Analysis
-
max time kernel
146s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 03:01
Static task
static1
Behavioral task
behavioral1
Sample
d50b38bf894e6e0bf265a49568659c0a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d50b38bf894e6e0bf265a49568659c0a.exe
Resource
win10v2004-20240226-en
General
-
Target
d50b38bf894e6e0bf265a49568659c0a.exe
-
Size
653KB
-
MD5
d50b38bf894e6e0bf265a49568659c0a
-
SHA1
3ac36e3a94a8cbe111baf1f5f24aa365aceedf3a
-
SHA256
d4815c94c248a5c4ba48a5c47ea541f87abb206ac64957c2c3f307b7f6941931
-
SHA512
966ada31fa2332c0676777117720bab698d81114d6b4f902238fb72e2a2b8929b952f0386813e7b4903263a22708d6863685318378995cdfc80f65b0a052c61b
-
SSDEEP
6144:k82p4pFHfzMepymgWPnviP6Koa0nArn20l96tCF2eKNBDRlC8HQQDhy5OwbYBilv:Cp4pNfz3ymJnJ8QCFkxCaQTOl2QU866G
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" d50b38bf894e6e0bf265a49568659c0a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk d50b38bf894e6e0bf265a49568659c0a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk d50b38bf894e6e0bf265a49568659c0a.exe -
Executes dropped EXE 1 IoCs
pid Process 2020 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2948 d50b38bf894e6e0bf265a49568659c0a.exe 2948 d50b38bf894e6e0bf265a49568659c0a.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\O: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\S: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\B: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\X: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\L: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\R: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\U: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\W: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\E: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\P: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\Y: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\G: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\J: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\K: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\H: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\Z: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\I: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\N: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\Q: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\T: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\V: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\A: d50b38bf894e6e0bf265a49568659c0a.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF d50b38bf894e6e0bf265a49568659c0a.exe File opened for modification C:\AUTORUN.INF d50b38bf894e6e0bf265a49568659c0a.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe d50b38bf894e6e0bf265a49568659c0a.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2020 2948 d50b38bf894e6e0bf265a49568659c0a.exe 28 PID 2948 wrote to memory of 2020 2948 d50b38bf894e6e0bf265a49568659c0a.exe 28 PID 2948 wrote to memory of 2020 2948 d50b38bf894e6e0bf265a49568659c0a.exe 28 PID 2948 wrote to memory of 2020 2948 d50b38bf894e6e0bf265a49568659c0a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d50b38bf894e6e0bf265a49568659c0a.exe"C:\Users\Admin\AppData\Local\Temp\d50b38bf894e6e0bf265a49568659c0a.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654KB
MD5d9424ba3eb83dc79c8dfc05fcc536b64
SHA13448e2203c71edd8bd140304ecc1d5641e5ff023
SHA25652fd5e94f18a0592e76fed6d8435dc65dc033ba34f0319a9ba4af8ac3ec0f19a
SHA5122cf868316fe87eb853be201738dbf0f0f3ff743d9a83a041424ce48be86c4063de1e7bedba3d8c5558d35a25e19278bf2a271b3f64e69efa922ce92d9a7f1fdb
-
Filesize
1KB
MD50a0885c8419d1b693d4d9f3f71b1b4f8
SHA1c3d25003559ce44fb9144cf0458256446531f138
SHA256b16bca93c12396b7700a75fcab5ceb42e966d2dce1a235ce17ccdd72cd27060c
SHA51211833cd97cd5be7b8ff372dd7d322a65773bc48210d8837795075568fb8c8cb8f07492bfa515f7b4b05cf23b558afbe4eb7726e3361db5f5ba64a44fc5e4cc21
-
Filesize
954B
MD5702bf81925eb84c4256f31546628d446
SHA1837db2410de93dd04662d42f60e87e11ed20c474
SHA2568198d552c515232f56d96105614a5d2553230ff4a3ce32ba762217e98fc18228
SHA5126169fe8bf4e62ba260f4fea81077ce2e9c217a77f2258dfef9c204a0cae1262c5d3f196a06de96ec9f07291505a569ddf0aa7bb88231a9f964127786472e7025
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
653KB
MD5d50b38bf894e6e0bf265a49568659c0a
SHA13ac36e3a94a8cbe111baf1f5f24aa365aceedf3a
SHA256d4815c94c248a5c4ba48a5c47ea541f87abb206ac64957c2c3f307b7f6941931
SHA512966ada31fa2332c0676777117720bab698d81114d6b4f902238fb72e2a2b8929b952f0386813e7b4903263a22708d6863685318378995cdfc80f65b0a052c61b
-
Filesize
652KB
MD5bdce3a3cfe5c247f68320897bc64f043
SHA19375561d298fcf477a665da982305219f1369606
SHA256b632013f4b59a832f0164220194a446fb278fb11e25f1b5874b246b17a3e1497
SHA51225c2daaf7bc2cd9e2e12233d6f169670ba4fcca8c9307136822d8042bf945dbfff484ab90ffe9c2c21d4272ee8bd9133d955810a1d675079e2fc863d4554efd2