Overview
overview
10Static
static
1add_attack.zip
windows7-x64
9add_attack.zip
windows10-2004-x64
10add_attack/Slava.exe
windows7-x64
7add_attack/Slava.exe
windows10-2004-x64
7add_attack...AC.exe
windows7-x64
7add_attack...AC.exe
windows10-2004-x64
7add_attack/goland.exe
windows7-x64
9add_attack/goland.exe
windows10-2004-x64
9add_attack/neee.exe
windows7-x64
10add_attack/neee.exe
windows10-2004-x64
10Analysis
-
max time kernel
574s -
max time network
579s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-es -
resource tags
arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
19-03-2023 14:15
Static task
static1
Behavioral task
behavioral1
Sample
add_attack.zip
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
add_attack.zip
Resource
win10v2004-20230220-es
Behavioral task
behavioral3
Sample
add_attack/Slava.exe
Resource
win7-20230220-es
Behavioral task
behavioral4
Sample
add_attack/Slava.exe
Resource
win10v2004-20230220-es
Behavioral task
behavioral5
Sample
add_attack/cockkieeAC.exe
Resource
win7-20230220-es
Behavioral task
behavioral6
Sample
add_attack/cockkieeAC.exe
Resource
win10v2004-20230220-es
Behavioral task
behavioral7
Sample
add_attack/goland.exe
Resource
win7-20230220-es
Behavioral task
behavioral8
Sample
add_attack/goland.exe
Resource
win10v2004-20230220-es
Behavioral task
behavioral9
Sample
add_attack/neee.exe
Resource
win7-20230220-es
Behavioral task
behavioral10
Sample
add_attack/neee.exe
Resource
win10v2004-20230220-es
General
-
Target
add_attack/neee.exe
-
Size
7.3MB
-
MD5
99f16ab6ab670935b5aa5c84b1b5f6bd
-
SHA1
59f375481cdfe246d1ddcaada9941e16dcfda297
-
SHA256
348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057
-
SHA512
845e76e29adb6b7890a3a5c508e27b9731e9872bc791eeefb146b23e0e737280d19e4df1203b719f8e168a8c8a0d8ae1b4bf670da5d264bde1eece8663624d70
-
SSDEEP
196608:Ltu5ODXM16mjmKSRFWuxx6ruj3nK/x9jWuy:L05ODcgR6mix1
Malware Config
Extracted
laplas
http://185.106.92.104
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation neee.exe -
Executes dropped EXE 1 IoCs
pid Process 60 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" neee.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1648 neee.exe 1648 neee.exe 60 svcservice.exe 60 svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1648 neee.exe 1648 neee.exe 60 svcservice.exe 60 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1648 wrote to memory of 60 1648 neee.exe 85 PID 1648 wrote to memory of 60 1648 neee.exe 85 PID 1648 wrote to memory of 60 1648 neee.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\add_attack\neee.exe"C:\Users\Admin\AppData\Local\Temp\add_attack\neee.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:60
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5444bcb3a3fcf8389296c49467f27e1d6
SHA17a85f4764bbd6daf1c3545efbbf0f279a6dc0beb
SHA2562689367b205c16ce32ed4200942b8b8b1e262dfc70d9bc9fbc77c49699a4f1df
SHA5129fbbbb5a0f329f9782e2356fa41d89cf9b3694327c1a934d6af2a9df2d7f936ce83717fb513196a4ce5548471708cd7134c2ae99b3c357bcabb2eafc7b9b7570
-
Filesize
633B
MD5c5298d2c78be8fdfc264eb6fe3e275f8
SHA1f09de5f443da081efaff0155f422ca0375edd164
SHA256de32b3c0549fde0dc5ac435a89f16a87832a0632b6602e75f552d07074081577
SHA5125aeb5013b00e13cd8a172639bc7c675bd06cc0473ae9844c9c324e5c322987ddeff986bd4a8e620ce0ca9d1098a3ee8bbb4802789d1e89b0ec0cecf2f55a4853
-
Filesize
766.3MB
MD51bce8a7c9ba30ea7713af903b858bb9f
SHA19c3661b880a5292476e1a7f099d849e9ad6e1449
SHA25698adb0c05412e3070978488d1a77c613daf07d2c3b59519adc82b58a60bad39a
SHA512425773a0be0410fc28058aa0fd665a5cf3d44fc083bafb6ff8c3ce5d08103878b20d4355d7b24d16d86286deeeede05f282e603544af0dc5712d5958219d61f1
-
Filesize
766.3MB
MD51bce8a7c9ba30ea7713af903b858bb9f
SHA19c3661b880a5292476e1a7f099d849e9ad6e1449
SHA25698adb0c05412e3070978488d1a77c613daf07d2c3b59519adc82b58a60bad39a
SHA512425773a0be0410fc28058aa0fd665a5cf3d44fc083bafb6ff8c3ce5d08103878b20d4355d7b24d16d86286deeeede05f282e603544af0dc5712d5958219d61f1
-
Filesize
766.3MB
MD51bce8a7c9ba30ea7713af903b858bb9f
SHA19c3661b880a5292476e1a7f099d849e9ad6e1449
SHA25698adb0c05412e3070978488d1a77c613daf07d2c3b59519adc82b58a60bad39a
SHA512425773a0be0410fc28058aa0fd665a5cf3d44fc083bafb6ff8c3ce5d08103878b20d4355d7b24d16d86286deeeede05f282e603544af0dc5712d5958219d61f1