Analysis
-
max time kernel
260s -
max time network
263s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-04-2023 19:24
Static task
static1
Behavioral task
behavioral1
Sample
sima.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
sima.exe
Resource
win10v2004-20230220-en
General
-
Target
sima.exe
-
Size
7.2MB
-
MD5
c5e0fb4ecaa8a7481a283099d604f7a0
-
SHA1
df4b0c0cc823da2b0443076650c292b43dd9de33
-
SHA256
c6c03e97c5de0c9eb264e4914d8c7f64d7e3528cc696f613e451a294262f3c42
-
SHA512
375677d0cc802b09c7d1532d162a91a8eec4679f7639ef38dca9a9d3a03e20b3ab54707af7ffb138d00ec93ea4b34b6db0b33f365dc888ff9056c808a239bc57
-
SSDEEP
196608:5HatuBgIpTVbThhJLvzwKVKgvFXv1bbPC:5/gEVTpZVKSFvo
Malware Config
Extracted
laplas
http://185.106.92.74
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 468 svcservice.exe -
Loads dropped DLL 1 IoCs
pid Process 1092 sima.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" sima.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1092 sima.exe 1092 sima.exe 468 svcservice.exe 468 svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1092 sima.exe 468 svcservice.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1092 wrote to memory of 468 1092 sima.exe 28 PID 1092 wrote to memory of 468 1092 sima.exe 28 PID 1092 wrote to memory of 468 1092 sima.exe 28 PID 1092 wrote to memory of 468 1092 sima.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\sima.exe"C:\Users\Admin\AppData\Local\Temp\sima.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:468
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CMIDRLTB\regex[2].txt
Filesize633B
MD5c5298d2c78be8fdfc264eb6fe3e275f8
SHA1f09de5f443da081efaff0155f422ca0375edd164
SHA256de32b3c0549fde0dc5ac435a89f16a87832a0632b6602e75f552d07074081577
SHA5125aeb5013b00e13cd8a172639bc7c675bd06cc0473ae9844c9c324e5c322987ddeff986bd4a8e620ce0ca9d1098a3ee8bbb4802789d1e89b0ec0cecf2f55a4853
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UOYUJSME\online[2].txt
Filesize2B
MD5444bcb3a3fcf8389296c49467f27e1d6
SHA17a85f4764bbd6daf1c3545efbbf0f279a6dc0beb
SHA2562689367b205c16ce32ed4200942b8b8b1e262dfc70d9bc9fbc77c49699a4f1df
SHA5129fbbbb5a0f329f9782e2356fa41d89cf9b3694327c1a934d6af2a9df2d7f936ce83717fb513196a4ce5548471708cd7134c2ae99b3c357bcabb2eafc7b9b7570
-
Filesize
771.2MB
MD5771a655a6bb533dbe36a24dd8fee70ad
SHA175b0016240daf5c08112bfff86c29f75c771f5b0
SHA256cbfab9847e2ff33aaab9fe8e158768a30debae62da3a63bc566187190207dca5
SHA51208a7ca83670f7cd2bc275aacf7697088f0aacf3f5cbfda1976613d9c52c33f6735c4721b592a0a5e75aef4a1557eac47feade97bcd9d99db0bd73e7058268a4b
-
Filesize
771.2MB
MD5771a655a6bb533dbe36a24dd8fee70ad
SHA175b0016240daf5c08112bfff86c29f75c771f5b0
SHA256cbfab9847e2ff33aaab9fe8e158768a30debae62da3a63bc566187190207dca5
SHA51208a7ca83670f7cd2bc275aacf7697088f0aacf3f5cbfda1976613d9c52c33f6735c4721b592a0a5e75aef4a1557eac47feade97bcd9d99db0bd73e7058268a4b
-
Filesize
771.2MB
MD5771a655a6bb533dbe36a24dd8fee70ad
SHA175b0016240daf5c08112bfff86c29f75c771f5b0
SHA256cbfab9847e2ff33aaab9fe8e158768a30debae62da3a63bc566187190207dca5
SHA51208a7ca83670f7cd2bc275aacf7697088f0aacf3f5cbfda1976613d9c52c33f6735c4721b592a0a5e75aef4a1557eac47feade97bcd9d99db0bd73e7058268a4b