Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-04-2023 15:27
Static task
static1
Behavioral task
behavioral1
Sample
dawxa.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dawxa.exe
Resource
win10v2004-20230220-en
General
-
Target
dawxa.exe
-
Size
727.1MB
-
MD5
6804b55133ae5596dbe5f66dadbf2b6c
-
SHA1
e86f29cab01ff8e8aa3c2b6eaf6ebed92b548d55
-
SHA256
a9ba63a83e9b72084122461508f66d9a445093500396e02b67f1dcd7e052f15a
-
SHA512
1735412f459375a393c0a3da305fcdcae961d9b4ba16fbf521ec7af1b9521ab637404c95362abc19cefc77ba726083430ac37280e976588bd0874e24e9276543
-
SSDEEP
98304:/+l8XYIVemDeKL2VfHg3spY6hqLgE9ywuFtA40s/sTr0DfxxSJZfpqbTU7VZd6H3:l/ftL2f+6MLr0wsf0HTr0D5mmGdbe
Malware Config
Extracted
laplas
http://212.113.106.172
-
api_key
a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation dawxa.exe -
Executes dropped EXE 1 IoCs
pid Process 5096 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" dawxa.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4424 dawxa.exe 4424 dawxa.exe 5096 svcservice.exe 5096 svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4424 dawxa.exe 4424 dawxa.exe 4424 dawxa.exe 4424 dawxa.exe 5096 svcservice.exe 5096 svcservice.exe 5096 svcservice.exe 5096 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4424 wrote to memory of 5096 4424 dawxa.exe 89 PID 4424 wrote to memory of 5096 4424 dawxa.exe 89 PID 4424 wrote to memory of 5096 4424 dawxa.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\dawxa.exe"C:\Users\Admin\AppData\Local\Temp\dawxa.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
725.1MB
MD5850a4c7295a3eefb57a9cfc116eae77f
SHA1293ff6126a15a05787985daf10dfc1eaf8c57b6f
SHA2568024e739ffbe6062a9a97105efba9e00d2e2231503fc348b196270ddc1aa4c2c
SHA512a69c0277a591d81e8b7dc09fdd704dafe088745ea2aa31e753018dc9fe7a949228155b456cb2b5ad90e86dbd6acec2cdf95cff36734bcd22558133a40e60ec46
-
Filesize
719.1MB
MD5272d044cf34de04b7c0a7a94db0e0639
SHA1c3e86b3be4dbf4c55e5ed95d844cedb57345862d
SHA25666f3e2a5f25629d715321fb72b1825609021381cc0757ef96ea9c036ec73ab4e
SHA512f28b372b462c9fffcda278232a30c80c1e6bd4f8972c0b89733c852a600c38ae46e0f1b4ffee0a673d91bcd9b6207bd03aa6e000923348a4a5239363e92183af
-
Filesize
720.0MB
MD550541f362a5e50ddc837e90bbc588222
SHA11076e972430ac31c2f477ca5bd8a64ae7f15f9a9
SHA2569b3256f05e8b33725e79b4dbc059a824ecc492350bc7cd36a690993217706d00
SHA51223effa8ab4c9ed053b9866baf60c7cfd7db418e5c87e7fbb28cb7cfb8e78566274f69fc66b7ef2470c864ca03925816447bf569449b149ec129e59b4bb85cee5