Resubmissions

15-10-2024 03:47

241015-ecgjlashrh 10

05-08-2024 04:49

240805-ffygys1eke 10

05-08-2024 03:50

240805-eee4jszepd 10

Analysis

  • max time kernel
    145s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05-08-2024 03:50

General

  • Target

    1db9ec5678e417eef3d6e080a031c8adfc1fc85127317b952bc33733d93841e0.exe

  • Size

    2.4MB

  • MD5

    84e2bf751724e3b0acc70b67ee1b8e96

  • SHA1

    2e1c9638b022901d67c69ef17c6acd12fd6e493f

  • SHA256

    1db9ec5678e417eef3d6e080a031c8adfc1fc85127317b952bc33733d93841e0

  • SHA512

    56a229897c812cddd7f0b1847cf439f910350aa11138f7165b7c7f697095dfe5ee64e875e4262706c20e7bdbb59a94512386965e83ac9327b0b6967377882aef

  • SSDEEP

    12288:sp4pNfz3ymJnJ8QCFkxCaQTOlPes5Z76k/L/KB8NIpYJTCihq82WFpXKEVFA2MCp:eEtl9mRda12sX7hKB8NIyXbacAfe

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (91) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1db9ec5678e417eef3d6e080a031c8adfc1fc85127317b952bc33733d93841e0.exe
    "C:\Users\Admin\AppData\Local\Temp\1db9ec5678e417eef3d6e080a031c8adfc1fc85127317b952bc33733d93841e0.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.exe

    Filesize

    2.4MB

    MD5

    201b32e2ed7f87fa4d5a699ed9b98550

    SHA1

    73e8359bcb7bf340718f4317aea19518e7e70111

    SHA256

    c25aa843e158e4b1abb68ae3c55b889d93c3067401fa1a1daee88a3885f3ba22

    SHA512

    7200dc7a4ef0f6653a2209e6c6b4be3ba9022afb1818657509c04df6138f6c1e3c3b29c213325597dcaabe7a2661d0279aff02c69a21d768bcae206b910883f0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    d5445b45e6c39916cd4fcd8a19006106

    SHA1

    6fe559334a831268ef9f86153fbb695b5e34b850

    SHA256

    02521a3f65233ba4f39ce19e6e2feca6a393a1001eedfc329f427864e5138f24

    SHA512

    be3f15698f8e350253044655a4209caf262179fa0df36664778278a7515c20bf665e5715e16ce1f806a669f4929fdefa7415e5ea0bd0410e1cd603b6736ff1f0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    950B

    MD5

    dd757a06497aac3ad5bd92ffb3446add

    SHA1

    05a2d635bdd08d39833bd8cac5ad4e2a771fa7d9

    SHA256

    7fc177754ba9957e925703122a855a806a97d865f3b2d296b1a585fc3ce54d64

    SHA512

    3097a1afe47d91d5847c9d47ca0038ee8517fbc3ff61bc53ad29b439e8cc3c5af83612cec9e900810fa10186445ccd29c63c6cb507df0ce69b5a9b0fd319c6c9

  • F:\AUTORUN.INF

    Filesize

    145B

    MD5

    ca13857b2fd3895a39f09d9dde3cca97

    SHA1

    8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

    SHA256

    cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

    SHA512

    55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

  • F:\AutoRun.exe

    Filesize

    2.4MB

    MD5

    84e2bf751724e3b0acc70b67ee1b8e96

    SHA1

    2e1c9638b022901d67c69ef17c6acd12fd6e493f

    SHA256

    1db9ec5678e417eef3d6e080a031c8adfc1fc85127317b952bc33733d93841e0

    SHA512

    56a229897c812cddd7f0b1847cf439f910350aa11138f7165b7c7f697095dfe5ee64e875e4262706c20e7bdbb59a94512386965e83ac9327b0b6967377882aef

  • \Windows\SysWOW64\HelpMe.exe

    Filesize

    2.4MB

    MD5

    3186b2fa1bccd38746b3fa55865556ce

    SHA1

    37c87959085f3f2903592330b8bb745d8917c79f

    SHA256

    7cdbe203acf89434221c69804bf8bd1e44b413376fbb509301c80a84d73e3ee9

    SHA512

    81b61776570826a77acba1f44ab6cb5fb64721a8d2848521b8b394b3d957840261becb7bf914ac4e64e8f68f1c4cb2a79280b375f0f63aa1dbde69b926800dcb

  • memory/2432-9-0x0000000001E00000-0x0000000001E7B000-memory.dmp

    Filesize

    492KB

  • memory/2432-0-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2432-232-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2432-233-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2432-234-0x0000000001E00000-0x0000000001E7B000-memory.dmp

    Filesize

    492KB

  • memory/2432-10-0x0000000001E00000-0x0000000001E7B000-memory.dmp

    Filesize

    492KB

  • memory/2432-1-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/3052-14-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/3052-12-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/3052-243-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB