Analysis
-
max time kernel
112s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2023 20:31
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230221-en
General
-
Target
tmp.exe
-
Size
7.3MB
-
MD5
99f16ab6ab670935b5aa5c84b1b5f6bd
-
SHA1
59f375481cdfe246d1ddcaada9941e16dcfda297
-
SHA256
348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057
-
SHA512
845e76e29adb6b7890a3a5c508e27b9731e9872bc791eeefb146b23e0e737280d19e4df1203b719f8e168a8c8a0d8ae1b4bf670da5d264bde1eece8663624d70
-
SSDEEP
196608:Ltu5ODXM16mjmKSRFWuxx6ruj3nK/x9jWuy:L05ODcgR6mix1
Malware Config
Extracted
laplas
http://185.106.92.104
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 4392 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" tmp.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2352 tmp.exe 2352 tmp.exe 4392 svcservice.exe 4392 svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2352 tmp.exe 2352 tmp.exe 4392 svcservice.exe 4392 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2352 wrote to memory of 4392 2352 tmp.exe 88 PID 2352 wrote to memory of 4392 2352 tmp.exe 88 PID 2352 wrote to memory of 4392 2352 tmp.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
707.3MB
MD5d8345839286d65413aa8283a9ea60ab8
SHA1ae51e3b519985ad97b5e909fb525fb817ebafeb2
SHA2568861e2370d607a6fed36c58dd87fd69b34e488b3a13dc8a900fc50fb62e5bce9
SHA5129a3b6318cc662e5f462797c87bebb5648f90229861313fcf564af692ed516e046918a2d933c0a19cf31bea4d57f76f9a447b8595827b615366b68a3778698448
-
Filesize
707.3MB
MD5d8345839286d65413aa8283a9ea60ab8
SHA1ae51e3b519985ad97b5e909fb525fb817ebafeb2
SHA2568861e2370d607a6fed36c58dd87fd69b34e488b3a13dc8a900fc50fb62e5bce9
SHA5129a3b6318cc662e5f462797c87bebb5648f90229861313fcf564af692ed516e046918a2d933c0a19cf31bea4d57f76f9a447b8595827b615366b68a3778698448
-
Filesize
707.3MB
MD5d8345839286d65413aa8283a9ea60ab8
SHA1ae51e3b519985ad97b5e909fb525fb817ebafeb2
SHA2568861e2370d607a6fed36c58dd87fd69b34e488b3a13dc8a900fc50fb62e5bce9
SHA5129a3b6318cc662e5f462797c87bebb5648f90229861313fcf564af692ed516e046918a2d933c0a19cf31bea4d57f76f9a447b8595827b615366b68a3778698448