Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 01:27
Static task
static1
Behavioral task
behavioral1
Sample
vddsc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
vddsc.exe
Resource
win10v2004-20230220-en
General
-
Target
vddsc.exe
-
Size
5.8MB
-
MD5
e7a69210f26c7944b6e267d0d73af320
-
SHA1
cc03fe693690e4f45a7cca31782292f69e505801
-
SHA256
64b965beccd214a869629c202905642aec12eb0814bd773c264f845cb7a211e2
-
SHA512
44345416a657e5612fe6af6d6203f25e5bb501862f83c0a688b8fbab0cdd4929b309e32fa6770fe18a47bf62d91688fc761761d0f457e37bbc11abe16adace07
-
SSDEEP
98304:udcR2OyrVRPLlO/otpGnOYwxR7hv88+MqgtJjKniUDsMsqAnqCN7hm:ueVyrLg/onGl9pMbtJjKiOpAqCN7h
Malware Config
Extracted
laplas
http://212.113.106.172
-
api_key
a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation vddsc.exe -
Executes dropped EXE 1 IoCs
pid Process 2876 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" vddsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3772 vddsc.exe 3772 vddsc.exe 3772 vddsc.exe 3772 vddsc.exe 2876 svcservice.exe 2876 svcservice.exe 2876 svcservice.exe 2876 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3772 wrote to memory of 2876 3772 vddsc.exe 91 PID 3772 wrote to memory of 2876 3772 vddsc.exe 91 PID 3772 wrote to memory of 2876 3772 vddsc.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\vddsc.exe"C:\Users\Admin\AppData\Local\Temp\vddsc.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2876
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
710.8MB
MD580bf7bf76c95cb206e70b93bb0e50a94
SHA1db766ba6f6b5d341ed134b6466f639eedbe0a0c5
SHA2563477ecd7835de7e7b3c9eb5673a3d8af99df574333a248e41be3eb85d553502a
SHA512017df6fd9150f362867e2b8b4a8dcda928934c24e1ee66ab305ebdd080d7680bc9dbd62698e92455a84e922de7f706d3f80423abe933857074a2b50c11645220
-
Filesize
710.8MB
MD580bf7bf76c95cb206e70b93bb0e50a94
SHA1db766ba6f6b5d341ed134b6466f639eedbe0a0c5
SHA2563477ecd7835de7e7b3c9eb5673a3d8af99df574333a248e41be3eb85d553502a
SHA512017df6fd9150f362867e2b8b4a8dcda928934c24e1ee66ab305ebdd080d7680bc9dbd62698e92455a84e922de7f706d3f80423abe933857074a2b50c11645220
-
Filesize
710.8MB
MD580bf7bf76c95cb206e70b93bb0e50a94
SHA1db766ba6f6b5d341ed134b6466f639eedbe0a0c5
SHA2563477ecd7835de7e7b3c9eb5673a3d8af99df574333a248e41be3eb85d553502a
SHA512017df6fd9150f362867e2b8b4a8dcda928934c24e1ee66ab305ebdd080d7680bc9dbd62698e92455a84e922de7f706d3f80423abe933857074a2b50c11645220