Overview
overview
10Static
static
700FAEE82AB...AD.exe
windows7-x64
1001D2E2B398...A9.exe
windows7-x64
100B760ABF10...23.exe
windows7-x64
100B8E9BC319...20.exe
windows7-x64
100D0E7D8626...E5.exe
windows7-x64
100E9765528C...69.exe
windows7-x64
100c9fa52ace...7a.exe
windows7-x64
715f7ea290d...8c.exe
windows7-x64
101CB8203982...26.exe
windows7-x64
101CF69170F7...5E.exe
windows7-x64
101CFEDCBA10...0E.exe
windows7-x64
71DD70E8036...25.exe
windows7-x64
101E229029B2...DA.exe
windows7-x64
101F5FEB3211...6D.exe
windows7-x64
101FD11B5CBB...ED.exe
windows7-x64
1021977fc851...61.exe
windows7-x64
1021e1bc4340...01.exe
windows7-x64
72C3542B5D9...85.exe
windows7-x64
73ac7f91e37...38.exe
windows7-x64
103c0fe521f6...16.exe
windows7-x64
1041c53e90f0...4a.exe
windows7-x64
10467c2b23b7...be.exe
windows7-x64
105b79b6a814...b0.exe
windows7-x64
10712affaa8b...1).exe
windows7-x64
18b04af13b7...21.exe
windows7-x64
10Analysis
-
max time kernel
1797s -
max time network
1558s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-07-2024 19:21
Behavioral task
behavioral1
Sample
00FAEE82AB5B800CF6DBE97AFD39790B856AD1EC25DC7ED8F798ACA702BEE7AD.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
01D2E2B398D6017D5114464E39C40E9243AE492106CCA8B2D3EB1A95F9E228A9.exe
Resource
win7-20240704-en
Behavioral task
behavioral3
Sample
0B760ABF108DB9BF5EA14F96A53F6D8E1B36FCC28BC75114E923482157B89A23.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
0B8E9BC31964C9433BD5CC20E556CFD0590C3B17B0DB23CDC3AD0547683F3820.exe
Resource
win7-20240705-en
Behavioral task
behavioral5
Sample
0D0E7D86268F7ACD51E9D4AC94F016034FB949B605B21405CBA0B5581E4532E5.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
0E9765528C4E8FDCFF83FA07A78F5E73B41B3D9295159C823FE3B1F97C113469.exe
Resource
win7-20240708-en
Behavioral task
behavioral7
Sample
0c9fa52ace8019b43c91f4859ecddfde6705141b9283fef05c6c4c37a5c1777a.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
15f7ea290d832bc32ebf660690b42616264fc0be8969934c1f8d7e5a5d3cd18c.exe
Resource
win7-20240704-en
Behavioral task
behavioral9
Sample
1CB82039822CB89811F42B2C3BDBB4256D85D66E942CD69F38D3CB123596C926.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
1CF69170F7419E097EB71B514C01D2A028C95D0605F8B91C90A2E28B3216775E.exe
Resource
win7-20240705-en
Behavioral task
behavioral11
Sample
1CFEDCBA10B4C90789F2C4A6A1CE2C3D4197058E574942400F571BC5D06DF70E.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe
Resource
win7-20240704-en
Behavioral task
behavioral13
Sample
1E229029B2D3FF00EDDE061B1AAF470EE437FA8196D97FAD2C2C6C9EDE5B44DA.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
1F5FEB3211A640804B3951DE9EA2037EFCB0D6EE1019D8853F98DAFD6132A76D.exe
Resource
win7-20240705-en
Behavioral task
behavioral15
Sample
1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe
Resource
win7-20240708-en
Behavioral task
behavioral17
Sample
21e1bc4340221fbccee28d59333c20b20755e34e2f3391b90837172bd07fbf01.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
2C3542B5D9AB4EED2DD88CD74A02236A944AFD76E8717F65DCD544912229CA85.exe
Resource
win7-20240705-en
Behavioral task
behavioral19
Sample
3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win7-20240704-en
Behavioral task
behavioral21
Sample
41c53e90f0861b068eaa512edff28a586128f808b437122399347bcb3774914a.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
467c2b23b785df7b45758143387e9cc5a588718ae0640b3f01b1c19679b011be.exe
Resource
win7-20240708-en
Behavioral task
behavioral23
Sample
5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
712affaa8b84e8fb7d4e71feb6c1074185bc43b5a2f265fbfb248f7ed40a5489 (1).exe
Resource
win7-20240705-en
Behavioral task
behavioral25
Sample
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
Resource
win7-20240704-en
General
-
Target
1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe
-
Size
716KB
-
MD5
cc3f68e8a50b05aa77d88b6119583b9e
-
SHA1
71c7b93a8947265fe30e6928730504a5456ca788
-
SHA256
1dd70e803623d5311b71129976710b11a8942d206a5d8d86cdf8417255f15725
-
SHA512
e4fe7c8ec1d88c0bc81834de0a1212902849d7c9f6228e26fb8aaf3f046011f934d6de01becb339ab88169533ff8dc0d6fad7d6d7ff7e956e408242a21809e55
-
SSDEEP
12288:ZMMpXKb0hNGh1kG0HWnAsaHy41Dxm1zRRaMMMMM2MMMMMu:ZMMpXS0hN0V0HYah1I1zRRaMMMMM2MMd
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe -
Renames multiple (93) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral12/files/0x000500000001a452-4.dat aspack_v212_v242 behavioral12/files/0x000500000001a475-38.dat aspack_v212_v242 -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\P: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\Q: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\V: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\B: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\L: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\N: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\S: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\U: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\R: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\Y: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\Z: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\E: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\G: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\I: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\K: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\O: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\X: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\A: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\J: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\M: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\T: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened (read-only) \??\W: 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened for modification C:\AUTORUN.INF 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File opened for modification C:\Windows\SysWOW64\HelpMe.exe 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe File created C:\Windows\SysWOW64\notepad.exe.exe 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\iexplore.exe.exe 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2368 1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe"C:\Users\Admin\AppData\Local\Temp\1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
716KB
MD5cf86111c648bc631d3a494dcafaf8f83
SHA1a2366c519105d060b11295b2037a9a51f942655f
SHA2560b9afdccc1a62c283e429babbc6a17a7a290f463db1979177b6f64376ab5dad0
SHA512a8d362eb363cdcacf4574c9b22327b08b532d5aa2f96ddd9c0775ea6ee784e854927425cd9c8ca3a022cebec95dac45e7dce76f74161d4c6ca2f49c10a2d19eb
-
Filesize
1.5MB
MD500709f631c95c65bcb892ceb77cdf1b3
SHA1b96b206680bc2e6de481dc4766e97940390209d7
SHA2561f4e8b11cd9ae6c43309a6ad5e8e831c86672e4399470ce4c669e8e3f366ebd6
SHA512c568eab6a79d94817058d10474ab088329857cd5dba3144ce1f8d59889a2d6586a3a5729df4e4c429ef6164e9f2ccff0c578a5364eb621923d31f4d54f6f207d
-
Filesize
1KB
MD517d1d3a3620bbcd2ce7cf43dee67725c
SHA19e3f58761bfd594e6daf723efa70d8165659c100
SHA256ff680f2c2341de9b07ac1c6b303aab76d8c06b5c0bb01823446d007c61a60cf4
SHA512531228a7fc184083b72668a52dc6b368dcfb0df6673f817b149892ee2b9d2f0a8ae1569070693ef200128cdda6cb2529b160846a82834eebece52d0aca3ad172
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47