Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 18:20
Static task
static1
Behavioral task
behavioral1
Sample
bc7c1e69bf363517d13a1ebd20a4ea7a.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
bc7c1e69bf363517d13a1ebd20a4ea7a.exe
Resource
win10v2004-20240226-en
General
-
Target
bc7c1e69bf363517d13a1ebd20a4ea7a.exe
-
Size
3.3MB
-
MD5
bc7c1e69bf363517d13a1ebd20a4ea7a
-
SHA1
f19254a24dc5a0ae100e716ff501b55eaad8e2e7
-
SHA256
8dede2a22514223dbcb639a6a0b6a96e747728cdaf447bdf112166da0156ae96
-
SHA512
7871c61f7137720ea1be192e3cc1c68ee3f7d15e7358cdc5c5ec8e5d9e609a5a2b21de35c77741e99666618301c28c25e72045f8a603fd1ceed50ad45a1cc8c3
-
SSDEEP
12288:gp4pNfz3ymJnJ8QCFkxCaQTOl2GVqCw+VsLkjrVlQB9FbDTF53nlNFRpO50w9XCC:aEtl9mRda1VICwE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" bc7c1e69bf363517d13a1ebd20a4ea7a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk bc7c1e69bf363517d13a1ebd20a4ea7a.exe -
Executes dropped EXE 1 IoCs
pid Process 2032 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2028 bc7c1e69bf363517d13a1ebd20a4ea7a.exe 2028 bc7c1e69bf363517d13a1ebd20a4ea7a.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\Q: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\X: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\Y: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\K: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\T: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\W: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\N: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\P: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\S: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\V: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\H: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\L: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\M: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\R: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\J: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\U: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\Z: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\A: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\E: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\G: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\B: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\O: bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened for modification C:\AUTORUN.INF bc7c1e69bf363517d13a1ebd20a4ea7a.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe bc7c1e69bf363517d13a1ebd20a4ea7a.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2032 2028 bc7c1e69bf363517d13a1ebd20a4ea7a.exe 28 PID 2028 wrote to memory of 2032 2028 bc7c1e69bf363517d13a1ebd20a4ea7a.exe 28 PID 2028 wrote to memory of 2032 2028 bc7c1e69bf363517d13a1ebd20a4ea7a.exe 28 PID 2028 wrote to memory of 2032 2028 bc7c1e69bf363517d13a1ebd20a4ea7a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc7c1e69bf363517d13a1ebd20a4ea7a.exe"C:\Users\Admin\AppData\Local\Temp\bc7c1e69bf363517d13a1ebd20a4ea7a.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD5ffd757631b49031c825ed0be86b437a7
SHA145596aae34fb98f5bc4dfcda888fc13a9a32c1db
SHA25656d8f40039eef00760db806feb9c483a44ac65cadf37a9b76b8cb8f49c29190d
SHA512035294f1ca271abec075de1f74529ffb4d3994f6bde3f7efa2ee0b4fc8b5a951006a30257e34c6c2df51bc6c905c8b355efede535886462f3e140e2ae7f0fcb2
-
Filesize
1KB
MD5a69718bddf5b513a8de8757d55c480fd
SHA115522f36065974e0beadff19a86b9482e151c1fc
SHA2563138394cef042962da0280db4bfacc64d80fea5932dbf60a5c794b335dd5caa5
SHA512ef011a72b9bbe0beaf73e0ee005b74d2b0b06b3f01a6d115f28b1992dd12927d945d44d632296a533c8935236c98841d48c6dd9a241fdbd6825c0232cd7d500b
-
Filesize
950B
MD529552f2541501af261e7c5209c243881
SHA1bfb52435d28cf4579049059f57a5b3178db3a202
SHA256a0da6e9779d49bbed170ac92600976cfedaabe922f8bcc1d43a7adc1ce04a5f8
SHA51237207bd5152cdf5052178c311c6119815603fd6500754aef918fd7005e84b0528942d837289dfaa8a451d763e30c87c2a87c45d76ce77de2c75a33cd161a2616
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
3.3MB
MD5bc7c1e69bf363517d13a1ebd20a4ea7a
SHA1f19254a24dc5a0ae100e716ff501b55eaad8e2e7
SHA2568dede2a22514223dbcb639a6a0b6a96e747728cdaf447bdf112166da0156ae96
SHA5127871c61f7137720ea1be192e3cc1c68ee3f7d15e7358cdc5c5ec8e5d9e609a5a2b21de35c77741e99666618301c28c25e72045f8a603fd1ceed50ad45a1cc8c3
-
Filesize
3.3MB
MD596cbb1066324b041d7925b9a56ffea45
SHA1b5ed5421d5a4808f9711a8cfc1e5459ea4e7adde
SHA256f5f1c2f479c9cfb4d8a1c2962638e076feff5fcf74e87080c245b7bc82c34f7c
SHA5128d3de83067d7d69218fe1660038d78547acc7f19525b35f3551d4e21df462aa928b7b2def2fb5f796817ca0d6bab3d1caae69d1ba4bceebc168c9ba42a5fc959