Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2023 02:14
Static task
static1
Behavioral task
behavioral1
Sample
e7a69210f26c7944b6e267d0d73af320.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e7a69210f26c7944b6e267d0d73af320.exe
Resource
win10v2004-20230221-en
General
-
Target
e7a69210f26c7944b6e267d0d73af320.exe
-
Size
5.8MB
-
MD5
e7a69210f26c7944b6e267d0d73af320
-
SHA1
cc03fe693690e4f45a7cca31782292f69e505801
-
SHA256
64b965beccd214a869629c202905642aec12eb0814bd773c264f845cb7a211e2
-
SHA512
44345416a657e5612fe6af6d6203f25e5bb501862f83c0a688b8fbab0cdd4929b309e32fa6770fe18a47bf62d91688fc761761d0f457e37bbc11abe16adace07
-
SSDEEP
98304:udcR2OyrVRPLlO/otpGnOYwxR7hv88+MqgtJjKniUDsMsqAnqCN7hm:ueVyrLg/onGl9pMbtJjKiOpAqCN7h
Malware Config
Extracted
laplas
http://212.113.106.172
-
api_key
a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation e7a69210f26c7944b6e267d0d73af320.exe -
Executes dropped EXE 1 IoCs
pid Process 4968 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" e7a69210f26c7944b6e267d0d73af320.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2752 e7a69210f26c7944b6e267d0d73af320.exe 2752 e7a69210f26c7944b6e267d0d73af320.exe 2752 e7a69210f26c7944b6e267d0d73af320.exe 2752 e7a69210f26c7944b6e267d0d73af320.exe 4968 svcservice.exe 4968 svcservice.exe 4968 svcservice.exe 4968 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2752 wrote to memory of 4968 2752 e7a69210f26c7944b6e267d0d73af320.exe 90 PID 2752 wrote to memory of 4968 2752 e7a69210f26c7944b6e267d0d73af320.exe 90 PID 2752 wrote to memory of 4968 2752 e7a69210f26c7944b6e267d0d73af320.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7a69210f26c7944b6e267d0d73af320.exe"C:\Users\Admin\AppData\Local\Temp\e7a69210f26c7944b6e267d0d73af320.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4968
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
760.8MB
MD5f4ab4a4ad9e119c7c84561a5b0cdf0c8
SHA1ef1180aa408dbd9e91443349bfc6e96c7e120b94
SHA256afb6e2066404eaf128a136a8d990cfabd537cad36e85f2723fbd7f6f2f108f05
SHA512535ffa67042cc7d61d31315845447e93272a7b9fc8775a9a0e6448f25a2eff4a512b2d66718e3bc5cd8398071a173b82534010e260dc6c62b795f9d8497f2cdc
-
Filesize
647.7MB
MD536f5d8ec3f6b3ec155cf2b6881136ee1
SHA1c4286bc737f211c73993b120a6ed9e0c8138ab38
SHA256a758589b47fa9168d599a5fbb9e0e907b3d415c5c8e3cd6dc086a1875628d629
SHA5129ef4ea09193e1fd8a0c153c487321763006a983ff38b8e66a67611919c83c1123dcb15d7fb8b402c5006bb0ea785e2f78ef18cb024203b68ca736572b81cc41c
-
Filesize
692.8MB
MD5a2e832550781d5637f7f499848d734bb
SHA14d29508a6807a47e1e38f654bbdcc395b37a9767
SHA256c940735ba45b80afc85973d43b826e11f9f9c92f152912dc955eaf0aff487fe4
SHA51261cf01fe23bc4a3b4fdbc20b3484977f65c125b190f69f1e73de0f31e1e3ca1065f4580f3a4f240d7324f25b247afb481497f933e6d9e94ad962626a886aed35