Analysis
-
max time kernel
137s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02-04-2023 01:41
Static task
static1
Behavioral task
behavioral1
Sample
d79c7afdc8721f4f547c931ce6e0b20ac24193bdc63e4fee1e700e930199bc14.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d79c7afdc8721f4f547c931ce6e0b20ac24193bdc63e4fee1e700e930199bc14.exe
Resource
win10v2004-20230220-en
General
-
Target
d79c7afdc8721f4f547c931ce6e0b20ac24193bdc63e4fee1e700e930199bc14.exe
-
Size
7.2MB
-
MD5
79f92f15ae5abceeaf487bf041aec54d
-
SHA1
05cd320d0a7f52a3511c05e54360d4512fd4da57
-
SHA256
d79c7afdc8721f4f547c931ce6e0b20ac24193bdc63e4fee1e700e930199bc14
-
SHA512
36c65db2149eb8b43356982533e79749a715174cf220ae519861117eaebd239531b4dc6a6db303d06171dd43d2d4371d6be40b7ea6a1cf590d7f919f2148431f
-
SSDEEP
196608:TOZKfeUTUAYVz1ayJz2kzxXuzg6CF9X2G:TYKmUzaz1BJ2oxXAg6CLX
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
282dad126e565baaaf231822cab8d693912f9b76b528a6f568b2bac069b49e61
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1456 svcservice.exe -
Loads dropped DLL 1 IoCs
pid Process 1980 d79c7afdc8721f4f547c931ce6e0b20ac24193bdc63e4fee1e700e930199bc14.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" d79c7afdc8721f4f547c931ce6e0b20ac24193bdc63e4fee1e700e930199bc14.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1980 d79c7afdc8721f4f547c931ce6e0b20ac24193bdc63e4fee1e700e930199bc14.exe 1456 svcservice.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1456 1980 d79c7afdc8721f4f547c931ce6e0b20ac24193bdc63e4fee1e700e930199bc14.exe 28 PID 1980 wrote to memory of 1456 1980 d79c7afdc8721f4f547c931ce6e0b20ac24193bdc63e4fee1e700e930199bc14.exe 28 PID 1980 wrote to memory of 1456 1980 d79c7afdc8721f4f547c931ce6e0b20ac24193bdc63e4fee1e700e930199bc14.exe 28 PID 1980 wrote to memory of 1456 1980 d79c7afdc8721f4f547c931ce6e0b20ac24193bdc63e4fee1e700e930199bc14.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d79c7afdc8721f4f547c931ce6e0b20ac24193bdc63e4fee1e700e930199bc14.exe"C:\Users\Admin\AppData\Local\Temp\d79c7afdc8721f4f547c931ce6e0b20ac24193bdc63e4fee1e700e930199bc14.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
713.2MB
MD5e53bed6885b59fb2fea52b06527a4641
SHA13592206fadc456671c61e779fc7aa4683a837b28
SHA25632d7b3cc8785a7b3f88640d0e5dcf7cd1b7bcdf14dd4d547e8976d5d2ece7a2b
SHA512d576287b282b1c32a559b9a19cf46c74700e604c25a9d87f88522acf5ee562ee993ce486bede4b3ac1f387f0451b14b83066104275c6fbf69af5297f625c7133
-
Filesize
736.2MB
MD515a3737dd2465cdaca20d3afcd07cd53
SHA1aa43bd52acf7832a2620b0f7e1632e66cd4361e3
SHA25673e9811bf0a0db69b32828b4a8dfbe01b380174de9bd3936a699ffe0fb3de5b7
SHA5129679f2a2d647161fdb08e07fb0f1ae32a16611e0266f450436a534eb1153357f6b0fda9c3b52ec5160ecc4d24e1e8bf2250b74aaacdd20ddf17bd75a319bea00
-
Filesize
635.2MB
MD5c2104e563cea9d9be35635c6dc2197b1
SHA137de977986c705b18c283ec6a7472fe24fd445e1
SHA2568552c03e0002130232d692c5c15cc3ae630fef59bc18f50280a510ff768244ff
SHA512d08afb2e355f30d2f01e5a460996952d30fa81a4340d25247f92998094f02d232ae598d173657018c56f96c61212ee1cb000dc780b59cf069415170a3c1bb76e