Overview
overview
10Static
static
10001a09a29d...ad.exe
windows7-x64
10001e9cb57f...ea.exe
windows7-x64
300ace607a4...64.exe
windows7-x64
70a20f03af5...77.exe
windows7-x64
10a6c62c139...b8.exe
windows7-x64
60a747a5f77...c2.exe
windows7-x64
0b02c55fbb...c0.exe
windows7-x64
70b716abe15...7f.exe
windows7-x64
100b997e8b0d...46.exe
windows7-x64
100bb2957b2b...1e.exe
windows7-x64
100bd9556e36...74.exe
windows7-x64
30c0c9a19db...c1.exe
windows7-x64
100c7da4e446...86.exe
windows7-x64
100cad47e2df...6a.exe
windows7-x64
100cb554caaf...b2.exe
windows7-x64
100cbb472b55...43.exe
windows7-x64
100d25bbbeb6...09.exe
windows7-x64
100d9ea4a12d...0e.exe
windows7-x64
10dbfd3479c...8d.exe
windows7-x64
60ddcce08b7...35.exe
windows7-x64
60df9bd640a...72.exe
windows7-x64
0e52434683...e4.exe
windows7-x64
100e767dfa6d...e4.exe
windows7-x64
100e82ed8dab...a4.exe
windows7-x64
10e98661ea6...29.exe
windows7-x64
10e9f24d9b1...d5.exe
windows7-x64
100ec44257a6...68.exe
windows7-x64
100f18f6547a...57.exe
windows7-x64
100f3d700c95...90.exe
windows7-x64
100f54e0f3c3...36.exe
windows7-x64
10f5ace8adb...72.exe
windows7-x64
60fc4a985ae...f8.exe
windows7-x64
3Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 09:29
Behavioral task
behavioral1
Sample
001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
001e9cb57f9e922d7b0d92ec43b8b5e376c5ab6e4ea827b84c76e13c994fbbea.exe
Resource
win7-20240708-en
Behavioral task
behavioral3
Sample
00ace607a44cbcd3e0bcdfb0a6b5f27c834fce66b95ee987c28eb651da9c2464.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
0a20f03af50d14404b349279b3dc20886b1bf91419ede3f1b0c7fbdda579ae77.exe
Resource
win7-20240704-en
Behavioral task
behavioral5
Sample
0a6c62c139aa9baf898add2a10fada3d49f78b3089507b84e613868242e169b8.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
0a747a5f771168c0c32e944da6d6d996f24284e4fb44eaea562b21266a9e3ac2.exe
Resource
win7-20240705-en
Behavioral task
behavioral7
Sample
0b02c55fbb40d7757b5808efe3fd1343f943bcefb92e0009689f4995e3eb26c0.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
0b716abe15b17a114c2f12fab954c861f82165bb0868f863cfb8dc634f76be7f.exe
Resource
win7-20240708-en
Behavioral task
behavioral9
Sample
0b997e8b0d0ff6cc4e6f1919c6c0f3080eaa0d08c8fccdf50f7648bf05cca446.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
0bb2957b2b8ed0a1c458da6edeaf5a48b2c1ecdd7d7ed33d00749ef1f5653b1e.exe
Resource
win7-20240708-en
Behavioral task
behavioral11
Sample
0bd9556e36c620bbedfafd2e76bb6703f069aa654e34008f2aef3b4a0ce6f874.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
0c0c9a19db1f89d94ddcd8af54fa631798e3ccc82743faae6d9818759f2dbcc1.exe
Resource
win7-20240705-en
Behavioral task
behavioral13
Sample
0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
0cad47e2dfd2538735f7affa42f9aad5d7bf453d88dbeb901e9b06fcae871e6a.exe
Resource
win7-20240704-en
Behavioral task
behavioral15
Sample
0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
0cbb472b555d4cab454948ba900675db48b120afaedf246a14d87d970b233a43.exe
Resource
win7-20240708-en
Behavioral task
behavioral17
Sample
0d25bbbeb68847cab4f3805bb8028ca901aa569abb038660c5febfe2ba24ec09.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
0d9ea4a12d29d79b00bd3d0788f531642832b799bdc3baaebd0ee213cee4720e.exe
Resource
win7-20240705-en
Behavioral task
behavioral19
Sample
0dbfd3479cfaf0856eb8a75f0ad4fccb5fd6bd17164bcfa6a5a386ed7378958d.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
0ddcce08b727ccbbae208459032f010956794a84b7f35e225b5bae927b0f6835.exe
Resource
win7-20240705-en
Behavioral task
behavioral21
Sample
0df9bd640ad5bb636095c524e54f9152bb84092889e720dcaa549e65dc3c1472.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
0e524346835f7c208667a18699df3faf34fcf8a3cceab8a7418d3f88e87211e4.exe
Resource
win7-20240705-en
Behavioral task
behavioral23
Sample
0e767dfa6d7887e832225433ed8866195df94607ccb474868b9abbbf20843ae4.exe
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
0e82ed8dabc9bb697d3e2f7ba1ee8d5235d3501796fbc1cd79ccffe7df11d9a4.exe
Resource
win7-20240704-en
Behavioral task
behavioral25
Sample
0e98661ea680708e9bb55f32131f743811108e826b91cae99d69a8fc1856d429.exe
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
0e9f24d9b122f16a0817890872ab88e91cfddeaf1bac8a1e41a724f5eadd9ad5.exe
Resource
win7-20240704-en
Behavioral task
behavioral27
Sample
0ec44257a6b4c2827476bae68cd30ecd9ccfb9395dac3671df6a1b65f20fb268.exe
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
0f18f6547a1c8e86963a9e9f9dd9e6e42bd506de21c034ec884c3b55a789ac57.exe
Resource
win7-20240704-en
Behavioral task
behavioral29
Sample
0f3d700c95b21e5437c0aedb3cacd787ce6701c49180d8d564e4574dffc42190.exe
