Analysis
-
max time kernel
143s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
30-03-2023 17:54
Static task
static1
Behavioral task
behavioral1
Sample
sdax.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
sdax.exe
Resource
win10v2004-20230221-en
General
-
Target
sdax.exe
-
Size
725.8MB
-
MD5
0207380aa8e83e8aaf7a7defc60ddd6e
-
SHA1
ceb93d22de83ad1c993096c12e66929a605c013c
-
SHA256
74e2e74a0115644594768d827af3b6bf70190be406fc783e78133e7b42498b50
-
SHA512
cef4a45b7b9c73e66f6c901267a8b9edb71e0bcad150ab82afb50ef892a5cc4b06c50522f74c29818cd83e0049b116044f33a0921ffe1e741ab1ba67cdb0019f
-
SSDEEP
98304:udcR2OyrVRPLlO/otpGnOYwxR7hv88+MqgtJjKniUDsMsqAnqCN7hmP:ueVyrLg/onGl9pMbtJjKiOpAqCN7h8
Malware Config
Extracted
laplas
http://212.113.106.172
-
api_key
a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation sdax.exe -
Executes dropped EXE 1 IoCs
pid Process 3860 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" sdax.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4840 sdax.exe 4840 sdax.exe 4840 sdax.exe 4840 sdax.exe 3860 svcservice.exe 3860 svcservice.exe 3860 svcservice.exe 3860 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4840 wrote to memory of 3860 4840 sdax.exe 84 PID 4840 wrote to memory of 3860 4840 sdax.exe 84 PID 4840 wrote to memory of 3860 4840 sdax.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\sdax.exe"C:\Users\Admin\AppData\Local\Temp\sdax.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3860
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531.9MB
MD5ca5b44b2235fcde939ea532d2e48ebb8
SHA14a4b3f54a6ef2697a568816bb4c5bb9b7fc88980
SHA256273172efad291ce5f5b27bb255b4fcf5502327a5514dad4466144a55c9a6248b
SHA5128d0c3da7968e69f3e4e245227ec114be93bde869c73d01ddd12ba00fbff7001a4e8011f7ee9976f54312009ae91a9763514cf2056bcc09e3e595af7c3b206444
-
Filesize
607.2MB
MD5622af70af756e339f6fa93835eeaf097
SHA14fa574cf77508ffa889ad5f2b917f5e7b9323cc9
SHA2567dcd6dd56ddf1ff6adac0226ec0b58f1bae6fe402eae2d3030162176268e4d51
SHA5121fa133460c7088d525216f1c1008b424e3d3e589c8a468f0c545516198ef76a8efd9eb6e139fa9ba0171e70dfeb3c62d514ebc28772aa8178a6b8a7f60367e4d
-
Filesize
535.9MB
MD5e317d023e778b4bb11179fec5286b0ec
SHA15b18ccb848504f9057e3450f42f7e26e804ba0ff
SHA256f6e82c06a15b7fae508380eb27052fdce0ab0d9791f7cc693149d978779d7ac5
SHA5129317159d800965cfe2a0ff94294f133a2355c21fb20dfc937a939bcdadeafaaf88dfd50c915c8ae3e7ffd68c97d38e83e1f102bdc3978be399ba3d1854a7499b