Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15-04-2023 23:06
Static task
static1
Behavioral task
behavioral1
Sample
c90442c160b897ea1e79e1aaca50296c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c90442c160b897ea1e79e1aaca50296c.exe
Resource
win10v2004-20230220-en
General
-
Target
c90442c160b897ea1e79e1aaca50296c.exe
-
Size
10.9MB
-
MD5
c90442c160b897ea1e79e1aaca50296c
-
SHA1
88589ab90bc29923cb42e36cda6d534702ed1f57
-
SHA256
c5c70d32d8ad4b655b43c14548aebd22c1c500ed0639dbb85580d1a8013329e4
-
SHA512
c6bee6fae6b7534258c853ddfec03217e83e11bf11e7bb1af9ffbd3e734944a9f3d142f47962b32a81455ce5e97e3e2949ea2786efd72161ddc693a5115b692c
-
SSDEEP
196608:5HatuBgIpTVbThhJLvzwKVKgvFXv1bbPCQHHB:5/gEVTpZVKSFvoQHHB
Malware Config
Extracted
laplas
http://185.106.92.74
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1472 svcservice.exe -
Loads dropped DLL 1 IoCs
pid Process 2036 c90442c160b897ea1e79e1aaca50296c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" c90442c160b897ea1e79e1aaca50296c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2036 c90442c160b897ea1e79e1aaca50296c.exe 2036 c90442c160b897ea1e79e1aaca50296c.exe 1472 svcservice.exe 1472 svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2036 c90442c160b897ea1e79e1aaca50296c.exe 1472 svcservice.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1472 2036 c90442c160b897ea1e79e1aaca50296c.exe 26 PID 2036 wrote to memory of 1472 2036 c90442c160b897ea1e79e1aaca50296c.exe 26 PID 2036 wrote to memory of 1472 2036 c90442c160b897ea1e79e1aaca50296c.exe 26 PID 2036 wrote to memory of 1472 2036 c90442c160b897ea1e79e1aaca50296c.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\c90442c160b897ea1e79e1aaca50296c.exe"C:\Users\Admin\AppData\Local\Temp\c90442c160b897ea1e79e1aaca50296c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
589.9MB
MD576e31cfb7c9184026a14152e071e1a49
SHA1ec2fdb377c6caa368e9c94bc1f429d8e2cf93cbd
SHA2565423e9416aa2f090f34ce0464b5ca318b21c0f1239b596d35c673aae1cdd51d3
SHA512a6b56e39d8132aaef5b45d62b35286803b8181f010788c442ecc01561e03dc9d780d6be7ed55c6b62d3b8734a4f02ff3f7f39585cc08baff98d886d8426fc884
-
Filesize
614.0MB
MD5486c43a59288293be6a6d6e4780ca7c3
SHA1173a615889f5b25daa94b6e2a3ef181bd26e5e07
SHA2569296520b90a1fa4c13b276b3dd1809cd13fedc59bb8bc70d3284ba7cf3013b01
SHA5125122bdec04c0da6b07012b9230807e4faf1d111d88624a6b4705031fff0c8b8d41139471007dc9bd5a6c6b0130b91868e5cea0c821ca9e80d41d5d81488edbb4
-
Filesize
560.2MB
MD50727a5cc5eb93def5bf029626eb9bbbe
SHA14380cca9851eb946247ba5dc84b61013969a0542
SHA256d4be75339c732a368ef6c59cffa9db546a60de20c87dbc637b2f4bf20d325646
SHA512bca2758142d0979314835ad542fd2a91e9ca5a8b08619958cbe0d34031300a85cdbfbbdcd931c02e807d8e7ab2e551ed7ae460025954c0822f26ae2d7ac7a97f