Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2023 20:10
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
7.3MB
-
MD5
99f16ab6ab670935b5aa5c84b1b5f6bd
-
SHA1
59f375481cdfe246d1ddcaada9941e16dcfda297
-
SHA256
348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057
-
SHA512
845e76e29adb6b7890a3a5c508e27b9731e9872bc791eeefb146b23e0e737280d19e4df1203b719f8e168a8c8a0d8ae1b4bf670da5d264bde1eece8663624d70
-
SSDEEP
196608:Ltu5ODXM16mjmKSRFWuxx6ruj3nK/x9jWuy:L05ODcgR6mix1
Malware Config
Extracted
laplas
http://185.106.92.104
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 3120 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" tmp.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 5084 tmp.exe 5084 tmp.exe 3120 svcservice.exe 3120 svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5084 tmp.exe 5084 tmp.exe 3120 svcservice.exe 3120 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5084 wrote to memory of 3120 5084 tmp.exe 87 PID 5084 wrote to memory of 3120 5084 tmp.exe 87 PID 5084 wrote to memory of 3120 5084 tmp.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3120
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
795.3MB
MD50e314fac3138b1085228a3df982d747a
SHA160bbac0fa642087dd16a3161d6e57b68c6cd39fb
SHA256b99d9081070cf7f945650a0d55d01e5ebb6cc6374da13d7053a6f5822bdd5900
SHA512072afabd308d3586c9525a8cd3fdaf94d1b79c380e62adb85b338ef114383b40f2bd1dfd7872df25f10bcfe9ccc599bf3ee10c983c3be659b781f66f8b05965f
-
Filesize
793.9MB
MD5066a6c5c1fcdaa9f8d46df78f6d0d5d5
SHA1e81ac949427f47d22bd96fceeb48681e37b6a827
SHA25633da50890cfe28d85cd10176ecf60b1a3f6b5868603c41ba4c93e86631aef1ca
SHA512a053c8b5e4747c915655f2981bbf3e13b5f0d682ed246a13feab15c4bf001426bd31df93b6b843657998325c142eda6927e13a71ac22c9e038eb20e75d0e0071
-
Filesize
795.3MB
MD50e314fac3138b1085228a3df982d747a
SHA160bbac0fa642087dd16a3161d6e57b68c6cd39fb
SHA256b99d9081070cf7f945650a0d55d01e5ebb6cc6374da13d7053a6f5822bdd5900
SHA512072afabd308d3586c9525a8cd3fdaf94d1b79c380e62adb85b338ef114383b40f2bd1dfd7872df25f10bcfe9ccc599bf3ee10c983c3be659b781f66f8b05965f