Analysis

  • max time kernel
    146s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/03/2024, 03:01

General

  • Target

    d50b38bf894e6e0bf265a49568659c0a.exe

  • Size

    653KB

  • MD5

    d50b38bf894e6e0bf265a49568659c0a

  • SHA1

    3ac36e3a94a8cbe111baf1f5f24aa365aceedf3a

  • SHA256

    d4815c94c248a5c4ba48a5c47ea541f87abb206ac64957c2c3f307b7f6941931

  • SHA512

    966ada31fa2332c0676777117720bab698d81114d6b4f902238fb72e2a2b8929b952f0386813e7b4903263a22708d6863685318378995cdfc80f65b0a052c61b

  • SSDEEP

    6144:k82p4pFHfzMepymgWPnviP6Koa0nArn20l96tCF2eKNBDRlC8HQQDhy5OwbYBilv:Cp4pNfz3ymJnJ8QCFkxCaQTOl2QU866G

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (91) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d50b38bf894e6e0bf265a49568659c0a.exe
    "C:\Users\Admin\AppData\Local\Temp\d50b38bf894e6e0bf265a49568659c0a.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      PID:2020

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1650401615-1019878084-3673944445-1000\desktop.ini.exe

          Filesize

          654KB

          MD5

          d9424ba3eb83dc79c8dfc05fcc536b64

          SHA1

          3448e2203c71edd8bd140304ecc1d5641e5ff023

          SHA256

          52fd5e94f18a0592e76fed6d8435dc65dc033ba34f0319a9ba4af8ac3ec0f19a

          SHA512

          2cf868316fe87eb853be201738dbf0f0f3ff743d9a83a041424ce48be86c4063de1e7bedba3d8c5558d35a25e19278bf2a271b3f64e69efa922ce92d9a7f1fdb

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

          Filesize

          1KB

          MD5

          0a0885c8419d1b693d4d9f3f71b1b4f8

          SHA1

          c3d25003559ce44fb9144cf0458256446531f138

          SHA256

          b16bca93c12396b7700a75fcab5ceb42e966d2dce1a235ce17ccdd72cd27060c

          SHA512

          11833cd97cd5be7b8ff372dd7d322a65773bc48210d8837795075568fb8c8cb8f07492bfa515f7b4b05cf23b558afbe4eb7726e3361db5f5ba64a44fc5e4cc21

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

          Filesize

          954B

          MD5

          702bf81925eb84c4256f31546628d446

          SHA1

          837db2410de93dd04662d42f60e87e11ed20c474

          SHA256

          8198d552c515232f56d96105614a5d2553230ff4a3ce32ba762217e98fc18228

          SHA512

          6169fe8bf4e62ba260f4fea81077ce2e9c217a77f2258dfef9c204a0cae1262c5d3f196a06de96ec9f07291505a569ddf0aa7bb88231a9f964127786472e7025

        • F:\AUTORUN.INF

          Filesize

          145B

          MD5

          ca13857b2fd3895a39f09d9dde3cca97

          SHA1

          8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

          SHA256

          cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

          SHA512

          55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

        • F:\AutoRun.exe

          Filesize

          653KB

          MD5

          d50b38bf894e6e0bf265a49568659c0a

          SHA1

          3ac36e3a94a8cbe111baf1f5f24aa365aceedf3a

          SHA256

          d4815c94c248a5c4ba48a5c47ea541f87abb206ac64957c2c3f307b7f6941931

          SHA512

          966ada31fa2332c0676777117720bab698d81114d6b4f902238fb72e2a2b8929b952f0386813e7b4903263a22708d6863685318378995cdfc80f65b0a052c61b

        • \Windows\SysWOW64\HelpMe.exe

          Filesize

          652KB

          MD5

          bdce3a3cfe5c247f68320897bc64f043

          SHA1

          9375561d298fcf477a665da982305219f1369606

          SHA256

          b632013f4b59a832f0164220194a446fb278fb11e25f1b5874b246b17a3e1497

          SHA512

          25c2daaf7bc2cd9e2e12233d6f169670ba4fcca8c9307136822d8042bf945dbfff484ab90ffe9c2c21d4272ee8bd9133d955810a1d675079e2fc863d4554efd2

        • memory/2020-10-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2948-0-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2948-236-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB