Analysis
-
max time kernel
125s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2023 23:06
Static task
static1
Behavioral task
behavioral1
Sample
c90442c160b897ea1e79e1aaca50296c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c90442c160b897ea1e79e1aaca50296c.exe
Resource
win10v2004-20230220-en
General
-
Target
c90442c160b897ea1e79e1aaca50296c.exe
-
Size
10.9MB
-
MD5
c90442c160b897ea1e79e1aaca50296c
-
SHA1
88589ab90bc29923cb42e36cda6d534702ed1f57
-
SHA256
c5c70d32d8ad4b655b43c14548aebd22c1c500ed0639dbb85580d1a8013329e4
-
SHA512
c6bee6fae6b7534258c853ddfec03217e83e11bf11e7bb1af9ffbd3e734944a9f3d142f47962b32a81455ce5e97e3e2949ea2786efd72161ddc693a5115b692c
-
SSDEEP
196608:5HatuBgIpTVbThhJLvzwKVKgvFXv1bbPCQHHB:5/gEVTpZVKSFvoQHHB
Malware Config
Extracted
laplas
http://185.106.92.74
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation c90442c160b897ea1e79e1aaca50296c.exe -
Executes dropped EXE 1 IoCs
pid Process 2736 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" c90442c160b897ea1e79e1aaca50296c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1256 c90442c160b897ea1e79e1aaca50296c.exe 1256 c90442c160b897ea1e79e1aaca50296c.exe 2736 svcservice.exe 2736 svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1256 c90442c160b897ea1e79e1aaca50296c.exe 1256 c90442c160b897ea1e79e1aaca50296c.exe 2736 svcservice.exe 2736 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1256 wrote to memory of 2736 1256 c90442c160b897ea1e79e1aaca50296c.exe 84 PID 1256 wrote to memory of 2736 1256 c90442c160b897ea1e79e1aaca50296c.exe 84 PID 1256 wrote to memory of 2736 1256 c90442c160b897ea1e79e1aaca50296c.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\c90442c160b897ea1e79e1aaca50296c.exe"C:\Users\Admin\AppData\Local\Temp\c90442c160b897ea1e79e1aaca50296c.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2736
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
726.9MB
MD5806121dc14d214b0677a9dcb22ab9cc8
SHA1b9a72e57e548b0a4e6612ee57a1b71303f428b23
SHA2567f3b37dda095b1dec6a1b79c9c5c2dea9abaab02e0a04d6418207fed064ad7a8
SHA512da7d2e47ac5fd98c0e123c21654e34574efa85f059bbaa3414226c00ef051e2c9d74a7c15ebf300f6f7296c321397701b29daf5b37e770457d14a765a8a16bb0
-
Filesize
726.9MB
MD5806121dc14d214b0677a9dcb22ab9cc8
SHA1b9a72e57e548b0a4e6612ee57a1b71303f428b23
SHA2567f3b37dda095b1dec6a1b79c9c5c2dea9abaab02e0a04d6418207fed064ad7a8
SHA512da7d2e47ac5fd98c0e123c21654e34574efa85f059bbaa3414226c00ef051e2c9d74a7c15ebf300f6f7296c321397701b29daf5b37e770457d14a765a8a16bb0
-
Filesize
726.9MB
MD5806121dc14d214b0677a9dcb22ab9cc8
SHA1b9a72e57e548b0a4e6612ee57a1b71303f428b23
SHA2567f3b37dda095b1dec6a1b79c9c5c2dea9abaab02e0a04d6418207fed064ad7a8
SHA512da7d2e47ac5fd98c0e123c21654e34574efa85f059bbaa3414226c00ef051e2c9d74a7c15ebf300f6f7296c321397701b29daf5b37e770457d14a765a8a16bb0