Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 21:47
Static task
static1
Behavioral task
behavioral1
Sample
vddsc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
vddsc.exe
Resource
win10v2004-20230221-en
General
-
Target
vddsc.exe
-
Size
5.8MB
-
MD5
e7a69210f26c7944b6e267d0d73af320
-
SHA1
cc03fe693690e4f45a7cca31782292f69e505801
-
SHA256
64b965beccd214a869629c202905642aec12eb0814bd773c264f845cb7a211e2
-
SHA512
44345416a657e5612fe6af6d6203f25e5bb501862f83c0a688b8fbab0cdd4929b309e32fa6770fe18a47bf62d91688fc761761d0f457e37bbc11abe16adace07
-
SSDEEP
98304:udcR2OyrVRPLlO/otpGnOYwxR7hv88+MqgtJjKniUDsMsqAnqCN7hm:ueVyrLg/onGl9pMbtJjKiOpAqCN7h
Malware Config
Extracted
laplas
http://212.113.106.172
-
api_key
a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation vddsc.exe -
Executes dropped EXE 1 IoCs
pid Process 4172 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" vddsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2896 vddsc.exe 2896 vddsc.exe 2896 vddsc.exe 2896 vddsc.exe 4172 svcservice.exe 4172 svcservice.exe 4172 svcservice.exe 4172 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2896 wrote to memory of 4172 2896 vddsc.exe 89 PID 2896 wrote to memory of 4172 2896 vddsc.exe 89 PID 2896 wrote to memory of 4172 2896 vddsc.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\vddsc.exe"C:\Users\Admin\AppData\Local\Temp\vddsc.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4172
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
775.8MB
MD529c22ef42cb9163eb9a079244247fbb8
SHA18fbf1cb43e41f01a7550d46b2198f3cf8ea93f94
SHA2567f329cdbdcf99feeba58c8cb83c5072fd92e064d594d5164890d117ed95a7a40
SHA51288107a3f04c99a4b268f98944912dbf2c979174fe6cba38d95ab973c6570712047111bae55495b4c696d00b3689ee0d7547107abe95e63e622e46fa61d58b17b
-
Filesize
646.1MB
MD52fe8a5634805383d1742a7dd9b5a942d
SHA14c5515dbf794d1ea566700596702d9ecf2cf9005
SHA2560254e310aa2e0054f0df4d8e981211b1f342e748ece9eace1419a77bc7298e25
SHA5125632b90dac25b2438da4f4fae3896bf00423ab6e463395adee895f37921bc1ee3ea72764302cffc33ae4596db04165c1d29d478c988a11dd4e6cca7dc2160b05
-
Filesize
593.7MB
MD5fe3c806c18c5c1f6a9160a71f73126b1
SHA18029b831cdd0f2479cd2b4d65718a856a6ea3c5f
SHA256439a3b81b6bf467e795e34c761b516186718774a981dce7a64171baafe131ef4
SHA51203d4b4506d2b153aa75a785b2af07721155a245fa9d45c7e3def64d24f1414bd10bef9aebcf13e5aa0eb9f500bf9d581b4ffbced9e9cdc78d21b596d66405c0d