Resubmissions

13-07-2024 09:54

240713-lxbx6swdmm 10

13-07-2024 09:50

240713-lvbvdsyapd 10

13-07-2024 09:46

240713-lr1dksyajd 10

Analysis

  • max time kernel
    1197s
  • max time network
    844s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13-07-2024 09:50

General

  • Target

    2fff52aa0c2fac4e53008cdf0bbea4ade2243bf42418330a03d5ce6f0d598421.exe

  • Size

    2.4MB

  • MD5

    42935359d9ae5ab7507f082c117c0027

  • SHA1

    05dd7616805833497c0ec1826ffc53b7673d8191

  • SHA256

    2fff52aa0c2fac4e53008cdf0bbea4ade2243bf42418330a03d5ce6f0d598421

  • SHA512

    f7fb318258fd7faaed95facea3b8c1ee2c11c13cb5ea239773b22ae5e270cef94a1892dfd2f60df15cf79f9f4935e4145bf5127734ff8893c3020c245d18189a

  • SSDEEP

    12288:sp4pNfz3ymJnJ8QCFkxCaQTOlPes5Z76k/L/KB8NIpYJTCihq82WFpXKEVFA2MCH:eEtl9mRda12sX7hKB8NIyXbacAfk

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (91) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fff52aa0c2fac4e53008cdf0bbea4ade2243bf42418330a03d5ce6f0d598421.exe
    "C:\Users\Admin\AppData\Local\Temp\2fff52aa0c2fac4e53008cdf0bbea4ade2243bf42418330a03d5ce6f0d598421.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      PID:2928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.exe

    Filesize

    2.4MB

    MD5

    89b8074777160ea91213ea3d12c375e8

    SHA1

    fc3630bccdc29bdc6cb5595039d96f29ca26aea8

    SHA256

    75f76dd4a91092d02eeae32f4e99179a49c9208e32a9b824e7e718abbf91d82b

    SHA512

    1bfb96a8b3b3893614e8667ee836732a75a20b78daef73acac4f0d857f28510d1cb5cfcb4d5329ee3fd72994b02cdbc59d2fb8c58fc39e96436618c8a1aea6f9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    33684791a5b75e2bf5f9d1e31e6c8176

    SHA1

    a414ac55e79186ad2ab271c3c39aee042f1629ad

    SHA256

    116d6d1697c65cd0a82b764212aca26ff83a373e6f77e2d934efed068479ebcf

    SHA512

    813944f097b042e749b0181ab6bd49b380ca50318995fb9c59af7c1090df0635a1a8d2bbef76a0db7b3c58b8615908f1bfbc164f3fd003f8748b56b45689d003

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    954B

    MD5

    14776a28bb14e7a8a7c07b9dfb0f12c8

    SHA1

    b95f348e1ec374f7be0cd5977d834b102ea4b446

    SHA256

    0d246c829aed7b0d2edfbcee2e414e6710c0be5206087f69a31e495244986784

    SHA512

    ee16056b02547b22ff63cb868790053f27279615e311423c8be537abef83fb098e457aa7d8677a77dd90d05e4e16aca5008f4465816ef531dc3ccca95fe78aa8

  • F:\AUTORUN.INF

    Filesize

    145B

    MD5

    ca13857b2fd3895a39f09d9dde3cca97

    SHA1

    8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

    SHA256

    cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

    SHA512

    55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

  • F:\AutoRun.exe

    Filesize

    2.4MB

    MD5

    42935359d9ae5ab7507f082c117c0027

    SHA1

    05dd7616805833497c0ec1826ffc53b7673d8191

    SHA256

    2fff52aa0c2fac4e53008cdf0bbea4ade2243bf42418330a03d5ce6f0d598421

    SHA512

    f7fb318258fd7faaed95facea3b8c1ee2c11c13cb5ea239773b22ae5e270cef94a1892dfd2f60df15cf79f9f4935e4145bf5127734ff8893c3020c245d18189a

  • \Windows\SysWOW64\HelpMe.exe

    Filesize

    2.4MB

    MD5

    4deb32e0d99e70030e0a145ba27c9bc1

    SHA1

    02864cb437c185685f7987400bb15ded169f494f

    SHA256

    139d861057f6be9f004db60345166fc74cf19db6e46e967a4ee2d04836467d8d

    SHA512

    42e2dcbfe8f51a603e8f5b2ac94bbb817f273741451105aadad68540453d55e3fd76a06ddd806c9bf04030567a3dc7286259b747da52f77a36687c7169e40fe8

  • memory/2780-236-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2780-11-0x0000000000480000-0x00000000004FB000-memory.dmp

    Filesize

    492KB

  • memory/2780-10-0x0000000000480000-0x00000000004FB000-memory.dmp

    Filesize

    492KB

  • memory/2780-0-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2780-237-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2780-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2780-243-0x0000000000480000-0x00000000004FB000-memory.dmp

    Filesize

    492KB

  • memory/2928-12-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2928-14-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2928-238-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB