Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2023 13:07
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
246KB
-
MD5
9789fecf55c4b070e0194adb021ed607
-
SHA1
5acfd723e11c569a12d5880083346576c1afe5a3
-
SHA256
4cb97044fa8325ea15b14dbf9d6ee9301b9fb0601189a0c04dac9c7358313b0a
-
SHA512
7b5f0e67236c7dd0823ad6993933106fdf1c2f51d4a8008e2b52bcf7ded4a6ad9bf5dc538300f7d82d7229bc39c64b1ddc817516989beb6ad09082879d778836
-
SSDEEP
6144:pp/7/xgVzhs7yOomaVP1cQX6yOQgNRaMWm2:pp/lQYymMuQKyF0Km
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 1 IoCs
pid Process 5048 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4896 724 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 724 wrote to memory of 5048 724 file.exe 85 PID 724 wrote to memory of 5048 724 file.exe 85 PID 724 wrote to memory of 5048 724 file.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
PID:5048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 724 -s 11202⤵
- Program crash
PID:4896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 724 -ip 7241⤵PID:1612
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
820.2MB
MD50437becbb082a451d6bab2421d6e6ad4
SHA1910b8595b74d6edf98c87c79ca40ac51cd8fc2f7
SHA2566a94b4e28e9dfc0488db0ea511451b0794f3bda102324df786c6eb61277c2899
SHA5126d5efe91098ed8d1e3ccd59814a18965acd040295ec3490812b000cfc53bdba4764a6cc176cec61f45ab62140ac0bc8c840bc8cedd1b4fa063d277d57b4f1407
-
Filesize
713.9MB
MD5fe9ddb76623da9169d3f08de61a57dbf
SHA16c89a53633a19788d4f2a7a1eb31a4f3336b4fd1
SHA2565a68ceac559fbe39221881186c5d46b79ec509c42d81fef94f30d80f623adbd3
SHA512b6a03d8950172f9578be2639dcb090c2ff042d4f053e9fa629076cf10fedf0001f4a7cfb7eb76d9e7678e935a7154fdba8117b2661608d69850f5e385556a7ab
-
Filesize
740.7MB
MD526bbaf25a5dac3f642c22c02c0a0cd53
SHA1ad01cf09e04117ed58fee44c1b57ab4c1b1f8015
SHA2567c785d27738d285a84d0d9bd5b13105e64a0603a0dd002dd09df508d8c45b46e
SHA512d6258bf59609b0e61989d947546d42178099263854508a7b94fbc7722ba44e6faf3ea35e278811ad975819fa6a34712fd84f1c095dee65d3e9f9641bef3f795c