Analysis
-
max time kernel
264s -
max time network
267s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
13/03/2023, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe
Resource
win10-20230220-en
General
-
Target
348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe
-
Size
7.3MB
-
MD5
99f16ab6ab670935b5aa5c84b1b5f6bd
-
SHA1
59f375481cdfe246d1ddcaada9941e16dcfda297
-
SHA256
348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057
-
SHA512
845e76e29adb6b7890a3a5c508e27b9731e9872bc791eeefb146b23e0e737280d19e4df1203b719f8e168a8c8a0d8ae1b4bf670da5d264bde1eece8663624d70
-
SSDEEP
196608:Ltu5ODXM16mjmKSRFWuxx6ruj3nK/x9jWuy:L05ODcgR6mix1
Malware Config
Extracted
laplas
http://185.106.92.104
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4984 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3228 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe 3228 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe 4984 svcservice.exe 4984 svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3228 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe 3228 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe 4984 svcservice.exe 4984 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3228 wrote to memory of 4984 3228 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe 66 PID 3228 wrote to memory of 4984 3228 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe 66 PID 3228 wrote to memory of 4984 3228 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe"C:\Users\Admin\AppData\Local\Temp\348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
633B
MD5c5298d2c78be8fdfc264eb6fe3e275f8
SHA1f09de5f443da081efaff0155f422ca0375edd164
SHA256de32b3c0549fde0dc5ac435a89f16a87832a0632b6602e75f552d07074081577
SHA5125aeb5013b00e13cd8a172639bc7c675bd06cc0473ae9844c9c324e5c322987ddeff986bd4a8e620ce0ca9d1098a3ee8bbb4802789d1e89b0ec0cecf2f55a4853
-
Filesize
2B
MD5444bcb3a3fcf8389296c49467f27e1d6
SHA17a85f4764bbd6daf1c3545efbbf0f279a6dc0beb
SHA2562689367b205c16ce32ed4200942b8b8b1e262dfc70d9bc9fbc77c49699a4f1df
SHA5129fbbbb5a0f329f9782e2356fa41d89cf9b3694327c1a934d6af2a9df2d7f936ce83717fb513196a4ce5548471708cd7134c2ae99b3c357bcabb2eafc7b9b7570
-
Filesize
773.5MB
MD55901c0111de27d3176097cf52fa322d5
SHA1d653f5abd102c58f3c3644b71cb11c1e521fd52e
SHA2560348b1a9967895e9a2a48af5fe899c3953130a933c4d2f13b7c05cd67e8b161c
SHA512663f4eabb9fd30eecb2da260ce4ac0bef818a21ca955154d3a2b2a818a56d11a71104e1055331c587e12cb02eaa7500d5ee5beebbcdf5ae7e1c0c918ef423472
-
Filesize
769.2MB
MD5ccff4abcee0cf495ced4907573ff767a
SHA1230a26e59a558c6240885dc0880e8c46cc8e2772
SHA256dc8258191f489e6a933df0d01be912405c5689399fb6c6eb3be5d6474a1becf7
SHA512921270fe790fc23bea5e9fc4b191143e1f55a52f41291506ecd95d4a3bbd9de106831cdda7842e1c30b5667609d6900abd9d88032910c87ebf045b47c12d661e