Analysis
-
max time kernel
145s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 06:06
Static task
static1
Behavioral task
behavioral1
Sample
bddbba7949dfac3270ae1c85d0be15c6.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
bddbba7949dfac3270ae1c85d0be15c6.exe
Resource
win10v2004-20240226-en
General
-
Target
bddbba7949dfac3270ae1c85d0be15c6.exe
-
Size
2.7MB
-
MD5
bddbba7949dfac3270ae1c85d0be15c6
-
SHA1
97b91c0858fa69e1fb64a0522bad3424fc600bae
-
SHA256
585d58ca3bce2905bcd30b6c5fa389cb30c5d157c071b9abf92d581d4ae33df0
-
SHA512
72ef4498960f84f880c26630fe6dd102ebe91c927d86298b5ef5fdef9b0e71acdebe9de152c4a77edbbf74c4aedf90d7d4cffdd8e64a05261e99daed2ca6183e
-
SSDEEP
12288:Tp4pNfz3ymJnJ8QCFkxCaQTOlOb47MMpXOW:tEtl9mRda1rMMpXOW
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" bddbba7949dfac3270ae1c85d0be15c6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk bddbba7949dfac3270ae1c85d0be15c6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk bddbba7949dfac3270ae1c85d0be15c6.exe -
Executes dropped EXE 1 IoCs
pid Process 2224 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2204 bddbba7949dfac3270ae1c85d0be15c6.exe 2204 bddbba7949dfac3270ae1c85d0be15c6.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\S: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\I: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\U: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\A: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\G: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\T: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\W: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\N: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\O: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\P: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\R: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\X: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\Y: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\Z: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\B: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\H: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\M: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\V: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\E: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\J: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\K: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\Q: bddbba7949dfac3270ae1c85d0be15c6.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF bddbba7949dfac3270ae1c85d0be15c6.exe File opened for modification C:\AUTORUN.INF bddbba7949dfac3270ae1c85d0be15c6.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe bddbba7949dfac3270ae1c85d0be15c6.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2224 2204 bddbba7949dfac3270ae1c85d0be15c6.exe 28 PID 2204 wrote to memory of 2224 2204 bddbba7949dfac3270ae1c85d0be15c6.exe 28 PID 2204 wrote to memory of 2224 2204 bddbba7949dfac3270ae1c85d0be15c6.exe 28 PID 2204 wrote to memory of 2224 2204 bddbba7949dfac3270ae1c85d0be15c6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bddbba7949dfac3270ae1c85d0be15c6.exe"C:\Users\Admin\AppData\Local\Temp\bddbba7949dfac3270ae1c85d0be15c6.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD52e0276d5a13dd2c36f6feed9f081cfc1
SHA1fd265de11bbf5732b88b23d54b327345ec5b5899
SHA25622ea8ca2c9e243a071c5467a6ddaca334df0443795c9bbf44742f538ba1b9c33
SHA51228a005c8b96c0e73a46c813534a4402e399554e4f72ac3f51af53a2459d1da7f7f3ea451143e3dff69d617c96d127e4e607f060e17569fcfd1b74a3e6b61efc5
-
Filesize
1KB
MD5c1e5deb177d6ff34245dcee12e48ecd8
SHA192e208107333a56b30991b369fa0af58ac94531d
SHA25668ac6cd9b4790e89dd12bd9dee268d429da43a2bb1b6d89dff6cb6e96057c6c8
SHA512d441cd7475c1197cff1463894c12f3b1bc5301aa8abd29ac064bdf162b144f9b8646d987b054016cb60d819260ed7af6a15a7abfa426b31441aae4b4a1e9a5f2
-
Filesize
950B
MD53209709813ecde35a022226b36085f4c
SHA18690ae022d80e0b81d6b2001d7e91e141bc1351b
SHA256ca6c4af89c53b629a424e09f7952bca904f9a0b6f4de08905b94c07d822a950c
SHA5126b14957371b43a0f023f1ec598d0a4bff0ef7ab236047f3a124f60d54c4d99caeb4d52c5191a9b81c44c6f6691c040cc2ec57952d952d748abfea791f181acf2
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
2.7MB
MD5bddbba7949dfac3270ae1c85d0be15c6
SHA197b91c0858fa69e1fb64a0522bad3424fc600bae
SHA256585d58ca3bce2905bcd30b6c5fa389cb30c5d157c071b9abf92d581d4ae33df0
SHA51272ef4498960f84f880c26630fe6dd102ebe91c927d86298b5ef5fdef9b0e71acdebe9de152c4a77edbbf74c4aedf90d7d4cffdd8e64a05261e99daed2ca6183e
-
Filesize
2.6MB
MD52eb9dc18e38873108445dec3f118f2c1
SHA18a22eabcdf213bf60b1cb01dfd4d4869cdc8e6b1
SHA256fb410e41222bb2112364caa421a94cc835765c2c28bfb55d7437745f0974a8ba
SHA512180fba59cba032366882f5c9c8980db7f286f4cfd6aec13471b80a30f5e02c5f816e1a90adac497619de86a199daec8b5a34a7bb65f926e6e495c8dcefe402c3