Overview
overview
10Static
static
700FAEE82AB...AD.exe
windows7-x64
100B8E9BC319...20.exe
windows7-x64
100c9fa52ace...7a.exe
windows7-x64
715f7ea290d...8c.exe
windows7-x64
101DD70E8036...25.exe
windows7-x64
101E229029B2...DA.exe
windows7-x64
1021977fc851...61.exe
windows7-x64
1021e1bc4340...01.exe
windows7-x64
72272954a2c...5a.exe
windows7-x64
102C3542B5D9...85.exe
windows7-x64
73ac7f91e37...38.exe
windows7-x64
103c0fe521f6...16.exe
windows7-x64
1041c53e90f0...4a.exe
windows7-x64
10467c2b23b7...be.exe
windows7-x64
105b79b6a814...b0.exe
windows7-x64
10712affaa8b...1).exe
windows7-x64
172716d15ea...21.exe
windows7-x64
78b04af13b7...21.exe
windows7-x64
10Bit Paymer.exe
windows7-x64
10KeepCalm.exe
windows7-x64
1LockedIn.exe
windows7-x64
1Purge.exe
windows7-x64
1Scarab.exe
windows7-x64
10a631ad1b1a...4b.exe
windows7-x64
6a9053a3a52...bc.exe
windows7-x64
7b764629e1f...1c.exe
windows7-x64
10cf89f70633...5c.exe
windows7-x64
1e951e82867...50.exe
windows7-x64
1fa0c321e1a...d2.exe
windows7-x64
9fc184274ad...27.exe
windows7-x64
10Analysis
-
max time kernel
166s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-03-2024 15:13
Behavioral task
behavioral1
Sample
00FAEE82AB5B800CF6DBE97AFD39790B856AD1EC25DC7ED8F798ACA702BEE7AD.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0B8E9BC31964C9433BD5CC20E556CFD0590C3B17B0DB23CDC3AD0547683F3820.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
0c9fa52ace8019b43c91f4859ecddfde6705141b9283fef05c6c4c37a5c1777a.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
15f7ea290d832bc32ebf660690b42616264fc0be8969934c1f8d7e5a5d3cd18c.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
1E229029B2D3FF00EDDE061B1AAF470EE437FA8196D97FAD2C2C6C9EDE5B44DA.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
21e1bc4340221fbccee28d59333c20b20755e34e2f3391b90837172bd07fbf01.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
2272954a2c9f631b4f9c5f6d230287b0989ab3b512bb5f4a282214eadf42085a.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
2C3542B5D9AB4EED2DD88CD74A02236A944AFD76E8717F65DCD544912229CA85.exe
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win7-20240221-en
Behavioral task
behavioral13
Sample
41c53e90f0861b068eaa512edff28a586128f808b437122399347bcb3774914a.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
467c2b23b785df7b45758143387e9cc5a588718ae0640b3f01b1c19679b011be.exe
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
712affaa8b84e8fb7d4e71feb6c1074185bc43b5a2f265fbfb248f7ed40a5489 (1).exe
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
72716d15ea7d118b8c99dbcb15114188abe468718c876ac52b0779161ef7e821.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
Bit Paymer.exe
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
KeepCalm.exe
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
LockedIn.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Purge.exe
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
Scarab.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
a631ad1b1a59001a5f594880c6ae3337bda98f8ce3bb46cd7a9de0b35cd2bc4b.exe
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
a9053a3a52113698143a2b9801509c68d0d8b4b8208da453f0974547df0931bc.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe
Resource
win7-20240220-en
Behavioral task
behavioral27
Sample
cf89f70633865aa06123062a7dc51f8158905afb4b00f6f3597de3edfba97c5c.exe
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
e951e82867a4f3af5a34b714571e9acf99cca794c4ed1895c9025a642d5d4350.exe
Resource
win7-20231129-en
Behavioral task
behavioral29
Sample
fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
fc184274ad3908021e4c8ef28f35dc77447ed6457375d2a4e7b411955e042527.exe
Resource
win7-20240221-en
General
-
Target
1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe
-
Size
716KB
-
MD5
cc3f68e8a50b05aa77d88b6119583b9e
-
SHA1
71c7b93a8947265fe30e6928730504a5456ca788
-
SHA256
1dd70e803623d5311b71129976710b11a8942d206a5d8d86cdf8417255f15725
-
SHA512
e4fe7c8ec1d88c0bc81834de0a1212902849d7c9f6228e26fb8aaf3f046011f934d6de01becb339ab88169533ff8dc0d6fad7d6d7ff7e956e408242a21809e55
-
SSDEEP
12288:ZMMpXKb0hNGh1kG0HWnAsaHy41Dxm1zRRaMMMMM2MMMMMu:ZMMpXS0hN0V0HYah1I1zRRaMMMMM2MMd
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe -
Renames multiple (93) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral5/files/0x0037000000014b82-5.dat aspack_v212_v242 behavioral5/files/0x0006000000016cf4-38.dat aspack_v212_v242 -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\Q: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\Z: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\A: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\E: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\J: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\O: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\P: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\R: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\X: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\B: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\L: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\M: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\N: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\T: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\U: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\W: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\G: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\I: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\K: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\S: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\V: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\Y: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened for modification C:\AUTORUN.INF 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened for modification C:\Windows\SysWOW64\HelpMe.exe 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File created C:\Windows\SysWOW64\notepad.exe.exe 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\iexplore.exe.exe 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2284 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe"C:\Users\Admin\AppData\Local\Temp\1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
716KB
MD51aca88f20585a887fdf4ed3ec4874d50
SHA17c4f881c18a6e429532f879fb2528d6f0ec0788c
SHA256af2443c488709c1206dcd4c0dfc748fb9389ba4e7a28b01b8c31039a0ba4e7c9
SHA512a4fc594f2aa10be2c3f37661b39ee33fb7e82007aa0eb1ac8cedd828713ff76137acbcda854e874653f855654f0d41ff5095cca7a6880144310e6bf5c0d75057
-
Filesize
1.5MB
MD56ed3a73e9300470c24d19006f723000c
SHA1ee724e84b5bba75764d40e1e5e58b6c06a1b653b
SHA256d76a3fa170282ef655ef48e232b906130ed5f59185b332b809feba8b750c4752
SHA51283ec2ba53271ddf49bf8bdca108b56b3371cb1d6724531a017583c5e2a50703fec49c7a022ce63bb804b5ebd543a9c66b2e362a8d8ba692e1b6d727e87c2fabb
-
Filesize
1KB
MD511e39be67de9d634f9f9e2e56ea00cc4
SHA180fc26054a306f00bed0f587c068eed4e8c847c6
SHA256ec27aed7da3ea03da374926ab1264f311aac528099f5d23ffce72aa2be3b9c5b
SHA512eecd46cf4e2f233b358490c40594fc4c738a075a7605f75a04c92d963cd7418e9a8ce9648aa9a2d71e1cc96c080d57122665872b15737ee2a4cd48958933474d
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47