Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17-03-2023 01:04
Static task
static1
Behavioral task
behavioral1
Sample
c66e87a025b4ccb8f93a1540b999fabf9beb16c455cbbfd189e133ab642e83e2.exe
Resource
win10v2004-20230220-en
General
-
Target
c66e87a025b4ccb8f93a1540b999fabf9beb16c455cbbfd189e133ab642e83e2.exe
-
Size
245KB
-
MD5
ddd3ef96054200d60d04934492a3d672
-
SHA1
8ac32d858e32f27cccec6a8896b234affa1873ba
-
SHA256
c66e87a025b4ccb8f93a1540b999fabf9beb16c455cbbfd189e133ab642e83e2
-
SHA512
e11f8936df9c2b1e8a265ac80b2b24693f161e678d1af8902bfc745fcf013c044837d4d401227734c49e00b0d5b6d5dd512873fc6c8d25cf3b13099f095209ab
-
SSDEEP
6144:abfmvxMcnAkScaBd5COlRbsQOGdAtqhdCJ:abfmvCcPSc8dsaNssBf
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation c66e87a025b4ccb8f93a1540b999fabf9beb16c455cbbfd189e133ab642e83e2.exe -
Executes dropped EXE 1 IoCs
pid Process 4824 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" c66e87a025b4ccb8f93a1540b999fabf9beb16c455cbbfd189e133ab642e83e2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4944 2376 WerFault.exe 87 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2376 wrote to memory of 4824 2376 c66e87a025b4ccb8f93a1540b999fabf9beb16c455cbbfd189e133ab642e83e2.exe 91 PID 2376 wrote to memory of 4824 2376 c66e87a025b4ccb8f93a1540b999fabf9beb16c455cbbfd189e133ab642e83e2.exe 91 PID 2376 wrote to memory of 4824 2376 c66e87a025b4ccb8f93a1540b999fabf9beb16c455cbbfd189e133ab642e83e2.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c66e87a025b4ccb8f93a1540b999fabf9beb16c455cbbfd189e133ab642e83e2.exe"C:\Users\Admin\AppData\Local\Temp\c66e87a025b4ccb8f93a1540b999fabf9beb16c455cbbfd189e133ab642e83e2.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 8722⤵
- Program crash
PID:4944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2376 -ip 23761⤵PID:4696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
689.7MB
MD507530db479a6eae16a60541a5ba44060
SHA137a9a5db7cf3fcbca3f9b4577d720459ac11d9ed
SHA256ec3f5aaeffa7a360603c63de47394f1f25e6296ebfd3076a5da160db5e3ebdb5
SHA5120b1904dbd438616d35618efcf221922611300b75798fd36b69957fb4dc6d08c7a3a8cbfa9e9086c0d2d54b00d8bb205969d22234d092b49a2ae8b0d590ae986c
-
Filesize
597.6MB
MD554417d85435a3e1433fb3b0bd006563f
SHA1477c940ce7d2186cdf7d2f4fd03be46402122fb7
SHA256a63e1ebe77119cbf3982378bcb6ad683ca1baa6700b4f539bb8daa51ca943bdf
SHA512f69e145de7aab1f44e309f03bf2bba8947762f855552f0bafdd0d048aef6baef121fccec440e6ea650a773a556cc1d909c890e4b2e669c94f473039ccf1991b3
-
Filesize
580.9MB
MD52389d5203da00cb54028aa71678220d8
SHA1b9909c2655df4c98b071a12329a6ca2ef4bcdd89
SHA256d52e8ca18b5f0c2de3b038f1d36388edc70e5330fb20861ed1d675bd3cde80ec
SHA512af160d424aa23e2b1d31b1d074d25294c0b93f8ad2282eebd1bb742073822650c936c548458dc3635ec189d7e5186d2d115e1e9ffce33553fc814044eca0b055