Analysis
-
max time kernel
139s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-03-2023 20:10
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
7.3MB
-
MD5
99f16ab6ab670935b5aa5c84b1b5f6bd
-
SHA1
59f375481cdfe246d1ddcaada9941e16dcfda297
-
SHA256
348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057
-
SHA512
845e76e29adb6b7890a3a5c508e27b9731e9872bc791eeefb146b23e0e737280d19e4df1203b719f8e168a8c8a0d8ae1b4bf670da5d264bde1eece8663624d70
-
SSDEEP
196608:Ltu5ODXM16mjmKSRFWuxx6ruj3nK/x9jWuy:L05ODcgR6mix1
Malware Config
Extracted
laplas
http://185.106.92.104
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2000 svcservice.exe -
Loads dropped DLL 1 IoCs
pid Process 1224 tmp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" tmp.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1224 tmp.exe 1224 tmp.exe 2000 svcservice.exe 2000 svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1224 tmp.exe 2000 svcservice.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2000 1224 tmp.exe 28 PID 1224 wrote to memory of 2000 1224 tmp.exe 28 PID 1224 wrote to memory of 2000 1224 tmp.exe 28 PID 1224 wrote to memory of 2000 1224 tmp.exe 28 PID 1224 wrote to memory of 2000 1224 tmp.exe 28 PID 1224 wrote to memory of 2000 1224 tmp.exe 28 PID 1224 wrote to memory of 2000 1224 tmp.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2000
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
788.3MB
MD57d389c6c58b025a922f9add42240eaf7
SHA19a41fd27f7ed9d794446c24967584a1855bdf3d4
SHA2569d28129db470f21df647fb532514029c6f60633c36620b9a518bc272287ff405
SHA512c572192caec8c8e0ef3a2f0ad7f8109f478e36af075bba83a3f18fa23c0f3c707c8a79a0c600ca34928619c448ce86dfd09c264a62898687cf99820071ce2506
-
Filesize
788.3MB
MD57d389c6c58b025a922f9add42240eaf7
SHA19a41fd27f7ed9d794446c24967584a1855bdf3d4
SHA2569d28129db470f21df647fb532514029c6f60633c36620b9a518bc272287ff405
SHA512c572192caec8c8e0ef3a2f0ad7f8109f478e36af075bba83a3f18fa23c0f3c707c8a79a0c600ca34928619c448ce86dfd09c264a62898687cf99820071ce2506
-
Filesize
663.5MB
MD57c45ae68c25acaf1e03f70797b88dab7
SHA1564f22a938b3deeec7a707b930c9349356667481
SHA2567dcec7d4233586ea90bc37a3221b6558f286c3b76b1f45bf4f7df8407822559b
SHA512435f5ff3295fc52085357d6a239df83b585dba3d22c58b59c5376e7e53d325a9154d10f4088da0198cfd23e19141b27681b70eb86e98101fff3b7b30f8caeaf4