Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17-03-2023 00:01
Static task
static1
Behavioral task
behavioral1
Sample
49a034d696051ab364c8c1177fa8735ccb8d0d86f1fbe179c9b38d1a03179a03.exe
Resource
win10v2004-20230220-en
General
-
Target
49a034d696051ab364c8c1177fa8735ccb8d0d86f1fbe179c9b38d1a03179a03.exe
-
Size
245KB
-
MD5
30f7058b33153308eded89d74432d916
-
SHA1
3a93278bbdf4c5ebc7ab5c78b1d46cccd4c5df9d
-
SHA256
49a034d696051ab364c8c1177fa8735ccb8d0d86f1fbe179c9b38d1a03179a03
-
SHA512
005f6e4b1735d08721f800be381aa093670b4e853cd863618136f8c0b67a5b6607554c18f7be1bfb52b5265642f865b0ff1ae05ecbdaf6ed8c8ecd18545a58e8
-
SSDEEP
6144:vi0aPmhJNbTno8TPY3pUCVDfujJzRHhGMJ:vi0a2JNbTo87gpUCUJ54
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 49a034d696051ab364c8c1177fa8735ccb8d0d86f1fbe179c9b38d1a03179a03.exe -
Executes dropped EXE 1 IoCs
pid Process 3108 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" 49a034d696051ab364c8c1177fa8735ccb8d0d86f1fbe179c9b38d1a03179a03.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4568 3712 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3712 wrote to memory of 3108 3712 49a034d696051ab364c8c1177fa8735ccb8d0d86f1fbe179c9b38d1a03179a03.exe 88 PID 3712 wrote to memory of 3108 3712 49a034d696051ab364c8c1177fa8735ccb8d0d86f1fbe179c9b38d1a03179a03.exe 88 PID 3712 wrote to memory of 3108 3712 49a034d696051ab364c8c1177fa8735ccb8d0d86f1fbe179c9b38d1a03179a03.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\49a034d696051ab364c8c1177fa8735ccb8d0d86f1fbe179c9b38d1a03179a03.exe"C:\Users\Admin\AppData\Local\Temp\49a034d696051ab364c8c1177fa8735ccb8d0d86f1fbe179c9b38d1a03179a03.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
PID:3108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 11122⤵
- Program crash
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3712 -ip 37121⤵PID:860
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704.2MB
MD5ee733495483bcd1b32df3828e3652ccb
SHA1488374fba72a5ae1352c29e70a6afaf16a8c8135
SHA2567e64728ac1d3592098d120796d391900bf5ab28d70db353d1b579fed93d6f497
SHA512354530599a17113cce0120954fa0f63dd9abb4ca049d7cd5eaf641539d1e45bd13508e565dcd566873686693aac3bf267de72cb8e9ce4d1947d96e618d27d9c0
-
Filesize
704.2MB
MD5ee733495483bcd1b32df3828e3652ccb
SHA1488374fba72a5ae1352c29e70a6afaf16a8c8135
SHA2567e64728ac1d3592098d120796d391900bf5ab28d70db353d1b579fed93d6f497
SHA512354530599a17113cce0120954fa0f63dd9abb4ca049d7cd5eaf641539d1e45bd13508e565dcd566873686693aac3bf267de72cb8e9ce4d1947d96e618d27d9c0
-
Filesize
704.2MB
MD5ee733495483bcd1b32df3828e3652ccb
SHA1488374fba72a5ae1352c29e70a6afaf16a8c8135
SHA2567e64728ac1d3592098d120796d391900bf5ab28d70db353d1b579fed93d6f497
SHA512354530599a17113cce0120954fa0f63dd9abb4ca049d7cd5eaf641539d1e45bd13508e565dcd566873686693aac3bf267de72cb8e9ce4d1947d96e618d27d9c0