Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2023 13:18
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
General
-
Target
file.exe
-
Size
174KB
-
MD5
e58539a5556040a9c415e1cee0a27d7b
-
SHA1
f6c272d97738f3c9d2258b946857329adda298c2
-
SHA256
0cfc62e9e3fb70c9319f2b5785dba4a7632b137daf8e0268a557ba9f70e403b3
-
SHA512
1426c1342e37e29821d3949319c796b14501c0230d388a3060f3f37b56a66074837be82672502e5a1308742199ee57a170366635868cd8b1a889e11f48811eaf
-
SSDEEP
3072:LosZCJm76T7Q6RL+JLpQskRbM5XVvKLU507hlwtu/XJX:5ZevaLp+A8LUO7hSo
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 2 IoCs
pid Process 4056 JDAFBKECAK.exe 1592 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2192 file.exe 2192 file.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" JDAFBKECAK.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3172 2192 WerFault.exe 84 1748 4056 WerFault.exe 91 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString file.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3732 timeout.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 31 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2192 file.exe 2192 file.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2192 wrote to memory of 732 2192 file.exe 85 PID 2192 wrote to memory of 732 2192 file.exe 85 PID 2192 wrote to memory of 732 2192 file.exe 85 PID 2192 wrote to memory of 1784 2192 file.exe 87 PID 2192 wrote to memory of 1784 2192 file.exe 87 PID 2192 wrote to memory of 1784 2192 file.exe 87 PID 1784 wrote to memory of 3732 1784 cmd.exe 90 PID 1784 wrote to memory of 3732 1784 cmd.exe 90 PID 1784 wrote to memory of 3732 1784 cmd.exe 90 PID 732 wrote to memory of 4056 732 cmd.exe 91 PID 732 wrote to memory of 4056 732 cmd.exe 91 PID 732 wrote to memory of 4056 732 cmd.exe 91 PID 4056 wrote to memory of 1592 4056 JDAFBKECAK.exe 96 PID 4056 wrote to memory of 1592 4056 JDAFBKECAK.exe 96 PID 4056 wrote to memory of 1592 4056 JDAFBKECAK.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\JDAFBKECAK.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\JDAFBKECAK.exe"C:\Users\Admin\AppData\Local\Temp\JDAFBKECAK.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Executes dropped EXE
PID:1592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 5964⤵
- Program crash
PID:1748
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\file.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:3732
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 21282⤵
- Program crash
PID:3172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 2192 -ip 21921⤵PID:1696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4056 -ip 40561⤵PID:1192
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.8MB
MD57fb57840f6a8777b650bc75f0e67cc1c
SHA17f02c85ce3a176433d3128fbf8f4a9b4c792e998
SHA256f43a93f2cdd910fe3bf8e164065fcfee493aacc14c673c49c473e7c009bec69c
SHA512f6a142623cd2967a7a4e1599ed702dfa69a1c37238456aa86886f721add6df722bd28b3b06ac9e4a09b170a585704a20ce43ef4206a0b4820ddf816a216909e4
-
Filesize
1.8MB
MD57fb57840f6a8777b650bc75f0e67cc1c
SHA17f02c85ce3a176433d3128fbf8f4a9b4c792e998
SHA256f43a93f2cdd910fe3bf8e164065fcfee493aacc14c673c49c473e7c009bec69c
SHA512f6a142623cd2967a7a4e1599ed702dfa69a1c37238456aa86886f721add6df722bd28b3b06ac9e4a09b170a585704a20ce43ef4206a0b4820ddf816a216909e4
-
Filesize
644.1MB
MD5a8d3edaed37a15921216166f8e5c038e
SHA1dd190374455078d90f9d76f013fbef394ff6b464
SHA256a332c26c263d0643c91dfb84be7796a19e7ce1d6c38b4cc97d02634c84f95c36
SHA5123aaea202e998f03b0f4286f9f94bff262b748a5fa6ca420d2691a37de84ff42b37a8699dfaf71a4de4b7726e8ffedb3bfa0b3bfee4bbc899b4c1e55736aa9246
-
Filesize
661.2MB
MD5b62af35ce34b6db96554a58598ffea59
SHA167c296dcdc5ccc9c896fd0a76bfdf2e2ef786737
SHA25624b4656e2ba97ab1e1aac19600f7ff04da0ed7373a282df2c39162d6f7d80f1f
SHA512478db60a0e6bcd78ee9899703b0927170fe5ef6bf15cc435c58244f55f21b87f62bcc099e69c3bedfc7e5d5b219e51a77062de4944273884f83b055bdbf7544d
-
Filesize
562.9MB
MD5b70290a88a4605c26e8aa3a5823a9678
SHA1e26661091d0d2a519ccce6541fda41bfeaf5e8fd
SHA2564ad34281d369ac214b15c4dc1623d00d9c9f404184648c58e454fc0160b01b6f
SHA5129adcfa79323f25002f7794e2f008714a733351e13595594906f815c96329c353558a31ad8fea1b87118fdac4d7d2923f473b0d63a4ad41f836547104b2d7f84d