Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2023 12:40
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
245KB
-
MD5
354b3a49c2eb26b415dad675be798021
-
SHA1
ab564aa0f4b8c1bb4840e5d53cf22bda139a8417
-
SHA256
c680866af40f12d71ea30dbc0ba4d02132b64cff08305df0f0827aed7fe99dd1
-
SHA512
0e7d8fd3dbfddae84f794630f71cd5e08ca82d08047ac04fdd754521e5ea42a326967da61b3c85762fcead5eeaa9c73ba60f073611379dd788ce6909652602c4
-
SSDEEP
6144:bYJs4DXb74q3uYqTKRPRdqZThdIQJeyG:bYiw8guYq2Xahdxe
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 1 IoCs
pid Process 3956 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4796 372 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 372 wrote to memory of 3956 372 file.exe 87 PID 372 wrote to memory of 3956 372 file.exe 87 PID 372 wrote to memory of 3956 372 file.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
PID:3956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 11122⤵
- Program crash
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 372 -ip 3721⤵PID:3936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
786.2MB
MD5305f05a828b944df695f3d4317af03c1
SHA11d5834d6926d8a57b98b450b855a95351235292c
SHA256490cf095abf53e3f37c2d5501ffed5ecf6bd7e0cbcb22a00479bfd3cd287a772
SHA5127a9bd23ad36e5e9df4acafbe1f2c894eb02f9cc6d792fb07701d1f6e1b238017b6c462bff8caeb00fc5b9ca90cceb7074d658f1f4f23e35fe3715f857a2f067c
-
Filesize
786.2MB
MD5305f05a828b944df695f3d4317af03c1
SHA11d5834d6926d8a57b98b450b855a95351235292c
SHA256490cf095abf53e3f37c2d5501ffed5ecf6bd7e0cbcb22a00479bfd3cd287a772
SHA5127a9bd23ad36e5e9df4acafbe1f2c894eb02f9cc6d792fb07701d1f6e1b238017b6c462bff8caeb00fc5b9ca90cceb7074d658f1f4f23e35fe3715f857a2f067c
-
Filesize
786.2MB
MD5305f05a828b944df695f3d4317af03c1
SHA11d5834d6926d8a57b98b450b855a95351235292c
SHA256490cf095abf53e3f37c2d5501ffed5ecf6bd7e0cbcb22a00479bfd3cd287a772
SHA5127a9bd23ad36e5e9df4acafbe1f2c894eb02f9cc6d792fb07701d1f6e1b238017b6c462bff8caeb00fc5b9ca90cceb7074d658f1f4f23e35fe3715f857a2f067c