Analysis
-
max time kernel
293s -
max time network
324s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 20:14
Static task
static1
Behavioral task
behavioral1
Sample
PC-Files_Expert-2O23/Laucnher-PC-S0FT-2O23.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PC-Files_Expert-2O23/Laucnher-PC-S0FT-2O23.exe
Resource
win10v2004-20230220-en
General
-
Target
PC-Files_Expert-2O23/Laucnher-PC-S0FT-2O23.exe
-
Size
730.0MB
-
MD5
ac806cf293cada210b512a642e290a33
-
SHA1
e8dfe030d105a95d76936848b83187f382c7cd43
-
SHA256
794997ce49323e2620efdd9a2a34d364890313cb0984e909a5cf589d4072f17e
-
SHA512
4201478b7f39f29e0984a3828a5e23450eaeb688d8bcb7e5e0a29a5a4dae9f603bc87fb9595ee701f4e258bea13838dd72d8743e8423c92c156fc28ba0bbb9e8
-
SSDEEP
196608:kSpje7hK/Y1X+MfKclMp5daT7OfO8to35qUB7+A4FNv:kSte7hi1M8faOfFIE
Malware Config
Extracted
raccoon
f752420247e5bcc46230c6129c34c6a2
http://95.216.153.86/
http://5.75.159.229/
http://212.113.119.153/
http://78.153.130.123/
Extracted
laplas
http://212.113.106.172
-
api_key
a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation Laucnher-PC-S0FT-2O23.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation tI8dDH6G.exe -
Executes dropped EXE 4 IoCs
pid Process 3772 uNSPnCk3.exe 2496 30sm48O7.exe 4612 tI8dDH6G.exe 3468 svcservice.exe -
Loads dropped DLL 3 IoCs
pid Process 4008 Laucnher-PC-S0FT-2O23.exe 4008 Laucnher-PC-S0FT-2O23.exe 4008 Laucnher-PC-S0FT-2O23.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" tI8dDH6G.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3772 set thread context of 1548 3772 uNSPnCk3.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4140 1548 WerFault.exe 90 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\47BEABC922EAE80E78783462A79F45C254FDE68B Laucnher-PC-S0FT-2O23.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\47BEABC922EAE80E78783462A79F45C254FDE68B\Blob = 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 Laucnher-PC-S0FT-2O23.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\47BEABC922EAE80E78783462A79F45C254FDE68B\Blob = 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 Laucnher-PC-S0FT-2O23.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4008 Laucnher-PC-S0FT-2O23.exe 4008 Laucnher-PC-S0FT-2O23.exe 4612 tI8dDH6G.exe 4612 tI8dDH6G.exe 4612 tI8dDH6G.exe 4612 tI8dDH6G.exe 3468 svcservice.exe 3468 svcservice.exe 3468 svcservice.exe 3468 svcservice.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4008 wrote to memory of 3772 4008 Laucnher-PC-S0FT-2O23.exe 87 PID 4008 wrote to memory of 3772 4008 Laucnher-PC-S0FT-2O23.exe 87 PID 4008 wrote to memory of 3772 4008 Laucnher-PC-S0FT-2O23.exe 87 PID 4008 wrote to memory of 2496 4008 Laucnher-PC-S0FT-2O23.exe 89 PID 4008 wrote to memory of 2496 4008 Laucnher-PC-S0FT-2O23.exe 89 PID 4008 wrote to memory of 2496 4008 Laucnher-PC-S0FT-2O23.exe 89 PID 3772 wrote to memory of 1548 3772 uNSPnCk3.exe 90 PID 3772 wrote to memory of 1548 3772 uNSPnCk3.exe 90 PID 3772 wrote to memory of 1548 3772 uNSPnCk3.exe 90 PID 3772 wrote to memory of 1548 3772 uNSPnCk3.exe 90 PID 3772 wrote to memory of 1548 3772 uNSPnCk3.exe 90 PID 4008 wrote to memory of 4612 4008 Laucnher-PC-S0FT-2O23.exe 93 PID 4008 wrote to memory of 4612 4008 Laucnher-PC-S0FT-2O23.exe 93 PID 4008 wrote to memory of 4612 4008 Laucnher-PC-S0FT-2O23.exe 93 PID 4612 wrote to memory of 3468 4612 tI8dDH6G.exe 94 PID 4612 wrote to memory of 3468 4612 tI8dDH6G.exe 94 PID 4612 wrote to memory of 3468 4612 tI8dDH6G.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\PC-Files_Expert-2O23\Laucnher-PC-S0FT-2O23.exe"C:\Users\Admin\AppData\Local\Temp\PC-Files_Expert-2O23\Laucnher-PC-S0FT-2O23.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\LocalLow\uNSPnCk3.exe"C:\Users\Admin\AppData\LocalLow\uNSPnCk3.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵PID:1548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 10324⤵
- Program crash
PID:4140
-
-
-
-
C:\Users\Admin\AppData\Roaming\30sm48O7.exe"C:\Users\Admin\AppData\Roaming\30sm48O7.exe"2⤵
- Executes dropped EXE
PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\tI8dDH6G.exe"C:\Users\Admin\AppData\Local\Temp\tI8dDH6G.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3468
