Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 01:30
Behavioral task
behavioral1
Sample
ca228795e828f8502ef63d1eb3e010cd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca228795e828f8502ef63d1eb3e010cd.exe
Resource
win10v2004-20240226-en
General
-
Target
ca228795e828f8502ef63d1eb3e010cd.exe
-
Size
2.2MB
-
MD5
ca228795e828f8502ef63d1eb3e010cd
-
SHA1
8e83715b82711016200693d7308052b78fd01ae5
-
SHA256
c85e9d8b5ad00bee5d4252f36f6596391df2ad2183fec93495086bedff7d971e
-
SHA512
db9a32ead99eff1daf0a8fd2da1c2cfd980bb7a2f9584072f5e532d98d141819fd11230cf864cdba7cef17a8244abb209b88280a72f4b90c95ac6984c2666a96
-
SSDEEP
6144:LiMmXRH6pXfSb0ceR/VFAHh1kgcs0HW1kyApHhP+gDzvR+/WOcPf7SLrffMWC:5MMpXKb0hNGh1kG0HWnALb+/KUgWC
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" ca228795e828f8502ef63d1eb3e010cd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x000b000000012256-2.dat aspack_v212_v242 behavioral1/files/0x0037000000016350-38.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-52.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk ca228795e828f8502ef63d1eb3e010cd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk ca228795e828f8502ef63d1eb3e010cd.exe -
Executes dropped EXE 1 IoCs
pid Process 2236 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2100 ca228795e828f8502ef63d1eb3e010cd.exe 2100 ca228795e828f8502ef63d1eb3e010cd.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\L: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\R: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\W: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\A: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\G: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\K: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\X: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\B: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\I: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\V: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\Y: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\E: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\M: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\P: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\Q: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\J: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\U: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\O: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\S: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\H: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\Z: ca228795e828f8502ef63d1eb3e010cd.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\T: ca228795e828f8502ef63d1eb3e010cd.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF HelpMe.exe File opened for modification F:\AUTORUN.INF ca228795e828f8502ef63d1eb3e010cd.exe File opened for modification C:\AUTORUN.INF ca228795e828f8502ef63d1eb3e010cd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe ca228795e828f8502ef63d1eb3e010cd.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2236 2100 ca228795e828f8502ef63d1eb3e010cd.exe 28 PID 2100 wrote to memory of 2236 2100 ca228795e828f8502ef63d1eb3e010cd.exe 28 PID 2100 wrote to memory of 2236 2100 ca228795e828f8502ef63d1eb3e010cd.exe 28 PID 2100 wrote to memory of 2236 2100 ca228795e828f8502ef63d1eb3e010cd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca228795e828f8502ef63d1eb3e010cd.exe"C:\Users\Admin\AppData\Local\Temp\ca228795e828f8502ef63d1eb3e010cd.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5724f645c62df9303a174a6ee5a6144ef
SHA1abd5c181aaf2b7dbcf44d48eb64fd503b9758de1
SHA2567fda5a57f6b9b23986fb2f40d19b13cfeaf0b575101f5b7268a336d3b7df47ce
SHA5124523855dfe9ba18cc678532f0096fab7fdc578ada90f012eeb3126301e618425bb09c9c7a05088d9f792b4ac2168831e29833535dd9b5863191bbe8618bf3948
-
Filesize
1KB
MD54d31fb3a1b4166b9fd0cc6aed84fcc2c
SHA140fab1f14920e920fd3a2e35953645c4b51ad5ef
SHA25615f9523af8291dde2b5769270879a1acb375e7610e5c09725ea5559a106c6f73
SHA512daf857979eaf92370cabc3e191586ede0ff3b45eb3f3549ada7538e5923da87286da585dd0c894f36ec0f1911d73d85c082d1c77dc1a4a9bfc24fe30de2da42a
-
Filesize
1KB
MD56a3d694a6872387361f04ffa7b3bfe50
SHA1dcc10989f7062ad5fc404b5ed211e26b44ecaa0f
SHA256be2eff777d1f266d80ba228a8a61ab99ee019846b679442388abb8f1c7f45952
SHA512663b81fd8a7aa36cfc6a0820c97e5a5561a27631f52b93b703b0f5714f91f02abffc6b0fe0e1d879a0e1dbb08a9d39fa40e44d5ac944c9a08f144241f4032e19
-
Filesize
954B
MD5616c34d878c7311d94317b0bc782826e
SHA10acb4de5a810d4910180148d73af9697d6b00b16
SHA2567fdbc5ca89cb8f39f82be92897791f02927e90174f128305e0142754fd1921c0
SHA512e7c534384d45215744fd9ab8adcb8c14324bf0a2257b15430cc61d90689c2c2cac7438f6b5698fb767b5bc3ee27bff4a09d0e8f403499fcfdf0d22c74598a858
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
2.2MB
MD5ca228795e828f8502ef63d1eb3e010cd
SHA18e83715b82711016200693d7308052b78fd01ae5
SHA256c85e9d8b5ad00bee5d4252f36f6596391df2ad2183fec93495086bedff7d971e
SHA512db9a32ead99eff1daf0a8fd2da1c2cfd980bb7a2f9584072f5e532d98d141819fd11230cf864cdba7cef17a8244abb209b88280a72f4b90c95ac6984c2666a96
-
Filesize
2.2MB
MD5df0f12e033829ca89bedcbce612651c6
SHA129978392a30e5ca702d2a4aeb50e82ad3850f56d
SHA256fbc226d92ee36bbabc0d70896809461eded64ab2fc58c6eab236c73b25fdf9e1
SHA512446424aab66ba0addd006099859d263f1f4631a4757a0f72b6e0ec1b0bdc2b65a9c3627803a646bf3506f4e6311be3e456a73fb77d3c9f7e9bf278cecf6c75d2