Analysis

  • max time kernel
    145s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13-07-2024 09:29

General

  • Target

    1db9ec5678e417eef3d6e080a031c8adfc1fc85127317b952bc33733d93841e0.exe

  • Size

    2.4MB

  • MD5

    84e2bf751724e3b0acc70b67ee1b8e96

  • SHA1

    2e1c9638b022901d67c69ef17c6acd12fd6e493f

  • SHA256

    1db9ec5678e417eef3d6e080a031c8adfc1fc85127317b952bc33733d93841e0

  • SHA512

    56a229897c812cddd7f0b1847cf439f910350aa11138f7165b7c7f697095dfe5ee64e875e4262706c20e7bdbb59a94512386965e83ac9327b0b6967377882aef

  • SSDEEP

    12288:sp4pNfz3ymJnJ8QCFkxCaQTOlPes5Z76k/L/KB8NIpYJTCihq82WFpXKEVFA2MCp:eEtl9mRda12sX7hKB8NIyXbacAfe

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (91) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1db9ec5678e417eef3d6e080a031c8adfc1fc85127317b952bc33733d93841e0.exe
    "C:\Users\Admin\AppData\Local\Temp\1db9ec5678e417eef3d6e080a031c8adfc1fc85127317b952bc33733d93841e0.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      PID:1940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.exe

    Filesize

    2.4MB

    MD5

    62360821c3181e122ede63c9b70479fd

    SHA1

    34168ccbf2a59535dfda4152bce8052aa4866757

    SHA256

    6418956ea548805ccc105256ed1036abfd649b839841bdd056c532f0889a4b0b

    SHA512

    2370b36ca57760578a2109401af097f262ed75c8df94287debaa307075d53ed47eccd976fa3b69f41f35612baf3a24d0fb779a384898e7bf73344334ad06f433

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    64cc908739d3c102ec19e8c54d378260

    SHA1

    b3763dd6cd76db54c3c3a8fd17fafd0a625daa2d

    SHA256

    7d1ed7b9082114dc7972ce6a99089950684f74280aa049673726e567c1543430

    SHA512

    4c5b34bf80b746ddefeed0e75e0dd92989fce78f35d277574f4b71f039a72c787a7640e4e65c90fd019e57247a96eaca30daf9a77542e5a939e5d8117745f0c6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    950B

    MD5

    91120391b9e6d6afcfff91a999e43557

    SHA1

    ee322419a189c7a567cfba3093cc10d0dad6353e

    SHA256

    9b96c684f2275d342f728bbf09f5ba5dfb422fd0c4e3b7af42cf0202c6fbfe11

    SHA512

    a9cb6650dcccacc4860d75a87d021ecd52012f4cd6a204fb730aa15b9ed70dc4677fdfbe6d83a53d41bece4827e9d4928194127764062caeff61b489ab36cf65

  • F:\AUTORUN.INF

    Filesize

    145B

    MD5

    ca13857b2fd3895a39f09d9dde3cca97

    SHA1

    8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

    SHA256

    cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

    SHA512

    55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

  • F:\AutoRun.exe

    Filesize

    2.4MB

    MD5

    84e2bf751724e3b0acc70b67ee1b8e96

    SHA1

    2e1c9638b022901d67c69ef17c6acd12fd6e493f

    SHA256

    1db9ec5678e417eef3d6e080a031c8adfc1fc85127317b952bc33733d93841e0

    SHA512

    56a229897c812cddd7f0b1847cf439f910350aa11138f7165b7c7f697095dfe5ee64e875e4262706c20e7bdbb59a94512386965e83ac9327b0b6967377882aef

  • \Windows\SysWOW64\HelpMe.exe

    Filesize

    2.4MB

    MD5

    3186b2fa1bccd38746b3fa55865556ce

    SHA1

    37c87959085f3f2903592330b8bb745d8917c79f

    SHA256

    7cdbe203acf89434221c69804bf8bd1e44b413376fbb509301c80a84d73e3ee9

    SHA512

    81b61776570826a77acba1f44ab6cb5fb64721a8d2848521b8b394b3d957840261becb7bf914ac4e64e8f68f1c4cb2a79280b375f0f63aa1dbde69b926800dcb

  • memory/1940-14-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1940-12-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/1940-241-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2328-11-0x0000000002F30000-0x0000000002FAB000-memory.dmp

    Filesize

    492KB

  • memory/2328-0-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2328-5-0x0000000002F30000-0x0000000002FAB000-memory.dmp

    Filesize

    492KB

  • memory/2328-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2328-232-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB