Analysis
-
max time kernel
115s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 23:58
Behavioral task
behavioral1
Sample
e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe
Resource
win10v2004-20240802-en
General
-
Target
e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe
-
Size
3.3MB
-
MD5
ce0cfa774b5453a216b53a6cdf7241b0
-
SHA1
3600aa18d9f92eaffd7dea724d5f008bdf0b61ab
-
SHA256
e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969
-
SHA512
046fc8001698df63988bc9b413bb864ffa2db2fc807ba6de616d393c19c3008a19bae5af183e6ae285088166ddfdd68e98ebb4f1559b4877b5b55bd3c116e605
-
SSDEEP
24576:5MMpXS0hN0V0HYSGB2uJ2s4otqFCJrW9FqvSbqsHasgXhFHDAGtlRXZ+CP63n0Nf:qwi0L0q1piyx5W1
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x000c000000016d32-4.dat aspack_v212_v242 behavioral1/files/0x0009000000018f2c-38.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-46.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe -
Executes dropped EXE 1 IoCs
pid Process 1596 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 1848 e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe 1848 e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\R: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\O: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\T: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\Y: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\A: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\E: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\G: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\K: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\W: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\I: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\J: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\V: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\B: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\N: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\P: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\S: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\H: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\L: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\Q: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\U: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\X: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\Z: e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened for modification C:\AUTORUN.INF e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HelpMe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1596 1848 e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe 30 PID 1848 wrote to memory of 1596 1848 e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe 30 PID 1848 wrote to memory of 1596 1848 e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe 30 PID 1848 wrote to memory of 1596 1848 e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe"C:\Users\Admin\AppData\Local\Temp\e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969N.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD53053919d56e913a4b8b05f8d00495f24
SHA15fda9746cd4b6333d8817fbffce83fb02ba8ce93
SHA25690c11217aa4d23eba63bdea39cbec7a01fd609f00ad1295f3c2dff01e770f2f8
SHA5127b8c2606400787bde48aa7a87660d3b6dd361174a7b67d0de99327f90c0467bb5e40c3343e4ec4611191fa4a3b5ccb8ae9606f5867b09a8e5b948f9298b67356
-
Filesize
1KB
MD5e35eb0f0a0842f0a4e4ee35d2c210e81
SHA11f0c779d91f2b3e2f1c45313744d39f2e2e36b06
SHA256986e65af59f0ef20b2e31015406e5fcbd2a202ff523f3618f61802cf31292a69
SHA512bb22a9b3f46fe8b21b97b57eda1d68108d541bacde8fd790f7c714722384eba39aeadc276ce24ca7008b47c345f8b07b16bf640f27ca98f9838eefdfe832efba
-
Filesize
950B
MD5914b9f950fbbb66b7943c49fe7ad209b
SHA189959b46090317805182a019d994a1b7e945f043
SHA256f09c049ed53237cc0303bfe92cbb34752af0c56157adff9b784c919c02abfb0d
SHA512305724a5c87e54afca02a2bcf92e85e16f5ca0b95d0ced8181d86e00e744329023d07c580295518b695f3197430635f8345de70831f377b3f717300875dc4d3f
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
3.3MB
MD5ce0cfa774b5453a216b53a6cdf7241b0
SHA13600aa18d9f92eaffd7dea724d5f008bdf0b61ab
SHA256e3f84259e31817c4b23b46af4c4f8f73d26f205af4ad1f6acbda430baaf53969
SHA512046fc8001698df63988bc9b413bb864ffa2db2fc807ba6de616d393c19c3008a19bae5af183e6ae285088166ddfdd68e98ebb4f1559b4877b5b55bd3c116e605
-
Filesize
3.0MB
MD5be89d2050f52e31ccb97e942f6986d67
SHA1b843c9b6e67a7915d555298827ae5887637e632b
SHA256226bdff312854ab8975b430130aceccdf6c0802e7ef1f2a37892a447feb1f7d4
SHA512e43936db01290a33df2aa7e557d6a3ae9fe910080b8e8a7730be1c31de0ea0fdb3ee952ac1d25e4393cb22fdc9477d8e586652f05c970250285d9cc424e58956