Overview
overview
10Static
static
10001a09a29d...ad.exe
windows7-x64
10001e9cb57f...ea.exe
windows7-x64
300ace607a4...64.exe
windows7-x64
70a20f03af5...77.exe
windows7-x64
10a6c62c139...b8.exe
windows7-x64
60a747a5f77...c2.exe
windows7-x64
0b02c55fbb...c0.exe
windows7-x64
70b716abe15...7f.exe
windows7-x64
100b997e8b0d...46.exe
windows7-x64
100bb2957b2b...1e.exe
windows7-x64
100bd9556e36...74.exe
windows7-x64
30c0c9a19db...c1.exe
windows7-x64
100c7da4e446...86.exe
windows7-x64
100cad47e2df...6a.exe
windows7-x64
100cb554caaf...b2.exe
windows7-x64
100cbb472b55...43.exe
windows7-x64
100d25bbbeb6...09.exe
windows7-x64
100d9ea4a12d...0e.exe
windows7-x64
10dbfd3479c...8d.exe
windows7-x64
60ddcce08b7...35.exe
windows7-x64
60df9bd640a...72.exe
windows7-x64
0e52434683...e4.exe
windows7-x64
100e767dfa6d...e4.exe
windows7-x64
100e82ed8dab...a4.exe
windows7-x64
10e98661ea6...29.exe
windows7-x64
10e9f24d9b1...d5.exe
windows7-x64
100ec44257a6...68.exe
windows7-x64
100f18f6547a...57.exe
windows7-x64
100f3d700c95...90.exe
windows7-x64
100f54e0f3c3...36.exe
windows7-x64
10f5ace8adb...72.exe
windows7-x64
60fc4a985ae...f8.exe
windows7-x64
3Analysis
-
max time kernel
146s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 09:29
Behavioral task
behavioral1
Sample
001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
001e9cb57f9e922d7b0d92ec43b8b5e376c5ab6e4ea827b84c76e13c994fbbea.exe
Resource
win7-20240708-en
Behavioral task
behavioral3
Sample
00ace607a44cbcd3e0bcdfb0a6b5f27c834fce66b95ee987c28eb651da9c2464.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
0a20f03af50d14404b349279b3dc20886b1bf91419ede3f1b0c7fbdda579ae77.exe
Resource
win7-20240704-en
Behavioral task
behavioral5
Sample
0a6c62c139aa9baf898add2a10fada3d49f78b3089507b84e613868242e169b8.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
0a747a5f771168c0c32e944da6d6d996f24284e4fb44eaea562b21266a9e3ac2.exe
Resource
win7-20240705-en
Behavioral task
behavioral7
Sample
0b02c55fbb40d7757b5808efe3fd1343f943bcefb92e0009689f4995e3eb26c0.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
0b716abe15b17a114c2f12fab954c861f82165bb0868f863cfb8dc634f76be7f.exe
Resource
win7-20240708-en
Behavioral task
behavioral9
Sample
0b997e8b0d0ff6cc4e6f1919c6c0f3080eaa0d08c8fccdf50f7648bf05cca446.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
0bb2957b2b8ed0a1c458da6edeaf5a48b2c1ecdd7d7ed33d00749ef1f5653b1e.exe
Resource
win7-20240708-en
Behavioral task
behavioral11
Sample
0bd9556e36c620bbedfafd2e76bb6703f069aa654e34008f2aef3b4a0ce6f874.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
0c0c9a19db1f89d94ddcd8af54fa631798e3ccc82743faae6d9818759f2dbcc1.exe
Resource
win7-20240705-en
Behavioral task
behavioral13
Sample
0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
0cad47e2dfd2538735f7affa42f9aad5d7bf453d88dbeb901e9b06fcae871e6a.exe
Resource
win7-20240704-en
Behavioral task
behavioral15
Sample
0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
0cbb472b555d4cab454948ba900675db48b120afaedf246a14d87d970b233a43.exe
Resource
win7-20240708-en
Behavioral task
behavioral17
Sample
0d25bbbeb68847cab4f3805bb8028ca901aa569abb038660c5febfe2ba24ec09.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
0d9ea4a12d29d79b00bd3d0788f531642832b799bdc3baaebd0ee213cee4720e.exe
Resource
win7-20240705-en
Behavioral task
behavioral19
Sample
0dbfd3479cfaf0856eb8a75f0ad4fccb5fd6bd17164bcfa6a5a386ed7378958d.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
0ddcce08b727ccbbae208459032f010956794a84b7f35e225b5bae927b0f6835.exe
Resource
win7-20240705-en
Behavioral task
behavioral21
Sample
0df9bd640ad5bb636095c524e54f9152bb84092889e720dcaa549e65dc3c1472.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
0e524346835f7c208667a18699df3faf34fcf8a3cceab8a7418d3f88e87211e4.exe
Resource
win7-20240705-en
Behavioral task
behavioral23
Sample
0e767dfa6d7887e832225433ed8866195df94607ccb474868b9abbbf20843ae4.exe
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
0e82ed8dabc9bb697d3e2f7ba1ee8d5235d3501796fbc1cd79ccffe7df11d9a4.exe
Resource
win7-20240704-en
Behavioral task
behavioral25
Sample
0e98661ea680708e9bb55f32131f743811108e826b91cae99d69a8fc1856d429.exe
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
0e9f24d9b122f16a0817890872ab88e91cfddeaf1bac8a1e41a724f5eadd9ad5.exe
Resource
win7-20240704-en
Behavioral task
behavioral27
Sample
0ec44257a6b4c2827476bae68cd30ecd9ccfb9395dac3671df6a1b65f20fb268.exe
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
0f18f6547a1c8e86963a9e9f9dd9e6e42bd506de21c034ec884c3b55a789ac57.exe
Resource
win7-20240704-en
Behavioral task
behavioral29
Sample
