Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17-03-2023 03:13
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20230220-en
General
-
Target
sample.exe
-
Size
245KB
-
MD5
83554c48c989188a5483b8cac98bd4ee
-
SHA1
1a09f227dd35b01abb2a0318fa4b1dd74349ea13
-
SHA256
7ea5061e9ebeb45f7ef962d1566d74fdbfdaf81cfff399d22aeb1605e2501f11
-
SHA512
f452875d2eb14c6a9f8124d7ba39a173532d038c0a95e89828fe624577a1a7a3b2547e262c8136450ebf337700ed74522e57c48c7b63988df8272ebbe446be22
-
SSDEEP
6144:VbfmTinRvgDPVY7Rae8Vkpv9qmo3hLhJ:VbfmGnZgJYqVNB9
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation sample.exe -
Executes dropped EXE 1 IoCs
pid Process 1252 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" sample.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3876 448 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 448 wrote to memory of 1252 448 sample.exe 86 PID 448 wrote to memory of 1252 448 sample.exe 86 PID 448 wrote to memory of 1252 448 sample.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
PID:1252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 12442⤵
- Program crash
PID:3876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 448 -ip 4481⤵PID:4748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
791.2MB
MD5cbe110e6acdc3e3a1fdb34b54ba7f619
SHA1b8d3481e6b164d9fb1bcef7f468eafff80e9bf9c
SHA256aeb9b249ef03f161a3736620971227c74a3cbdffd4d6debb61ada1972da3c490
SHA512338a717238a5958a48ddd313a80f4bba812d94d14bcab690fef71f85ade9be73ee221d09b5cc89e7b222d09df07fb5b6aa49fedb32d5b294ba98f61bd4278579
-
Filesize
791.2MB
MD5cbe110e6acdc3e3a1fdb34b54ba7f619
SHA1b8d3481e6b164d9fb1bcef7f468eafff80e9bf9c
SHA256aeb9b249ef03f161a3736620971227c74a3cbdffd4d6debb61ada1972da3c490
SHA512338a717238a5958a48ddd313a80f4bba812d94d14bcab690fef71f85ade9be73ee221d09b5cc89e7b222d09df07fb5b6aa49fedb32d5b294ba98f61bd4278579
-
Filesize
791.2MB
MD5cbe110e6acdc3e3a1fdb34b54ba7f619
SHA1b8d3481e6b164d9fb1bcef7f468eafff80e9bf9c
SHA256aeb9b249ef03f161a3736620971227c74a3cbdffd4d6debb61ada1972da3c490
SHA512338a717238a5958a48ddd313a80f4bba812d94d14bcab690fef71f85ade9be73ee221d09b5cc89e7b222d09df07fb5b6aa49fedb32d5b294ba98f61bd4278579