Analysis
-
max time kernel
147s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-03-2023 03:18
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
245KB
-
MD5
ddd3ef96054200d60d04934492a3d672
-
SHA1
8ac32d858e32f27cccec6a8896b234affa1873ba
-
SHA256
c66e87a025b4ccb8f93a1540b999fabf9beb16c455cbbfd189e133ab642e83e2
-
SHA512
e11f8936df9c2b1e8a265ac80b2b24693f161e678d1af8902bfc745fcf013c044837d4d401227734c49e00b0d5b6d5dd512873fc6c8d25cf3b13099f095209ab
-
SSDEEP
6144:abfmvxMcnAkScaBd5COlRbsQOGdAtqhdCJ:abfmvCcPSc8dsaNssBf
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2032 svcservice.exe -
Loads dropped DLL 2 IoCs
pid Process 884 file.exe 884 file.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 884 wrote to memory of 2032 884 file.exe 26 PID 884 wrote to memory of 2032 884 file.exe 26 PID 884 wrote to memory of 2032 884 file.exe 26 PID 884 wrote to memory of 2032 884 file.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
PID:2032
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
413.6MB
MD5a3653dad4745069cc3c1c512d3f192b6
SHA14b45cb4d3a681e115505e5e0e0c4da007a705b77
SHA256ac89a1e3b6e869986f3ad53955b41eb48f88ab22f7d6ab7bc0c289163069cba9
SHA512bf266baec82b92f3d1e15534851a7d7474526b891fc8b5a034eeec66c629031070dfc2206c96835802164f6b5c6bf61399ef353b5a6104294143cb0371710880
-
Filesize
415.9MB
MD5f46e1ab1fea0fe298a53cfd3e0739284
SHA1bd9309af174f76986ad54fb223f261a96f13c205
SHA256f3dc4cbae5d2a124328b21da5f83f9fa28b11ed5759f9f0daa31cac148fd395c
SHA512574b113209c4db6b144f83673fa767d35eeb8b74391efb679ba705107cefb56c5359f391e62bfe505d4fd25ffe8d2259340db3cddf7c4cd4c09e6bab59f1fd49
-
Filesize
412.2MB
MD58621c508537b1260efa09f61b08d1ea4
SHA1adf5207876cd7c362ea066647504751da92dfbbd
SHA256a221b9d4a19b4dd75534f7fa672d328ecf0790c17ad1b5556e18ef136ed5e874
SHA512abd8081caad418bfac952c1f022438beb38f9123e9cd17a337db7a6c42cceb1915a0e3ca95f938b48bf3dd8a6e1742cd80a12498cdb660900a8a7ba617583911
-
Filesize
423.7MB
MD5417becf815e8690a67cae3950abcd478
SHA16d3f7f7ec6ba591a0d7facd0ded47d6969a6b38d
SHA256b370139dba2fbb30c67b3305dfbb522de52e6b2e44ec4c24308919246b79a7aa
SHA5129d1126c783241948a234990079a6c34911db52b79171a771ad0c520ac7f79f4659c5aa8a2c569b36d9974dfd9b6329c653fbd0de66062c92e2850698b10343b9