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
0f54e0f3c3408647bf9844f9d97b64dbc62278091280b3d7bf1db5bdde3fc436.exe
Resource
win7-20240705-en
Behavioral task
behavioral31
Sample
0f5ace8adbaf1f05d0f5765166537ff4b77ea9f038cffbc08c16afd4cc869972.exe
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
0fc4a985aed460862a8f70dd982fadbd65ea0ad88fb58ced2d909f4264ab98f8.exe
Resource
win7-20240708-en
General
-
Target
001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe
-
Size
3.7MB
-
MD5
fcd18971f21cfd63598d5b3dec2b7a53
-
SHA1
8ad7f39746f236c606ebeaf1e085cadcaa7b35e5
-
SHA256
001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead
-
SHA512
d344fb8164907c772e40721ae9d7485a68deb34366c3161fe7f08bf552286a1b3f5cdb46092e7d8646d7eff3556f3196bcacc0f0716c3a6d062fd212a9351cf4
-
SSDEEP
24576:eEtl9mRda12sX7B9NRdpkhtIShJVVTyJNPtz:9Es1R3DCjVyB
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe -
Executes dropped EXE 1 IoCs
pid Process 1788 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 388 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe 388 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\I: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\M: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\O: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\S: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\A: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\P: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\G: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\H: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\W: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\J: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\N: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\T: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\Y: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\B: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\Q: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\U: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\V: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\X: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\Z: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\K: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\L: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\R: 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AUTORUN.INF 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File opened for modification F:\AUTORUN.INF HelpMe.exe File opened for modification F:\AUTORUN.INF 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 388 wrote to memory of 1788 388 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe 31 PID 388 wrote to memory of 1788 388 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe 31 PID 388 wrote to memory of 1788 388 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe 31 PID 388 wrote to memory of 1788 388 001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe"C:\Users\Admin\AppData\Local\Temp\001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:1788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD590e5aadce0db40f31931641615f221a2
SHA16a5155e01a8f454f31d639d146c812d07c6debf6
SHA25614a43dcdc7458cde75bb7816af851f93aeab484092e6f4ef5b986bb3c441003e
SHA512beb14e3b9150b80a15f367c6a963138b0e4dfc39df2f0e728f3a63422e8a70c6593c9272ef57e99085f29eade1d10990e186d8dcd5bd6af36b238d93cfca762c
-
Filesize
1KB
MD529bfcf63b660081f458baf7afd087afe
SHA165e3b2dd3e38aff620ec4304ba059edb2cff08e2
SHA25697f82b50781a7d46293d86df708dc9fc94c47d993face581da66fce9e7eb6394
SHA512a434071bb9bb65d9fba3ee8b88eae2827f4c30a2303eec65b2bf6639edfc3797d18af8ee967b4295aa0e92cead31ba7bf0cfdb667419d4fb9e156f91d87ec134
-
Filesize
954B
MD54a53107e3437d0fa14df0ab3495f57e6
SHA1bd268b2c4034106e1e7cd6a0bdf983da32faffcf
SHA256e534cec82df9346b6abf4cc82e0f693e0cecf796b439293260584f965d2f649c
SHA512cb11a72bca796ab3007f49020671340474fcfc4cc87e21f71ffe352ecc393b7ea805fd5b5fe477ca01769ed8fc1f8a97fe5d96ca8aecf7f81d6577b958d550ca
-
Filesize
3.7MB
MD5d9b5d25a0e3339f906683069cfb9eec4
SHA14b6c4f324e9e3a7f0dcc97021f7d3bde7e761d84
SHA256a8296a2a6ed82d19ac3d9f4de10632836eea449bdfd4d70dca243c0c6c80663d
SHA51295b4cda812e9f0a59d5d06fb02b38e26a1e7cbcca1359c11bc3c3916f11c9f0a175ebb199a5d0b525adf6ce6f92e8c2523835d310d220e66a452699ddaf73b3a
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
3.7MB
MD5fcd18971f21cfd63598d5b3dec2b7a53
SHA18ad7f39746f236c606ebeaf1e085cadcaa7b35e5
SHA256001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead
SHA512d344fb8164907c772e40721ae9d7485a68deb34366c3161fe7f08bf552286a1b3f5cdb46092e7d8646d7eff3556f3196bcacc0f0716c3a6d062fd212a9351cf4