Analysis
-
max time kernel
109s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 21:47
Static task
static1
Behavioral task
behavioral1
Sample
sdax.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
sdax.exe
Resource
win10v2004-20230220-en
General
-
Target
sdax.exe
-
Size
725.8MB
-
MD5
0207380aa8e83e8aaf7a7defc60ddd6e
-
SHA1
ceb93d22de83ad1c993096c12e66929a605c013c
-
SHA256
74e2e74a0115644594768d827af3b6bf70190be406fc783e78133e7b42498b50
-
SHA512
cef4a45b7b9c73e66f6c901267a8b9edb71e0bcad150ab82afb50ef892a5cc4b06c50522f74c29818cd83e0049b116044f33a0921ffe1e741ab1ba67cdb0019f
-
SSDEEP
98304:udcR2OyrVRPLlO/otpGnOYwxR7hv88+MqgtJjKniUDsMsqAnqCN7hmP:ueVyrLg/onGl9pMbtJjKiOpAqCN7h8
Malware Config
Extracted
laplas
http://212.113.106.172
-
api_key
a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation sdax.exe -
Executes dropped EXE 1 IoCs
pid Process 640 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" sdax.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1452 sdax.exe 1452 sdax.exe 1452 sdax.exe 1452 sdax.exe 640 svcservice.exe 640 svcservice.exe 640 svcservice.exe 640 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1452 wrote to memory of 640 1452 sdax.exe 89 PID 1452 wrote to memory of 640 1452 sdax.exe 89 PID 1452 wrote to memory of 640 1452 sdax.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\sdax.exe"C:\Users\Admin\AppData\Local\Temp\sdax.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:640
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308.5MB
MD5a22ce3f3a9a40812ed6ad8feb7844cc9
SHA1da1c8df96ab3f7d3c179f0449a34ff6d17c341fc
SHA256364f211c84373c6dc2e5097c69374ee959e711fb093cbb4b9da7a59692160661
SHA512bc12ae49a814e36f4b8acf169eb958a105b0d888cc3894ef6d96f2a3a1a7b24fdb8f1b6a98ec847eddaad5f9a60dce3e9e5af7eaa1b25a842f5fe0b231a7a39a
-
Filesize
302.8MB
MD586099593ae05027765f866eb24d787ad
SHA18d0d13c332080d5522f2055397e9a13165b1d76d
SHA2567e62c9a57752cc1e686650b345d6da447bdc57f75b3dce9496a0e9874c689bfd
SHA51287a01b149f506b5a96c66cbd476ca3561b01001aa47b56069aab2a67004387245581b3cf9dfbe08cc96aca4e21cb6567886ad35224dc306d5dfb8976e2f6f797
-
Filesize
307.8MB
MD5d02846e44c39a6e1f0f50cad31f38d89
SHA1bc18c7fc602ca4cb4f150a7fbff0b1586b943517
SHA256f5e42a17d2987926f1201806fce03f1ca38395f3dfdf00dc730e8759f3ffa49a
SHA5120270701c8934de54c4faf48def6d3ba1d6d2b38815036568c2ac5d902a7db133321f66a7121c078dc3d50693d16ae9b76c560460a2eb244b71015351067eb6b8