Overview
overview
10Static
static
10001a09a29d...ad.exe
windows7-x64
10001e9cb57f...ea.exe
windows7-x64
300ace607a4...64.exe
windows7-x64
70a20f03af5...77.exe
windows7-x64
10a6c62c139...b8.exe
windows7-x64
60a747a5f77...c2.exe
windows7-x64
0b02c55fbb...c0.exe
windows7-x64
70b716abe15...7f.exe
windows7-x64
100b997e8b0d...46.exe
windows7-x64
100bb2957b2b...1e.exe
windows7-x64
100bd9556e36...74.exe
windows7-x64
30c0c9a19db...c1.exe
windows7-x64
100c7da4e446...86.exe
windows7-x64
100cad47e2df...6a.exe
windows7-x64
100cb554caaf...b2.exe
windows7-x64
100cbb472b55...43.exe
windows7-x64
100d25bbbeb6...09.exe
windows7-x64
100d9ea4a12d...0e.exe
windows7-x64
10dbfd3479c...8d.exe
windows7-x64
60ddcce08b7...35.exe
windows7-x64
60df9bd640a...72.exe
windows7-x64
0e52434683...e4.exe
windows7-x64
100e767dfa6d...e4.exe
windows7-x64
100e82ed8dab...a4.exe
windows7-x64
10e98661ea6...29.exe
windows7-x64
10e9f24d9b1...d5.exe
windows7-x64
100ec44257a6...68.exe
windows7-x64
100f18f6547a...57.exe
windows7-x64
100f3d700c95...90.exe
windows7-x64
100f54e0f3c3...36.exe
windows7-x64
10f5ace8adb...72.exe
windows7-x64
60fc4a985ae...f8.exe
windows7-x64
3Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 09:29
Behavioral task
behavioral1
Sample
001a09a29deab5195eda46bad91e51b234655325b641e211ed8234e934956ead.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
001e9cb57f9e922d7b0d92ec43b8b5e376c5ab6e4ea827b84c76e13c994fbbea.exe
Resource
win7-20240708-en
Behavioral task
behavioral3
Sample
00ace607a44cbcd3e0bcdfb0a6b5f27c834fce66b95ee987c28eb651da9c2464.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
0a20f03af50d14404b349279b3dc20886b1bf91419ede3f1b0c7fbdda579ae77.exe
Resource
win7-20240704-en
Behavioral task
behavioral5
Sample
0a6c62c139aa9baf898add2a10fada3d49f78b3089507b84e613868242e169b8.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
0a747a5f771168c0c32e944da6d6d996f24284e4fb44eaea562b21266a9e3ac2.exe
Resource
win7-20240705-en
Behavioral task
behavioral7
Sample
0b02c55fbb40d7757b5808efe3fd1343f943bcefb92e0009689f4995e3eb26c0.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
0b716abe15b17a114c2f12fab954c861f82165bb0868f863cfb8dc634f76be7f.exe
Resource
win7-20240708-en
Behavioral task
behavioral9
Sample
0b997e8b0d0ff6cc4e6f1919c6c0f3080eaa0d08c8fccdf50f7648bf05cca446.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
0bb2957b2b8ed0a1c458da6edeaf5a48b2c1ecdd7d7ed33d00749ef1f5653b1e.exe
Resource
win7-20240708-en
Behavioral task
behavioral11
Sample
0bd9556e36c620bbedfafd2e76bb6703f069aa654e34008f2aef3b4a0ce6f874.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
0c0c9a19db1f89d94ddcd8af54fa631798e3ccc82743faae6d9818759f2dbcc1.exe
Resource
win7-20240705-en
Behavioral task
behavioral13
Sample
0c7da4e446a97f08bbf6c0abe987810047163150d70f0a282c2f7cea674d7286.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
0cad47e2dfd2538735f7affa42f9aad5d7bf453d88dbeb901e9b06fcae871e6a.exe
Resource
win7-20240704-en
Behavioral task
behavioral15
Sample
0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
0cbb472b555d4cab454948ba900675db48b120afaedf246a14d87d970b233a43.exe
Resource
win7-20240708-en
Behavioral task
behavioral17
Sample
0d25bbbeb68847cab4f3805bb8028ca901aa569abb038660c5febfe2ba24ec09.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
0d9ea4a12d29d79b00bd3d0788f531642832b799bdc3baaebd0ee213cee4720e.exe
Resource
win7-20240705-en
Behavioral task
behavioral19
Sample
0dbfd3479cfaf0856eb8a75f0ad4fccb5fd6bd17164bcfa6a5a386ed7378958d.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
0ddcce08b727ccbbae208459032f010956794a84b7f35e225b5bae927b0f6835.exe
Resource
win7-20240705-en
Behavioral task
behavioral21
Sample
0df9bd640ad5bb636095c524e54f9152bb84092889e720dcaa549e65dc3c1472.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
0e524346835f7c208667a18699df3faf34fcf8a3cceab8a7418d3f88e87211e4.exe
Resource
win7-20240705-en
Behavioral task
behavioral23
Sample
0e767dfa6d7887e832225433ed8866195df94607ccb474868b9abbbf20843ae4.exe
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
0e82ed8dabc9bb697d3e2f7ba1ee8d5235d3501796fbc1cd79ccffe7df11d9a4.exe
Resource
win7-20240704-en
Behavioral task
behavioral25
Sample
0e98661ea680708e9bb55f32131f743811108e826b91cae99d69a8fc1856d429.exe
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
0e9f24d9b122f16a0817890872ab88e91cfddeaf1bac8a1e41a724f5eadd9ad5.exe
Resource
win7-20240704-en
Behavioral task
behavioral27
Sample
0ec44257a6b4c2827476bae68cd30ecd9ccfb9395dac3671df6a1b65f20fb268.exe
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
0f18f6547a1c8e86963a9e9f9dd9e6e42bd506de21c034ec884c3b55a789ac57.exe
Resource
win7-20240704-en