0f3d700c95b21e5437c0aedb3cacd787ce6701c49180d8d564e4574dffc42190.exe
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
0f54e0f3c3408647bf9844f9d97b64dbc62278091280b3d7bf1db5bdde3fc436.exe
Resource
win7-20240705-en
Behavioral task
behavioral31
Sample
0f5ace8adbaf1f05d0f5765166537ff4b77ea9f038cffbc08c16afd4cc869972.exe
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
0fc4a985aed460862a8f70dd982fadbd65ea0ad88fb58ced2d909f4264ab98f8.exe
Resource
win7-20240708-en
General
-
Target
0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe
-
Size
3.1MB
-
MD5
76b466c9387684239681d8774bb5956b
-
SHA1
ed773e756932dc3af27e235b4bf7993781665a92
-
SHA256
0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286
-
SHA512
d6b83126b27532e56c39b7253668a4540baf29916105955937132c01fc11096b297f7abe545094823cac2c0e65fcf2282997e1bdb594d6fe99a342812d9bf42c
-
SSDEEP
12288:sp4pNfz3ymJnJ8QCFkxCaQTOlPes5Z76k/L/KB8NIpYJTCihq82WFpXKEVFA2MCe:eEtl9mRda12sX7hKB8NIyXbacAfF
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe -
Executes dropped EXE 1 IoCs
pid Process 2396 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2296 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe 2296 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\N: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\O: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\V: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\W: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\E: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\U: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\Z: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\G: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\J: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\K: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\Y: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\H: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\X: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\A: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\I: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\P: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\Q: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\B: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\L: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\S: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\T: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\M: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\R: 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened for modification C:\AUTORUN.INF 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2396 2296 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe 30 PID 2296 wrote to memory of 2396 2296 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe 30 PID 2296 wrote to memory of 2396 2296 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe 30 PID 2296 wrote to memory of 2396 2296 0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe"C:\Users\Admin\AppData\Local\Temp\0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD54b35dce9d4360796a0a5fc18cda1bdc5
SHA17d51d2b00cd138e028bbda99e4bb5c160475e3f7
SHA256cfbd9345858a9fb05d933a22cde95cbaf963643e11f1d4978032ac5a89c0fcb3
SHA5126b8ec8fe9cda9a67bd9a81e0ff59943c0f8faec68bb5d535198b5424b4603a73cfb4d109c8c3c957bf9731b12cc17d5416368b09dfcf0ade45f067fe92346d33
-
Filesize
1KB
MD51e7c3e1397dd279237eb6b1f03e1cf2a
SHA131b14da2e1530a1080e0e0105166147e3c690113
SHA256737c4db9856e291a15f19889bb84c558075131094d4ed9af9f5df869a2f106d1
SHA512aa90a10716d528f0e08cf15cab0d1c1cdfc0583a61c325160cb75c6fe5c34572e3875f8069bb8a84fcc21a51e58425148860e277237ecded95e080097f453e37
-
Filesize
954B
MD51ca94d03d18f136ae45f0581a0f9b157
SHA114a7b87d3075f20a6799cdfe1480589c40bd99d1
SHA2564ff4f857b8ed6f252b5a0132ecc75d396546a80e8ecc39a48c234121c4a3edca
SHA512d8b57f8ec7993f0c996f9b58db99d8a59213fa423db5ee4ba54c312b63003662f41a9db70003823309c4f1106cb31d7eb791925e00f5db65fbf1fe3bdd881564
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
3.1MB
MD576b466c9387684239681d8774bb5956b
SHA1ed773e756932dc3af27e235b4bf7993781665a92
SHA2560c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286
SHA512d6b83126b27532e56c39b7253668a4540baf29916105955937132c01fc11096b297f7abe545094823cac2c0e65fcf2282997e1bdb594d6fe99a342812d9bf42c
-
Filesize
3.1MB
MD51ca3547597375e94e2c17039e0d693db
SHA18b191ecac7de53622974d5f941b007adcd42a2b1
SHA256b8e8aa09788704de7a59f6a13f227b5731dcda91c4f8cd39ed4297745cbc3ea4
SHA51230f25783b1e0904fdce6e862832ba6f64fb3cf17bb183b2aaae04e5950482a7c278e8e32618a43c2264006d6f8b222cb44019cff3879c4828f2d76057f43ab7d