Analysis
-
max time kernel
144s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
17-03-2023 06:18
Static task
static1
Behavioral task
behavioral1
Sample
505123037badf414d1ba076f33305d663708013fe47eff1216fdb7a06c62c394.exe
Resource
win10-20230220-en
General
-
Target
505123037badf414d1ba076f33305d663708013fe47eff1216fdb7a06c62c394.exe
-
Size
361KB
-
MD5
1b4c0e1be6994802be38f50ae5e24608
-
SHA1
b9712764777858621b9cd6a756e12756ecb7e80e
-
SHA256
505123037badf414d1ba076f33305d663708013fe47eff1216fdb7a06c62c394
-
SHA512
7632dbefce3c1206f5f7857c6aee5cc13c225c66e0a42928c9d478dc03ee166e2a28dce4bdb2d308eb43babdb65b34597ab5597273ffeb87d8dd594deb932a97
-
SSDEEP
6144:VV44B8LHfTR2Zk9vk09dH0g3KL0jxwvDtWmFDHv:Vy4B87igk0zeIjxwbw
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2432 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" 505123037badf414d1ba076f33305d663708013fe47eff1216fdb7a06c62c394.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2432 1736 505123037badf414d1ba076f33305d663708013fe47eff1216fdb7a06c62c394.exe 66 PID 1736 wrote to memory of 2432 1736 505123037badf414d1ba076f33305d663708013fe47eff1216fdb7a06c62c394.exe 66 PID 1736 wrote to memory of 2432 1736 505123037badf414d1ba076f33305d663708013fe47eff1216fdb7a06c62c394.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\505123037badf414d1ba076f33305d663708013fe47eff1216fdb7a06c62c394.exe"C:\Users\Admin\AppData\Local\Temp\505123037badf414d1ba076f33305d663708013fe47eff1216fdb7a06c62c394.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
PID:2432
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
768.4MB
MD5c7c5b0390d5245feff7975ef71cd2b84
SHA106052996fe24780026ad1d4a57138f1695ddbb03
SHA2566713f86c8903dfd701179f8653f8753c4fd3297a6540181621163d54221c1221
SHA512f94f3c338238cecd33ac903bdb252d7630ff121e58f5bbaa6f5d9007f9cb91a621c730f8fd98e549f77c17cd7a03727fa43fa42962d8e8b1e0fdc2eb4cd7c808
-
Filesize
768.4MB
MD5c7c5b0390d5245feff7975ef71cd2b84
SHA106052996fe24780026ad1d4a57138f1695ddbb03
SHA2566713f86c8903dfd701179f8653f8753c4fd3297a6540181621163d54221c1221
SHA512f94f3c338238cecd33ac903bdb252d7630ff121e58f5bbaa6f5d9007f9cb91a621c730f8fd98e549f77c17cd7a03727fa43fa42962d8e8b1e0fdc2eb4cd7c808