57f05d36dc09a208.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b61060eeb9a633b57f05d36dc09a208.exe"C:\Users\Admin\AppData\Local\Temp\9b61060eeb9a633b57f05d36dc09a208.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5b4c898fd483d62c2ad3d7841cd4d64c4
SHA1ebeb5ddc4d269b507e89212aac6d371c689ca938
SHA256a8bb7339454331cdcc27bb5cde4fdc290cf73d7996f0cd0800f4ee24d0171c3e
SHA512d35d6264346c9a61d4bd16bbe9ed6baf6f57bd358945e9a5a9da6693d2bfe60a3301164559900e94793c5afb7350ac8bbddecb52d6069ea09e81d1ddf82ba0de
-
Filesize
1KB
MD5e3f293503886e150d81e7ad83270a7a2
SHA1373b80ffcfe18c7104557222055bfa9b00253939
SHA256203b2fef735a746a07c828f72d741ed9c56d31efcea3392f9d2c9146fdfca72b
SHA512c64b29c4c6ca23d6767adfb02cf9acdacf7dbc011be4a307c393689925387bc7b48c4586f24dc1840c8a508d302f3d74fc693753c2c973733e3917078dc75802
-
Filesize
950B
MD5eadaed759705e96d834efbffdeae6ed7
SHA18f3ea241c8917d955862836773148139f880c23c
SHA256daa14a95ab786e297cb8a193c197e41a7f2809f005d0ec7a6a554bcfd202b4bc
SHA512d73211e27d7cee13d0e92a99308a8805d69d232f5d1adf3750f40a543684781ab36e69331746967b0b9ebc67cfa574a4202d9b9f4cc5624484140f0810bdce55
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
3.1MB
MD59b61060eeb9a633b57f05d36dc09a208
SHA1902d25a92b344642a858d3d8d789037d0037395d
SHA256621730bc11685858a3538cde9eef471c1a55265228554e307ff5cd4d147b62a6
SHA51205dcc808290429963ad869f9651c8644be6df3b09a6a853275c8690ca8df7d03367752da73fbb59516f31fd0c457f36d242ca7853afe0442a295a9011d232065
-
Filesize
2.9MB
MD5384ab83d8ed3c45c36d60d29741464eb
SHA12597285c83a7c9d358c939fc5a8ef06e5cc57583
SHA256eb53033b855dab1f328d6d188fda583a6e6c1e06527eb8cf755a253df2f4cf32
SHA5123bce8af44e0bdc91c275494750ed691ca5608c099057d7d79058c0d6f3cf391933f6dcdd00e726af91889d9a4ec94b10e8f9dda31fb6ee0a81289acd680c9015