Analysis
-
max time kernel
138s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-03-2023 20:31
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230221-en
General
-
Target
tmp.exe
-
Size
7.3MB
-
MD5
99f16ab6ab670935b5aa5c84b1b5f6bd
-
SHA1
59f375481cdfe246d1ddcaada9941e16dcfda297
-
SHA256
348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057
-
SHA512
845e76e29adb6b7890a3a5c508e27b9731e9872bc791eeefb146b23e0e737280d19e4df1203b719f8e168a8c8a0d8ae1b4bf670da5d264bde1eece8663624d70
-
SSDEEP
196608:Ltu5ODXM16mjmKSRFWuxx6ruj3nK/x9jWuy:L05ODcgR6mix1
Malware Config
Extracted
laplas
http://185.106.92.104
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1260 svcservice.exe -
Loads dropped DLL 1 IoCs
pid Process 1212 tmp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" tmp.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1212 tmp.exe 1212 tmp.exe 1260 svcservice.exe 1260 svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1212 tmp.exe 1260 svcservice.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1212 wrote to memory of 1260 1212 tmp.exe 28 PID 1212 wrote to memory of 1260 1212 tmp.exe 28 PID 1212 wrote to memory of 1260 1212 tmp.exe 28 PID 1212 wrote to memory of 1260 1212 tmp.exe 28 PID 1212 wrote to memory of 1260 1212 tmp.exe 28 PID 1212 wrote to memory of 1260 1212 tmp.exe 28 PID 1212 wrote to memory of 1260 1212 tmp.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1260
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
802.0MB
MD5571d7ec9d48014c37d4344d6031e11de
SHA10c9ae39035a37717560ef2447cc98f97bb1d035b
SHA256386107a76f4533c8d59fba1f0608cf13eb23f7a7afe805c3ce083f80cbd35d9a
SHA51269cb17b78fca604d44810268134a925f1be1e3a5e880e5de02deccbfa9680b3d3677db16357dbf274ea1d4b173a6d0bdbd0aaac06f829d6f52d4cebc73ce5269
-
Filesize
601.5MB
MD5976608aba44037e91b0f9a381ebd0442
SHA1ec46a52f6eb4ec4c12176efe5fb2893b5fa089fc
SHA256b63b6abfb1d49eefdcacff191413043471c9400f6905c9a340a3144f2d699dc5
SHA512ce1a947ef48cd4cb91740a8350272de55dab2cf94cf55221c92aff0358e56a9554e9cde2da4f14a087c3ad8d35128538c05ccc0c5adadd53a7fafec31d18c919
-
Filesize
773.8MB
MD5376f04b61c0fb7264fdf6253afce9160
SHA1d081238b6e67e9131bb763f7a04f009b8bd6e087
SHA256f42b0b47f06096044f4a8606cc538a24ca00fd688a81ee51540b0b4f22fe939c
SHA512a5a8c6e9237f425a1ef5fcc9e36697ab2c11e88dc68b7ec1c36d8c51eabba922615a5ef06afd6106abd2747161c21ac8811c39fefc25280b6c708b3bc95b6f20