Analysis

  • max time kernel
    115s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 05:06

General

  • Target

    c98fbadad6784f4542ddff3a63c73f9133569ab6663d6ac0fc0543fafe6e3993N.exe

  • Size

    6.7MB

  • MD5

    32e845f7459a02d026db70ca010ccc40

  • SHA1

    b3678082663c4cd21f50b354cd7556331abf7736

  • SHA256

    c98fbadad6784f4542ddff3a63c73f9133569ab6663d6ac0fc0543fafe6e3993

  • SHA512

    c2ecbf2cb686564752639c4b359ae9d909f83dcfc05c0fe258ceb4a0103efa5378b606bbb8d09e06dde7453da5c4d0d6a358510b819c20894eb74e6443df1477

  • SSDEEP

    49152:Kwi0L0q+wi0L0qR4wZB8NIM+B8NIMI8Sfpwotkzaxc1OGz88wk:Vi0fi0H4wmIMrIMzKpXOMGQ8wk

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (91) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c98fbadad6784f4542ddff3a63c73f9133569ab6663d6ac0fc0543fafe6e3993N.exe
    "C:\Users\Admin\AppData\Local\Temp\c98fbadad6784f4542ddff3a63c73f9133569ab6663d6ac0fc0543fafe6e3993N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.exe

    Filesize

    6.7MB

    MD5

    7244e341d25db2b3ca0896593cf0ee21

    SHA1

    900d49f496eccdd622d5499ee4cdbfcfc879a784

    SHA256

    1003ba3c45a3c7e4e6b3f3ea3648b4d9619907e766d562cd6e4f6e381bb45014

    SHA512

    31e9b1572dc0bb1c60ae049660952bb1429d4b84603a8d885edb3e5a57dbdbd41ea3a9b1a3963cec1581a8ba6151512e1b4f56b3d37023c9eea858741a546a66

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    f641c0cd613d82b80b71a58afb01ebe0

    SHA1

    dba6a8eeb04ce75c176b9bb597fcd75e63531760

    SHA256

    83712efaf65b471ad5256a82f3b7e1a7d32768c449899455e9f510c1103b1168

    SHA512

    6d1fe73615e03a755a51a88e23738bf2c58be52dc8e704165af87b329755275c6382e175016163b5d364d4a6aca4dd7bf65f15b3ab8a6f3c3ef5b3349b49be4c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    950B

    MD5

    86fbcaa9f518ae919f526d46505e96ba

    SHA1

    9a19a1a3a70fac9ca6615ed8fb5678191b39be61

    SHA256

    a17f2538639247a0ced2f45df308146fd2944c29a9028df04bcb3baeb9098e46

    SHA512

    b39218c952a75249a963eefaac6ffe6ba234d8a8b2b8b4b0feff5e4a5597cc2bb7e6807a07074c7ea74d4c938a67b8afc93cbaae1287222d5d52f2d50f3d70f3

  • C:\Windows\SysWOW64\HelpMe.exe

    Filesize

    6.7MB

    MD5

    ae569d8adb0270467182b351b868a054

    SHA1

    7373b5ef1b2e0269377bddc5cbebe0f2db54812e

    SHA256

    301a8ee1fa7b81c45e3162ed2c433c557f49bb096bc23fa51949b21ccd6a3feb

    SHA512

    59decabefc7852bc4f1dd60e2c5f6bc005f86be735b448f5347ed1809dd51134ca0cc97d1f9f39d8ac044da5b00520088d64a6f8387a71076513a9f24f9c4bc7

  • F:\AUTORUN.INF

    Filesize

    145B

    MD5

    ca13857b2fd3895a39f09d9dde3cca97

    SHA1

    8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

    SHA256

    cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

    SHA512

    55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

  • F:\AutoRun.exe

    Filesize

    6.7MB

    MD5

    32e845f7459a02d026db70ca010ccc40

    SHA1

    b3678082663c4cd21f50b354cd7556331abf7736

    SHA256

    c98fbadad6784f4542ddff3a63c73f9133569ab6663d6ac0fc0543fafe6e3993

    SHA512

    c2ecbf2cb686564752639c4b359ae9d909f83dcfc05c0fe258ceb4a0103efa5378b606bbb8d09e06dde7453da5c4d0d6a358510b819c20894eb74e6443df1477

  • memory/2668-289-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2668-277-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2668-228-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2668-331-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2668-321-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2668-311-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2668-239-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2668-249-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2668-301-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2668-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2668-261-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2668-271-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2768-302-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2768-9-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2768-282-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2768-262-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2768-290-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2768-250-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2768-272-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2768-312-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2768-240-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2768-230-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2768-322-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2768-229-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2768-332-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB