Overview
overview
10Static
static
1add_attack.zip
windows7-x64
9add_attack.zip
windows10-2004-x64
10add_attack/Slava.exe
windows7-x64
7add_attack/Slava.exe
windows10-2004-x64
7add_attack...AC.exe
windows7-x64
7add_attack...AC.exe
windows10-2004-x64
7add_attack/goland.exe
windows7-x64
9add_attack/goland.exe
windows10-2004-x64
9add_attack/neee.exe
windows7-x64
10add_attack/neee.exe
windows10-2004-x64
10Analysis
-
max time kernel
562s -
max time network
568s -
platform
windows7_x64 -
resource
win7-20230220-es -
resource tags
arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows -
submitted
19-03-2023 14:15
Static task
static1
Behavioral task
behavioral1
Sample
add_attack.zip
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
add_attack.zip
Resource
win10v2004-20230220-es
Behavioral task
behavioral3
Sample
add_attack/Slava.exe
Resource
win7-20230220-es
Behavioral task
behavioral4
Sample
add_attack/Slava.exe
Resource
win10v2004-20230220-es
Behavioral task
behavioral5
Sample
add_attack/cockkieeAC.exe
Resource
win7-20230220-es
Behavioral task
behavioral6
Sample
add_attack/cockkieeAC.exe
Resource
win10v2004-20230220-es
Behavioral task
behavioral7
Sample
add_attack/goland.exe
Resource
win7-20230220-es
Behavioral task
behavioral8
Sample
add_attack/goland.exe
Resource
win10v2004-20230220-es
Behavioral task
behavioral9
Sample
add_attack/neee.exe
Resource
win7-20230220-es
Behavioral task
behavioral10
Sample
add_attack/neee.exe
Resource
win10v2004-20230220-es
General
-
Target
add_attack/neee.exe
-
Size
7.3MB
-
MD5
99f16ab6ab670935b5aa5c84b1b5f6bd
-
SHA1
59f375481cdfe246d1ddcaada9941e16dcfda297
-
SHA256
348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057
-
SHA512
845e76e29adb6b7890a3a5c508e27b9731e9872bc791eeefb146b23e0e737280d19e4df1203b719f8e168a8c8a0d8ae1b4bf670da5d264bde1eece8663624d70
-
SSDEEP
196608:Ltu5ODXM16mjmKSRFWuxx6ruj3nK/x9jWuy:L05ODcgR6mix1
Malware Config
Extracted
laplas
http://185.106.92.104
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1712 svcservice.exe -
Loads dropped DLL 1 IoCs
pid Process 680 neee.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" neee.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 680 neee.exe 680 neee.exe 1712 svcservice.exe 1712 svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 680 neee.exe 1712 svcservice.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 680 wrote to memory of 1712 680 neee.exe 28 PID 680 wrote to memory of 1712 680 neee.exe 28 PID 680 wrote to memory of 1712 680 neee.exe 28 PID 680 wrote to memory of 1712 680 neee.exe 28 PID 680 wrote to memory of 1712 680 neee.exe 28 PID 680 wrote to memory of 1712 680 neee.exe 28 PID 680 wrote to memory of 1712 680 neee.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\add_attack\neee.exe"C:\Users\Admin\AppData\Local\Temp\add_attack\neee.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CMIDRLTB\regex[2].txt
Filesize633B
MD5c5298d2c78be8fdfc264eb6fe3e275f8
SHA1f09de5f443da081efaff0155f422ca0375edd164
SHA256de32b3c0549fde0dc5ac435a89f16a87832a0632b6602e75f552d07074081577
SHA5125aeb5013b00e13cd8a172639bc7c675bd06cc0473ae9844c9c324e5c322987ddeff986bd4a8e620ce0ca9d1098a3ee8bbb4802789d1e89b0ec0cecf2f55a4853
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UOYUJSME\online[2].txt
Filesize2B
MD5444bcb3a3fcf8389296c49467f27e1d6
SHA17a85f4764bbd6daf1c3545efbbf0f279a6dc0beb
SHA2562689367b205c16ce32ed4200942b8b8b1e262dfc70d9bc9fbc77c49699a4f1df
SHA5129fbbbb5a0f329f9782e2356fa41d89cf9b3694327c1a934d6af2a9df2d7f936ce83717fb513196a4ce5548471708cd7134c2ae99b3c357bcabb2eafc7b9b7570
-
Filesize
757.3MB
MD5156fa53cb7419d10c9d4a7ab940f21ca
SHA1559543412106377d3ff9a872e39b66d38ca88095
SHA256531a3e0079e6faf3289b92a2edcd824faf93f8c285c27f6140e0801959c44d43
SHA5125f88ed349d51bfb52108e46f111d159ace438712edf34b601072cf4ed0aec1ab52fc3419380bab822a62523b00b25749e8e877f30a6471fedb9c861a45e6736c
-
Filesize
757.3MB
MD5156fa53cb7419d10c9d4a7ab940f21ca
SHA1559543412106377d3ff9a872e39b66d38ca88095
SHA256531a3e0079e6faf3289b92a2edcd824faf93f8c285c27f6140e0801959c44d43
SHA5125f88ed349d51bfb52108e46f111d159ace438712edf34b601072cf4ed0aec1ab52fc3419380bab822a62523b00b25749e8e877f30a6471fedb9c861a45e6736c
-
Filesize
757.3MB
MD5156fa53cb7419d10c9d4a7ab940f21ca
SHA1559543412106377d3ff9a872e39b66d38ca88095
SHA256531a3e0079e6faf3289b92a2edcd824faf93f8c285c27f6140e0801959c44d43
SHA5125f88ed349d51bfb52108e46f111d159ace438712edf34b601072cf4ed0aec1ab52fc3419380bab822a62523b00b25749e8e877f30a6471fedb9c861a45e6736c