Analysis
-
max time kernel
146s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 00:15
Static task
static1
Behavioral task
behavioral1
Sample
c9ff8c75fcb257fc874d6f99e0b76255.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c9ff8c75fcb257fc874d6f99e0b76255.exe
Resource
win10v2004-20231215-en
General
-
Target
c9ff8c75fcb257fc874d6f99e0b76255.exe
-
Size
851KB
-
MD5
c9ff8c75fcb257fc874d6f99e0b76255
-
SHA1
0693569792ca8798936dc41a017fa1478303f4cf
-
SHA256
526eaa757a7decc4fc63c22a2e32a8300ffaba39fd9c892076bdde8d9478501d
-
SHA512
6161fb87ee09eaf180a7fdb3b9df9707421749214b343f880d9f8b2b6ed2ab7be3543c5acd28f82e8bcd68ec64286621e24783d7c3f7682e3aa640ae7b071c25
-
SSDEEP
12288:Pp4pNfz3ymJnJ8QCFkxCaQTOl2KY4vbAfxu/F96sO0:xEtl9mRda1C4kfxuX6sO0
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" c9ff8c75fcb257fc874d6f99e0b76255.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk c9ff8c75fcb257fc874d6f99e0b76255.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk c9ff8c75fcb257fc874d6f99e0b76255.exe -
Executes dropped EXE 1 IoCs
pid Process 2960 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2404 c9ff8c75fcb257fc874d6f99e0b76255.exe 2404 c9ff8c75fcb257fc874d6f99e0b76255.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\U: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\K: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\P: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\Q: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\T: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\N: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\Z: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\E: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\J: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\M: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\O: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\Y: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\G: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\H: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\L: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\S: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\V: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\B: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\R: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\W: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\A: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\I: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\X: c9ff8c75fcb257fc874d6f99e0b76255.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AUTORUN.INF c9ff8c75fcb257fc874d6f99e0b76255.exe File opened for modification F:\AUTORUN.INF HelpMe.exe File opened for modification F:\AUTORUN.INF c9ff8c75fcb257fc874d6f99e0b76255.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe c9ff8c75fcb257fc874d6f99e0b76255.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2960 2404 c9ff8c75fcb257fc874d6f99e0b76255.exe 28 PID 2404 wrote to memory of 2960 2404 c9ff8c75fcb257fc874d6f99e0b76255.exe 28 PID 2404 wrote to memory of 2960 2404 c9ff8c75fcb257fc874d6f99e0b76255.exe 28 PID 2404 wrote to memory of 2960 2404 c9ff8c75fcb257fc874d6f99e0b76255.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9ff8c75fcb257fc874d6f99e0b76255.exe"C:\Users\Admin\AppData\Local\Temp\c9ff8c75fcb257fc874d6f99e0b76255.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
852KB
MD5693a17037ab23904ecc7309c36e12eed
SHA16140cdcb5d2fe3fbc56392d473e9946be95fa168
SHA2560db1b24dd90d6078cb3680d5e857b354a716ac5142f91790434d93f461bb61a4
SHA512ab6e980a973fd912a7137046c88ee298102b7e8433fbce85eb9bb726de65b8248a4fea306464e81f29837430b2b50e1c669e6c20bee0110ded559bcf591b35ea
-
Filesize
950B
MD52a0c59647904ad28c312f6da2d1a2235
SHA11014b66b303338699e25c84327c81088e5c7fc57
SHA256b30cb49c7ca901b83f43bf73687e4587d25a70f2391ee71c05863ac2fcb0a6dc
SHA5126593847c0432cb3b2e3ece462b28567a0cf582633790340df3f9978e3f1df927434051298c36a12c4b0f7b18da1438fe70e00ff0470ce30851bac4232e5b6372
-
Filesize
1KB
MD5f4abef237cb99699191d5153febfc0be
SHA1b9b3957b6685cd2b8444fe2fb684829c20dbe992
SHA256c0a460d9fd5b7b1b68b41c695a84aff49e7acffbba46bd7877f81f1c051e78d8
SHA512c63279c0ce76acab41b4dd06eb8ba4d8087bba6044d109a38550e349c75b5b6c902e90a3bd822570a99bf113a4cae9943f5774cb147e6ba626ab777126cdc790
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
851KB
MD5c9ff8c75fcb257fc874d6f99e0b76255
SHA10693569792ca8798936dc41a017fa1478303f4cf
SHA256526eaa757a7decc4fc63c22a2e32a8300ffaba39fd9c892076bdde8d9478501d
SHA5126161fb87ee09eaf180a7fdb3b9df9707421749214b343f880d9f8b2b6ed2ab7be3543c5acd28f82e8bcd68ec64286621e24783d7c3f7682e3aa640ae7b071c25
-
Filesize
851KB
MD5af495d66478ced061ddb07fc05d6ed89
SHA1d9f4e80cb8713fbe508d16fd309cf02321aa4d7e
SHA25642d64779d58df3d6c444f6b3330a7308e9f035ba93cd21bd6c6acf2da3e80428
SHA512d666d0f3dc1b8ac44ae3da4204c1a6b794d4ecf1aae033b77d56f66570c69962e82505df58bc1345e3ce012a5d14cd4cf4cbc344b279baeb8ff6bb117396d457