Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2023 20:23
Static task
static1
Behavioral task
behavioral1
Sample
464d119bd786eccaf0894ab146105b8adc8a345f1e72a775ec1cdf38631eba1a.exe
Resource
win10v2004-20230221-en
General
-
Target
464d119bd786eccaf0894ab146105b8adc8a345f1e72a775ec1cdf38631eba1a.exe
-
Size
245KB
-
MD5
dea57f6d76b48d0b3a2e099dbf34b739
-
SHA1
ec2c8e74bb6b32c81ec04ac57ce29ee8ae4546ec
-
SHA256
464d119bd786eccaf0894ab146105b8adc8a345f1e72a775ec1cdf38631eba1a
-
SHA512
c8827672a885fb6adead40d7f1e3f06bebca30a5164e31cbc6364dcf3774ffb3d160be402e31606e0065c36d22ac4db8b26de7c3bad8ae3b44fa151c7b9e552b
-
SSDEEP
3072:uF+WJvUs8XLoqB9RHZEaxNn8mg20Lizvac4Hd45cT/XZKwl8eM1rCgH/6cXFlTXo:uvJvNCosHWwlpk2jac4HdtKwlWlHXFp
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 464d119bd786eccaf0894ab146105b8adc8a345f1e72a775ec1cdf38631eba1a.exe -
Executes dropped EXE 1 IoCs
pid Process 4056 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" 464d119bd786eccaf0894ab146105b8adc8a345f1e72a775ec1cdf38631eba1a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4652 4400 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4400 wrote to memory of 4056 4400 464d119bd786eccaf0894ab146105b8adc8a345f1e72a775ec1cdf38631eba1a.exe 89 PID 4400 wrote to memory of 4056 4400 464d119bd786eccaf0894ab146105b8adc8a345f1e72a775ec1cdf38631eba1a.exe 89 PID 4400 wrote to memory of 4056 4400 464d119bd786eccaf0894ab146105b8adc8a345f1e72a775ec1cdf38631eba1a.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\464d119bd786eccaf0894ab146105b8adc8a345f1e72a775ec1cdf38631eba1a.exe"C:\Users\Admin\AppData\Local\Temp\464d119bd786eccaf0894ab146105b8adc8a345f1e72a775ec1cdf38631eba1a.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
PID:4056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 11202⤵
- Program crash
PID:4652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4400 -ip 44001⤵PID:1776
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
837.2MB
MD51293fc07a5b91bcfecf1b6ad5b093f7b
SHA1d096d46033ba31085cf683e8edf5ab0ff28827bf
SHA2563dbddcb515a0a211ed3978a42e8bcc7ee537a81057c618259878fb5933d38d97
SHA512c8a01dfb5d844dfe47deb6f5c9b43a8ea6b3b711e6ab6d04ea0c04f1757dfbf33dbf71811cbfb30eb1e61d5a3f8f5e68fbc1e74d80005726a5430225aa0b0269
-
Filesize
837.2MB
MD51293fc07a5b91bcfecf1b6ad5b093f7b
SHA1d096d46033ba31085cf683e8edf5ab0ff28827bf
SHA2563dbddcb515a0a211ed3978a42e8bcc7ee537a81057c618259878fb5933d38d97
SHA512c8a01dfb5d844dfe47deb6f5c9b43a8ea6b3b711e6ab6d04ea0c04f1757dfbf33dbf71811cbfb30eb1e61d5a3f8f5e68fbc1e74d80005726a5430225aa0b0269
-
Filesize
837.2MB
MD51293fc07a5b91bcfecf1b6ad5b093f7b
SHA1d096d46033ba31085cf683e8edf5ab0ff28827bf
SHA2563dbddcb515a0a211ed3978a42e8bcc7ee537a81057c618259878fb5933d38d97
SHA512c8a01dfb5d844dfe47deb6f5c9b43a8ea6b3b711e6ab6d04ea0c04f1757dfbf33dbf71811cbfb30eb1e61d5a3f8f5e68fbc1e74d80005726a5430225aa0b0269