Behavioral task
behavioral29
Sample
0f3d700c95b21e5437c0aedb3cacd787ce6701c49180d8d564e4574dffc42190.exe
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
0f54e0f3c3408647bf9844f9d97b64dbc62278091280b3d7bf1db5bdde3fc436.exe
Resource
win7-20240705-en
Behavioral task
behavioral31
Sample
0f5ace8adbaf1f05d0f5765166537ff4b77ea9f038cffbc08c16afd4cc869972.exe
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
0fc4a985aed460862a8f70dd982fadbd65ea0ad88fb58ced2d909f4264ab98f8.exe
Resource
win7-20240708-en
General
-
Target
0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe
-
Size
2.4MB
-
MD5
a949330481ec49db59a0406c4deebee4
-
SHA1
f2c8921b8acf3779f05679f51c279c120fb48919
-
SHA256
0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2
-
SHA512
13763fa20ad8fb76fc86168fe5c2fed13b76eb4831a251cb1c43431d03e43f6f14b89372d24137883717e15f3d14b8e7e7c651ae99364a35d6966a01a50bfb14
-
SSDEEP
12288:sp4pNfz3ymJnJ8QCFkxCaQTOlPes5Z76k/L/KB8NIpYJTCihq82WFpXKEVFA2MCL:eEtl9mRda12sX7hKB8NIyXbacAfU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe -
Executes dropped EXE 1 IoCs
pid Process 1280 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2388 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe 2388 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\I: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\K: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\T: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\N: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\P: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\Q: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\U: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\J: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\O: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\Z: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\G: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\Y: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\W: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\X: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\A: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\B: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\E: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\M: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\V: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\L: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\R: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\S: 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened (read-only) \??\A: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened for modification C:\AUTORUN.INF 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1280 2388 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe 30 PID 2388 wrote to memory of 1280 2388 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe 30 PID 2388 wrote to memory of 1280 2388 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe 30 PID 2388 wrote to memory of 1280 2388 0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe"C:\Users\Admin\AppData\Local\Temp\0cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD50b61a3e1c2f303c5e939f1830354b677
SHA1623b0796400c5726e4c58c381e7c9d1163bf12cb
SHA2566311e348f87fb9a6c64d36995ad4a884915b735510578ad7e71a8ffb5e7b6bc0
SHA512c5affc74452f6d0beb39ade2393c68b050c8763ad74d8df7478c74d21589b2a72910fec7a0918410e5b305aff804417994aa65f0a728bf154f54471e9f2adfea
-
Filesize
1KB
MD5df7304a1f684cefbac726b938d358dc6
SHA10759978c8f7eb5a2b42bfe707c6520c15e825a64
SHA256d0f0541a6120ca1da03be189efb650ea44dcec9b3bf8dd04a4fd5eeffce23876
SHA5129004e8c2bbd91680bb6b556dd7bf0e98d446de6c3575079e473123566accf55f18c546a7550909a997cf195cae40173cf7df81e9faf6ce8706fa68d5631f2625
-
Filesize
954B
MD5cb560f744addd5b75e82d0fdd9f13d5d
SHA1000998288089f6f46956ee66173e04eb566dd15c
SHA256a0a53b0fc5f1e0a844ecc32c41722419eed6bc6825fe4fcf012d2242dd1dfcd9
SHA5127ed4801945c617236a0e19ad5a36982ab9b9c65d404b252271d7322901a47b3b54ac515675cd58da5a6a4cd356d51a2851c9cdde4453db69a0ed815bf101df2b
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
2.4MB
MD5a949330481ec49db59a0406c4deebee4
SHA1f2c8921b8acf3779f05679f51c279c120fb48919
SHA2560cb554caafe5c2d40c1f882ca04710752194ebf300e0050bd7b7511312ae61b2
SHA51213763fa20ad8fb76fc86168fe5c2fed13b76eb4831a251cb1c43431d03e43f6f14b89372d24137883717e15f3d14b8e7e7c651ae99364a35d6966a01a50bfb14
-
Filesize
2.4MB
MD566dcb9b3c37209f6e6a91a7f1c09db6f
SHA1ed4e6522bac0f539a31ca31767ea5a304ae05c11
SHA25645a3ceeef1652cb94b4bbd60ed09d6ccacef264708f5d11c305e9cf0a2556d68
SHA5129f0358e2c9861ba95f9dddc698b179732f7b7fb90aa9b28938c69f4831571b2a302f0d48d62f685378f11f4da816a07243538cd748bd6d40bc92e58a1ae88bd7