Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 18:19
Behavioral task
behavioral1
Sample
c147a525419628354e2cf5f2fbac1861.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c147a525419628354e2cf5f2fbac1861.exe
Resource
win10v2004-20240226-en
General
-
Target
c147a525419628354e2cf5f2fbac1861.exe
-
Size
261KB
-
MD5
c147a525419628354e2cf5f2fbac1861
-
SHA1
f2c12841ed7f80e84a6f5f142bed277aace4509c
-
SHA256
d3b67deaa4094313d1ab97d5b28c1da8777825d4a11f579e9cd584e78f4bef5c
-
SHA512
459087ce684e8db27cc187a44de70884159de52ce3f84d27cbbd0115eafc9592f55a33fde627cf0ec281aefe37754a380f15d96b38fb604b83c4498f28966205
-
SSDEEP
6144:riMmXRH6pXfSb0ceR/VFAHh1kgcs0HW1kyAp0mgl88:ZMMpXKb0hNGh1kG0HWnAlU88
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" c147a525419628354e2cf5f2fbac1861.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x000a000000012252-2.dat aspack_v212_v242 behavioral1/files/0x00070000000153d9-42.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-59.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk c147a525419628354e2cf5f2fbac1861.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk c147a525419628354e2cf5f2fbac1861.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe -
Executes dropped EXE 1 IoCs
pid Process 2192 HelpMe.exe -
Loads dropped DLL 31 IoCs
pid Process 1888 c147a525419628354e2cf5f2fbac1861.exe 1888 c147a525419628354e2cf5f2fbac1861.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe 2192 HelpMe.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\J: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\T: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\Q: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\R: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\Y: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\G: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\K: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\Z: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\E: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\W: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\L: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\N: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\O: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\S: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\U: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\X: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\A: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\I: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\M: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\B: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\H: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\V: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\P: c147a525419628354e2cf5f2fbac1861.exe File opened (read-only) \??\J: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF c147a525419628354e2cf5f2fbac1861.exe File opened for modification C:\AUTORUN.INF c147a525419628354e2cf5f2fbac1861.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe c147a525419628354e2cf5f2fbac1861.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe File opened for modification C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe File created C:\Windows\SysWOW64\notepad.exe.exe HelpMe.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\iexplore.exe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2192 HelpMe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2192 1888 c147a525419628354e2cf5f2fbac1861.exe 28 PID 1888 wrote to memory of 2192 1888 c147a525419628354e2cf5f2fbac1861.exe 28 PID 1888 wrote to memory of 2192 1888 c147a525419628354e2cf5f2fbac1861.exe 28 PID 1888 wrote to memory of 2192 1888 c147a525419628354e2cf5f2fbac1861.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c147a525419628354e2cf5f2fbac1861.exe"C:\Users\Admin\AppData\Local\Temp\c147a525419628354e2cf5f2fbac1861.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD5fe0b94e5066c57aea803df0bf8f3adbd
SHA1fa74f980cd7f4b69c74b88df2b08f920223d8d7f
SHA256b8311f394ab4d29be5fd05bf972b830c8f779c75ae7372646b2db96a48dd6bf4
SHA512eb837a48a9042eb3f5b4e28bc93bf1cc2de1aad70e4d8ed112fb7fc449946fa8575dcb2701c9758e78a60b3f73ff0a53bded53dabd1f89c054f81338c2966556
-
Filesize
1KB
MD5e5969a907e1eb5b535ffabba8bfcc77d
SHA123ba4289c58e4936d1e0f0afcf1d1df735547659
SHA256f78d879159bbb1e2bfc807fe31726367dd97503dba177e7feb6ea9314ddeccc4
SHA51283d1800e202c9f3947763bfcc12a5f568d6cd77d7a63c6f919937c4c751e154959c9f9dce345b233dd9bbe60a214d63145a63eabe27a396d8aeb93e064efc711
-
Filesize
950B
MD5e4fead48cf0f88fd50d1ac0bee7e3ef3
SHA1ae8c3bb77c0a20733822894b3a873ba95122e288
SHA256d1874ac4f4793f8a581b0ce76aeda6135ae5a6d22637b5758b3ce2f60d5c2329
SHA512f2aed094c0c4da62544f05809a9f45584df7953c33bb047096db70a36a70df2c2ac4124fba53c95234f2851b09c34f7fc8ce92fb414f22aab3ff3c1ceb2524c3
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
261KB
MD5c147a525419628354e2cf5f2fbac1861
SHA1f2c12841ed7f80e84a6f5f142bed277aace4509c
SHA256d3b67deaa4094313d1ab97d5b28c1da8777825d4a11f579e9cd584e78f4bef5c
SHA512459087ce684e8db27cc187a44de70884159de52ce3f84d27cbbd0115eafc9592f55a33fde627cf0ec281aefe37754a380f15d96b38fb604b83c4498f28966205
-
Filesize
258KB
MD5d4e53ff995b62db58b4fe58d3e013928
SHA1c4fe01bc630ba321d9cee775ba70bc9945f15308
SHA256c5f101d2c71dbfa4b2c2a44fcc917bcce925734aa29789936d55149d5000206f
SHA512536f4313c4b2af5ce12a8230deaab4b30add154ef15effa614d8e42e14b02fb2a1cbb49f327f62d95d0be542c1e2b1e8cbcf8e498a7701e8cee0613ad87c6412