Analysis
-
max time kernel
515s -
max time network
518s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-es -
resource tags
arch:x64arch:x86image:win10v2004-20230221-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
19-03-2023 14:14
Static task
static1
Behavioral task
behavioral1
Sample
Git2.zip
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
Git2.zip
Resource
win10v2004-20230220-es
Behavioral task
behavioral3
Sample
Git2/GUI_MODERNISTA.exe
Resource
win7-20230220-es
Behavioral task
behavioral4
Sample
Git2/GUI_MODERNISTA.exe
Resource
win10v2004-20230220-es
Behavioral task
behavioral5
Sample
Git2/clifdthjsjkdgaoker.exe
Resource
win7-20230220-es
Behavioral task
behavioral6
Sample
Git2/clifdthjsjkdgaoker.exe
Resource
win10v2004-20230221-es
Behavioral task
behavioral7
Sample
Git2/sdfsdfs.exe
Resource
win7-20230220-es
General
-
Target
Git2/clifdthjsjkdgaoker.exe
-
Size
7.5MB
-
MD5
fb0deff37fe12bbc4f0c1fe21e2d15ef
-
SHA1
180325b8b6e64638e167601c67cd9c53331ba9f6
-
SHA256
ece100b8240f7eb032cb319a019eba1552ac19f563a291cf8422b1090ccf9b76
-
SHA512
9fc013111994e943fd800abeb543563713eebebcd940b28973809a40d85271f0ed781dd95ca508e55788de2e2a575b1cb8734636f15b51a9d68f773b2cb4e73d
-
SSDEEP
196608:bdj1WcTeKCVpVAKegYv6Pvz7xCVfQeYDprOtpN6x1Cd:RReKaAlRgxMfvihOwxy
Malware Config
Extracted
laplas
http://185.174.137.94
-
api_key
b54641cc29f95948635d659de94166b4528e39706396a99bb9c54497b2ee3421
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation clifdthjsjkdgaoker.exe -
Executes dropped EXE 1 IoCs
pid Process 3852 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" clifdthjsjkdgaoker.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2368 clifdthjsjkdgaoker.exe 2368 clifdthjsjkdgaoker.exe 3852 svcservice.exe 3852 svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2368 clifdthjsjkdgaoker.exe 2368 clifdthjsjkdgaoker.exe 2368 clifdthjsjkdgaoker.exe 2368 clifdthjsjkdgaoker.exe 3852 svcservice.exe 3852 svcservice.exe 3852 svcservice.exe 3852 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2368 wrote to memory of 3852 2368 clifdthjsjkdgaoker.exe 96 PID 2368 wrote to memory of 3852 2368 clifdthjsjkdgaoker.exe 96 PID 2368 wrote to memory of 3852 2368 clifdthjsjkdgaoker.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Git2\clifdthjsjkdgaoker.exe"C:\Users\Admin\AppData\Local\Temp\Git2\clifdthjsjkdgaoker.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5444bcb3a3fcf8389296c49467f27e1d6
SHA17a85f4764bbd6daf1c3545efbbf0f279a6dc0beb
SHA2562689367b205c16ce32ed4200942b8b8b1e262dfc70d9bc9fbc77c49699a4f1df
SHA5129fbbbb5a0f329f9782e2356fa41d89cf9b3694327c1a934d6af2a9df2d7f936ce83717fb513196a4ce5548471708cd7134c2ae99b3c357bcabb2eafc7b9b7570
-
Filesize
633B
MD5c5298d2c78be8fdfc264eb6fe3e275f8
SHA1f09de5f443da081efaff0155f422ca0375edd164
SHA256de32b3c0549fde0dc5ac435a89f16a87832a0632b6602e75f552d07074081577
SHA5125aeb5013b00e13cd8a172639bc7c675bd06cc0473ae9844c9c324e5c322987ddeff986bd4a8e620ce0ca9d1098a3ee8bbb4802789d1e89b0ec0cecf2f55a4853
-
Filesize
796.5MB
MD5f008279b51ce867ac4c6746b31053fd3
SHA1a12302e5545aca155c995c4971666cebaf972b7c
SHA256a5ef0f84de3a36bd4d911d34fa1ceefd2eaab150b9747efeffe3cf3b53bab473
SHA5120197fa09f0f2b30a062900b492c5533fa345667feca308b9d6561fb5ecf70a0bf3d3e9550f7d38568011870fceee78252c9ddc2def8858815bceba0678a3953c
-
Filesize
796.5MB
MD5f008279b51ce867ac4c6746b31053fd3
SHA1a12302e5545aca155c995c4971666cebaf972b7c
SHA256a5ef0f84de3a36bd4d911d34fa1ceefd2eaab150b9747efeffe3cf3b53bab473
SHA5120197fa09f0f2b30a062900b492c5533fa345667feca308b9d6561fb5ecf70a0bf3d3e9550f7d38568011870fceee78252c9ddc2def8858815bceba0678a3953c
-
Filesize
796.5MB
MD5f008279b51ce867ac4c6746b31053fd3
SHA1a12302e5545aca155c995c4971666cebaf972b7c
SHA256a5ef0f84de3a36bd4d911d34fa1ceefd2eaab150b9747efeffe3cf3b53bab473
SHA5120197fa09f0f2b30a062900b492c5533fa345667feca308b9d6561fb5ecf70a0bf3d3e9550f7d38568011870fceee78252c9ddc2def8858815bceba0678a3953c