Analysis
-
max time kernel
145s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 23:41
Behavioral task
behavioral1
Sample
a0a654ab1844abada2eebf3806925957.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0a654ab1844abada2eebf3806925957.exe
Resource
win10v2004-20240221-en
General
-
Target
a0a654ab1844abada2eebf3806925957.exe
-
Size
641KB
-
MD5
a0a654ab1844abada2eebf3806925957
-
SHA1
cbe14a85ddff321452551c2ca98f4290fe8be48a
-
SHA256
98a9cf926210ccb175aa798fc9b1d06674813809ae4456a0cde047752d7172be
-
SHA512
944d59ed5b6ab85cb3964385310a9accb17f479f0fdb4156badd3063ee6b4c2412c50d531d419137e9cc9b54aa53fac0c4af892e2acccdb6ac6d4663211fa5ca
-
SSDEEP
6144:ZiMmXRH6pXfSb0ceR/VFAHh1kgcs0HWHkyApOhP/SgljwRwdX/1H9fYavJiPx5S7:zMMpXKb0hNGh1kG0HWNAuCsltHlYzM
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" a0a654ab1844abada2eebf3806925957.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x000b000000012256-2.dat aspack_v212_v242 behavioral1/files/0x000b000000012256-8.dat aspack_v212_v242 behavioral1/files/0x0007000000014aa2-38.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-61.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk a0a654ab1844abada2eebf3806925957.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk a0a654ab1844abada2eebf3806925957.exe -
Executes dropped EXE 1 IoCs
pid Process 3064 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2588 a0a654ab1844abada2eebf3806925957.exe 2588 a0a654ab1844abada2eebf3806925957.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\A: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\W: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\P: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\Q: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\R: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\O: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\J: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\L: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\T: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\N: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\S: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\M: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\X: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\U: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\V: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\H: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\I: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\G: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\K: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\Y: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\B: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\E: a0a654ab1844abada2eebf3806925957.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF a0a654ab1844abada2eebf3806925957.exe File opened for modification C:\AUTORUN.INF a0a654ab1844abada2eebf3806925957.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe a0a654ab1844abada2eebf3806925957.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2588 wrote to memory of 3064 2588 a0a654ab1844abada2eebf3806925957.exe 28 PID 2588 wrote to memory of 3064 2588 a0a654ab1844abada2eebf3806925957.exe 28 PID 2588 wrote to memory of 3064 2588 a0a654ab1844abada2eebf3806925957.exe 28 PID 2588 wrote to memory of 3064 2588 a0a654ab1844abada2eebf3806925957.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0a654ab1844abada2eebf3806925957.exe"C:\Users\Admin\AppData\Local\Temp\a0a654ab1844abada2eebf3806925957.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
642KB
MD57c77f6aaadc9affa2477bbc57dd70fd3
SHA141a8888a211b5f5c5043ce698bf8d2794a28d183
SHA2560a0af93c1c49f274890b58e87d8dbf8e17f96ace76d87fcd7955ea4c006fbba1
SHA5123f5e754a909d9f4ef77286c9a805452c6446833c2f6b3638685429fb02161c26cde61f986e47e04e90d0b1e9160222b808e86db467920d7cb81e5e084eec3679
-
Filesize
1KB
MD5109962587151737eff7215b10e05ffb5
SHA1629b17886e3cae39f5ed2589b6f96159a7e91125
SHA2566028e1386f19f742d9f6dc59f5cb60995f07b94a1719a862f95205c5da091142
SHA512737b60a58a54f77e54e155e61fc7346dade893f88ae82f2649b590ff7fc38e97643e78abb3ae1412212f393855db7a24f3cabbeeb96fbbec98324396afcb637b
-
Filesize
954B
MD5926a9265516069c8e9203abec26f00a5
SHA116a2afa460f80d759b912a8bbbfb7573f2556f99
SHA256fbf861c93e8bc0a559fc9d5c7ac84a8dcf67301fb43ed723ab309c97dbb881bc
SHA5120ea8194998f280b5d5d5f8e8bc2b7c6b7353453701aa93b982b591dbfb1f47c2804790f3275d9cf43be0ce250a1ea5011d465989f4d379b2233a802fe0330654
-
Filesize
573KB
MD5c4b021753e23cd9ee06e650f9517c64d
SHA1fa817463817384d44ec30101a74b2617b4be1f97
SHA2564f2cd8be99ed90c4fd3dc4226587531a116ab5f99cb348d4d61861fffa59fac3
SHA5126d20a1fd6f76b3ea61010d2e9358e7b5c4d6bcbd83c7499d16569f43e17a99c1c72a500de024c3ebbb921114f43b6f22eb9c01bdf62600c038db46a30f9ca36f
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
641KB
MD5a0a654ab1844abada2eebf3806925957
SHA1cbe14a85ddff321452551c2ca98f4290fe8be48a
SHA25698a9cf926210ccb175aa798fc9b1d06674813809ae4456a0cde047752d7172be
SHA512944d59ed5b6ab85cb3964385310a9accb17f479f0fdb4156badd3063ee6b4c2412c50d531d419137e9cc9b54aa53fac0c4af892e2acccdb6ac6d4663211fa5ca
-
Filesize
639KB
MD546e8a53782340c0733013e671fcfca43
SHA1e182d34db0c37091de8193338e4e516d45fdba57
SHA2567ac0817b27975edf95cbd177f5f44f7e9c527dee75425faad8b9f1155777bbce
SHA512fd8e6aaa81f8ba909d313dbfd1d0f511ed96b532d3e9c7da8feb4fec7c76ccba62bc327aa5275ae478f8cf05833f6ad1d4cf7893bb516855727df6c9bcade5b3