Analysis
-
max time kernel
146s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-03-2023 03:13
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20230220-en
General
-
Target
sample.exe
-
Size
245KB
-
MD5
83554c48c989188a5483b8cac98bd4ee
-
SHA1
1a09f227dd35b01abb2a0318fa4b1dd74349ea13
-
SHA256
7ea5061e9ebeb45f7ef962d1566d74fdbfdaf81cfff399d22aeb1605e2501f11
-
SHA512
f452875d2eb14c6a9f8124d7ba39a173532d038c0a95e89828fe624577a1a7a3b2547e262c8136450ebf337700ed74522e57c48c7b63988df8272ebbe446be22
-
SSDEEP
6144:VbfmTinRvgDPVY7Rae8Vkpv9qmo3hLhJ:VbfmGnZgJYqVNB9
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1532 svcservice.exe -
Loads dropped DLL 2 IoCs
pid Process 1696 sample.exe 1696 sample.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" sample.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1532 1696 sample.exe 28 PID 1696 wrote to memory of 1532 1696 sample.exe 28 PID 1696 wrote to memory of 1532 1696 sample.exe 28 PID 1696 wrote to memory of 1532 1696 sample.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
PID:1532
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
655.9MB
MD5242ec57d753aa3adb4c85264a7a6ab99
SHA18213fac9289418038c9d27b0fbabd161bc3b65f6
SHA2567b0fafb6dd2f0aba1be023caf3044620f96d0b715c189bbc95b7bb85a708a79b
SHA51298ac195cbe3274ee4a296cf9f79747b66a7a01a5e9f78f9a17389e36afe6576d6f9df8afa684f86c728b039c3622b8b0016793ed675e3197837137d7e7ce97d6
-
Filesize
594.1MB
MD5d75de01fdee903c1e9e58d7910c8c2e8
SHA1ce2851017fe6f7d622daa01b3e49cbf3778161c3
SHA25607b601d8bf0068555618ef33ac8a40d1949699f4fd0607e22fa25c005032d487
SHA5128f6b3d7acca9feeccf891aeadd3ceb785f95f051408423384fb28f39510dcdecf83423bde5d4d18d9bf18cbef45b24d6feeb9d7d5bf97cc2e157d6533ba28bf6
-
Filesize
496.5MB
MD5037e983b51b59d5ed0f6b8ffc05a960e
SHA164ec27e6d504f2c5142090e8740fae62de37c049
SHA2565fbd34ab9d4fb143e3593f7cdaa4b37d8d8343885e69029a301aff6317de2985
SHA512bb0995dab72a2664570503d5e0ce8d21c7f7975f52753e4091007dffbd69eedf7625210814ea5808d1b83e24859f8038547c1a9c2110c9ab592b8196a3417f7d
-
Filesize
580.5MB
MD588b7141df5418a264bd21921de0fe6c8
SHA1f6a0cb5bbfd9b90b2a8f4ff66faf3d6b9a9571a8
SHA2568330dfb18ef8657db292d6ea8d0d305aa0a0219181729e92f2e35b4939ce3dc9
SHA5126c1ca31a7b85fe85dc0aca291ed39b7d4b498ec8e1a53e143a0abc52aff34df3674ed77ed30ad064050a2e8431851f7aaf1956e63fccec7235cbaa9249dece16