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1548 -ip 15481⤵PID:3592
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
612KB
MD5f07d9977430e762b563eaadc2b94bbfa
SHA1da0a05b2b8d269fb73558dfcf0ed5c167f6d3877
SHA2564191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862
SHA5126afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf
-
Filesize
1.9MB
MD5f67d08e8c02574cbc2f1122c53bfb976
SHA16522992957e7e4d074947cad63189f308a80fcf2
SHA256c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e
SHA5122e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5
-
Filesize
1.0MB
MD5dbf4f8dcefb8056dc6bae4b67ff810ce
SHA1bbac1dd8a07c6069415c04b62747d794736d0689
SHA25647b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68
SHA512b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1
-
Filesize
276KB
MD56eaea6974cd276b74e4783fe75a98bb6
SHA13587175eb64552fb8c76655d2c4b3ab9a83f7890
SHA25629dfae95832708e0d7adae77c048b3537d402950a1460f2e589bf803889bc9e3
SHA5127b1f8b74b9e2a0a89b29a1f3c77b3afa940f17d133af6e6e67e53adb60591c021882f3bc604bb0d1599aeb111327cef31d87915f8abb237bde9ec221d58e029b
-
Filesize
276KB
MD56eaea6974cd276b74e4783fe75a98bb6
SHA13587175eb64552fb8c76655d2c4b3ab9a83f7890
SHA25629dfae95832708e0d7adae77c048b3537d402950a1460f2e589bf803889bc9e3
SHA5127b1f8b74b9e2a0a89b29a1f3c77b3afa940f17d133af6e6e67e53adb60591c021882f3bc604bb0d1599aeb111327cef31d87915f8abb237bde9ec221d58e029b
-
Filesize
276KB
MD56eaea6974cd276b74e4783fe75a98bb6
SHA13587175eb64552fb8c76655d2c4b3ab9a83f7890
SHA25629dfae95832708e0d7adae77c048b3537d402950a1460f2e589bf803889bc9e3
SHA5127b1f8b74b9e2a0a89b29a1f3c77b3afa940f17d133af6e6e67e53adb60591c021882f3bc604bb0d1599aeb111327cef31d87915f8abb237bde9ec221d58e029b
-
Filesize
726.7MB
MD5bbd00ec4e0a57e9c3bc8b57c6d22e4ac
SHA1c0463ce8ef9dcf563e4321ffcdf86ca4ee2a8b97
SHA256ef459820a29f16850147c08c143b76a58990c1813edaaf5bfad20aa05e65a4d8
SHA512178017fb9fd541aba2d342829c0f81411d334b826eb0a003a4654734bfb58364b6e130f749454d32b61e2a55a8e552a9986fece6b1db34ed18396c27c84c9419
-
Filesize
726.7MB
MD5bbd00ec4e0a57e9c3bc8b57c6d22e4ac
SHA1c0463ce8ef9dcf563e4321ffcdf86ca4ee2a8b97
SHA256ef459820a29f16850147c08c143b76a58990c1813edaaf5bfad20aa05e65a4d8
SHA512178017fb9fd541aba2d342829c0f81411d334b826eb0a003a4654734bfb58364b6e130f749454d32b61e2a55a8e552a9986fece6b1db34ed18396c27c84c9419
-
Filesize
726.7MB
MD5bbd00ec4e0a57e9c3bc8b57c6d22e4ac
SHA1c0463ce8ef9dcf563e4321ffcdf86ca4ee2a8b97
SHA256ef459820a29f16850147c08c143b76a58990c1813edaaf5bfad20aa05e65a4d8
SHA512178017fb9fd541aba2d342829c0f81411d334b826eb0a003a4654734bfb58364b6e130f749454d32b61e2a55a8e552a9986fece6b1db34ed18396c27c84c9419
-
Filesize
52KB
MD513e943e4a218b36c30fcc7fe865d5d93
SHA19fb188959cc18b754db75a50240973abe05d1635
SHA2563fd21096eba51f31191f95a3771c54274748666f101868a5b061847f0853cdb4
SHA512c3d646f145f7044d37fbd7eaecba508eb8d54be4741216c9d75e43f44c0370dcc67d05566e9772519f44c1c34e3bda77466e7a12ce0cd6b00e7e895ec5d6241f
-
Filesize
52KB
MD513e943e4a218b36c30fcc7fe865d5d93
SHA19fb188959cc18b754db75a50240973abe05d1635
SHA2563fd21096eba51f31191f95a3771c54274748666f101868a5b061847f0853cdb4
SHA512c3d646f145f7044d37fbd7eaecba508eb8d54be4741216c9d75e43f44c0370dcc67d05566e9772519f44c1c34e3bda77466e7a12ce0cd6b00e7e895ec5d6241f
-
Filesize
52KB
MD513e943e4a218b36c30fcc7fe865d5d93
SHA19fb188959cc18b754db75a50240973abe05d1635
SHA2563fd21096eba51f31191f95a3771c54274748666f101868a5b061847f0853cdb4
SHA512c3d646f145f7044d37fbd7eaecba508eb8d54be4741216c9d75e43f44c0370dcc67d05566e9772519f44c1c34e3bda77466e7a12ce0cd6b00e7e895ec5d6241f
-
Filesize
182.0MB
MD59c4178458be3e9e167c2a961ff3f1257
SHA16ada4a0c970944e3378f51b4940c2a476a81eb3a
SHA256e0bf44cd02143e61175a20ad446f4db7e2d47e680b76d360c227d88fe875b8e8
SHA5129f4edf8e00e9460b90d5e473f174825e48c1fc33ae4b10d234ed1108055721a0523454bf1b9ee2c7e4629b63ab4bd7ab936fb3105a9545101c38b87f9c54cac8
-
Filesize
178.2MB
MD504104a7396a4e1801d27f29da33ebbd1
SHA1bcf1afdac293ee2f9b5ffd453500434fcf4efb28
SHA25628e0982f22973cd9f586f63d0f3ec4c92e21bcb65df3c333a7f841bbe7b4d090
SHA512db8d80491f504647bc398262c1f7ffc8293d65446c485d650adf37a13adcb35abba177d9e4afef0d09f8784b3757dd8f8ec041e8abb147de20612d2475630426