Analysis
-
max time kernel
145s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/03/2024, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
ddf487d4b60315d25797c4c3574ae35a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ddf487d4b60315d25797c4c3574ae35a.exe
Resource
win10v2004-20240226-en
General
-
Target
ddf487d4b60315d25797c4c3574ae35a.exe
-
Size
585KB
-
MD5
ddf487d4b60315d25797c4c3574ae35a
-
SHA1
73f4bf705592ad1821849cebaecfcbace324d02f
-
SHA256
421c49f4b1e116f828bef3be408bc50d89ea4117bcd8f36f98d523c9ee9c9a5c
-
SHA512
e0fbbdb74e0e7408df9c7509f1e948c742c1a981aff0a345feb09b30e2b9e017e343c1efe2c93c58b476354381c9752984f33ecccd72a1911cc8c8f04aacaa48
-
SSDEEP
6144:282p4pFHfzMepymgWPnviP6Koa0nArn20l96tCF2eKNBDRlC8HQQDhy5OwbYBilZ:gp4pNfz3ymJnJ8QCFkxCaQTOl2GVqmA
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" ddf487d4b60315d25797c4c3574ae35a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk ddf487d4b60315d25797c4c3574ae35a.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk ddf487d4b60315d25797c4c3574ae35a.exe -
Executes dropped EXE 1 IoCs
pid Process 1200 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2192 ddf487d4b60315d25797c4c3574ae35a.exe 2192 ddf487d4b60315d25797c4c3574ae35a.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\M: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\Z: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\U: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\G: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\O: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\Q: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\T: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\E: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\L: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\R: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\Y: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\A: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\H: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\N: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\I: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\K: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\V: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\B: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\W: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\X: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\J: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\P: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\S: ddf487d4b60315d25797c4c3574ae35a.exe File opened (read-only) \??\S: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF ddf487d4b60315d25797c4c3574ae35a.exe File opened for modification C:\AUTORUN.INF ddf487d4b60315d25797c4c3574ae35a.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe ddf487d4b60315d25797c4c3574ae35a.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 1200 2192 ddf487d4b60315d25797c4c3574ae35a.exe 28 PID 2192 wrote to memory of 1200 2192 ddf487d4b60315d25797c4c3574ae35a.exe 28 PID 2192 wrote to memory of 1200 2192 ddf487d4b60315d25797c4c3574ae35a.exe 28 PID 2192 wrote to memory of 1200 2192 ddf487d4b60315d25797c4c3574ae35a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddf487d4b60315d25797c4c3574ae35a.exe"C:\Users\Admin\AppData\Local\Temp\ddf487d4b60315d25797c4c3574ae35a.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:1200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
586KB
MD511776b83ff220fc38a4c3a66acd925b2
SHA1b2cf51ea68df3c8f9f06fe9ea6db458823cb83f0
SHA25650223f33212049cf0ec83f73e42e39c9e3f2abc6e981326d10f263b211fff8ab
SHA512273d1de427b8b1bf20364dedc0d8e691e06285cd133b6659b6cd6b8ece2d24f37a7da9f70cd572f6cfb02ff909be640255ee48e0341a1322c2184c6929899fd6
-
Filesize
1KB
MD5ad36432fa6bdf1d3f7c41fb65d56fcb1
SHA1e2f36f357257e830bb8f0fcceede4b5ebb4f2e0d
SHA256af92ddd3fc6524f05a7b769301c258a5b70ee8464cf2c27c509d775f3d8d8050
SHA51222c272063823bea96914548a9a3df5afae9e58a2bf5d47e7bb4c3f80eb5bcaf61fda5a055a127c074756040843513d88b6f99cb0b8f6367f0fc313662b0742e8
-
Filesize
954B
MD57c9add111918a8e1d96ac78eba54668d
SHA199d7f589c2f438e91cfea32e71d2e93d2d925a14
SHA256a13aaa93b9ec5462439eb1d5472e4288a2a130041509203c1920845cefc40f55
SHA5127b325285531dd2d584e4ddbe6145ba4d020ca8ac2290ed0bb11a03c564ef4a1c970f6c53c8e11cbb70429b0fc6bec061f263e0ef51001ae4d940439dfed2291e
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
585KB
MD5ddf487d4b60315d25797c4c3574ae35a
SHA173f4bf705592ad1821849cebaecfcbace324d02f
SHA256421c49f4b1e116f828bef3be408bc50d89ea4117bcd8f36f98d523c9ee9c9a5c
SHA512e0fbbdb74e0e7408df9c7509f1e948c742c1a981aff0a345feb09b30e2b9e017e343c1efe2c93c58b476354381c9752984f33ecccd72a1911cc8c8f04aacaa48
-
Filesize
583KB
MD51ea62db8a5fa93c040e6f6fd93143943
SHA1e30386b84592b10c0e0656663bde3253c085a744
SHA2562c9cf0a30cbf561fa2117d13f6fd64aaf17a1f71f6ae973b3b50f2d1e19df42f
SHA512899dc900bc474691e7c1fd1dfe53c72b5fabe1c9e2150871460cc122c76b741c4b29eca738653c7a30be50cf83c5ff40bcfd3601e1b0381bab3d21e9247a29d6