Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2023 20:32
Static task
static1
Behavioral task
behavioral1
Sample
cd6d1fc1e1c7aa4e7059db17fcda574632144dc259e74ec6d93af7998daf8fe1.exe
Resource
win10v2004-20230220-en
General
-
Target
cd6d1fc1e1c7aa4e7059db17fcda574632144dc259e74ec6d93af7998daf8fe1.exe
-
Size
245KB
-
MD5
20fd7e0d6d612fc2f2d1629514e3c56a
-
SHA1
41d288ec8a612e3d6aedfcc2f1e143dcacfe264c
-
SHA256
cd6d1fc1e1c7aa4e7059db17fcda574632144dc259e74ec6d93af7998daf8fe1
-
SHA512
3405cefedfe96d2cce8784bc6e560f4fcf746a30973029569a191807b564cd0a493999ffa7baf81b8820435c82db4cdfb04eebdca1fea0d8dd757d0590c1b65c
-
SSDEEP
6144:6uW+M387hDdxhZykOR3NmQ737S63BxJvV3UhXJ:6uWx38N5qR3X7rHtk
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation cd6d1fc1e1c7aa4e7059db17fcda574632144dc259e74ec6d93af7998daf8fe1.exe -
Executes dropped EXE 1 IoCs
pid Process 4320 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" cd6d1fc1e1c7aa4e7059db17fcda574632144dc259e74ec6d93af7998daf8fe1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3580 4644 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4644 wrote to memory of 4320 4644 cd6d1fc1e1c7aa4e7059db17fcda574632144dc259e74ec6d93af7998daf8fe1.exe 89 PID 4644 wrote to memory of 4320 4644 cd6d1fc1e1c7aa4e7059db17fcda574632144dc259e74ec6d93af7998daf8fe1.exe 89 PID 4644 wrote to memory of 4320 4644 cd6d1fc1e1c7aa4e7059db17fcda574632144dc259e74ec6d93af7998daf8fe1.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd6d1fc1e1c7aa4e7059db17fcda574632144dc259e74ec6d93af7998daf8fe1.exe"C:\Users\Admin\AppData\Local\Temp\cd6d1fc1e1c7aa4e7059db17fcda574632144dc259e74ec6d93af7998daf8fe1.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
PID:4320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 8962⤵
- Program crash
PID:3580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4644 -ip 46441⤵PID:4660
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
807.2MB
MD54709ee449472f645a891a3b24f601ce7
SHA18d6a8441b05862bde0b745b46646597522234ee9
SHA2565ab61cbd84fe0c9bb1f22a84badf6e74d51d914d3e8fcba30746537586dee502
SHA512c019d8d2fe511600d9e3ab8d1cd0cb3df10970a86828bbd5d80b96601b39b2956fa34b2c82092121acc19300d6977b06a5d989a657297df2967d0a0c5af012e0
-
Filesize
807.2MB
MD54709ee449472f645a891a3b24f601ce7
SHA18d6a8441b05862bde0b745b46646597522234ee9
SHA2565ab61cbd84fe0c9bb1f22a84badf6e74d51d914d3e8fcba30746537586dee502
SHA512c019d8d2fe511600d9e3ab8d1cd0cb3df10970a86828bbd5d80b96601b39b2956fa34b2c82092121acc19300d6977b06a5d989a657297df2967d0a0c5af012e0
-
Filesize
728.2MB
MD549e74dd2229cabc6bd5e216ffef070f3
SHA151c1345910674b229375475d53342bb53b5dca4f
SHA256c7b5dc9d151471dec7fd01710e51743d8794a018d604476d66ae4b6809184a09
SHA5124e0ae93ab35fdcc51b9632d160c6d628882702b629c2f7076eca15d9b2c104eecc4d1303977e173415cb9e3c07c8cd9f197bf3102ef5907065462ceaff4db492