Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18-04-2023 13:04
Static task
static1
Behavioral task
behavioral1
Sample
svcservice.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
svcservice.exe
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
svcservice.exe
Resource
win10v2004-20230220-en
General
-
Target
svcservice.exe
-
Size
1023.8MB
-
MD5
9112d21551cffc1149f0e11d44afbec0
-
SHA1
cd1751ed7525adafdbcf44e6cc1dd0dad1b760c8
-
SHA256
723710eaf3beac67ea9191491824d50bd3398951341cea790aabef634a412871
-
SHA512
2983e1a653a81b711d2bfe68897934efdd07ca1d02adfe18a903d7cde18af522a03b17f2db273938ef6cc6872bd40950f498d6e60dfef2f522b01d6195d431d6
-
SSDEEP
3145728:m33333333333333333333333333333333333333333333333333333333333333y:P
Malware Config
Extracted
laplas
http://nerf-0150-unknown.guru
-
api_key
afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1068 svcservice.exe -
Loads dropped DLL 1 IoCs
pid Process 904 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 904 wrote to memory of 1068 904 svcservice.exe 27 PID 904 wrote to memory of 1068 904 svcservice.exe 27 PID 904 wrote to memory of 1068 904 svcservice.exe 27 PID 904 wrote to memory of 1068 904 svcservice.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\svcservice.exe"C:\Users\Admin\AppData\Local\Temp\svcservice.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
PID:1068
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
632.6MB
MD5a24a7d7a77e981a96194e38df5732342
SHA14f4b14c6ee56e6ced026602bdfad31be1b3bbd23
SHA256e0bcf822a92be6b488617875ef77917e4cfda5d61e3b0b4654ac41822fa07534
SHA51260060b5993d2df355d36679cf5f533da50c43abc01c6edeec6a5d431bd93bc6ba41a45c60647fc7fa3a999ba611a375104dd335748d1523a72eff18cabe5ef7e
-
Filesize
632.9MB
MD5264423e46e47151dec518b066e5d67d0
SHA14b02c4de85edd91654cb140ba2e669cdfc28a088
SHA256d1ddf8ce00fa92f9f2ef277d8c5019295d981244ee7d37e91446ff7c0f06c024
SHA512f2e5adc800aa2fd8b52f154abf365592727017d8ff0b0d39b50a518ed6ff7cfaf8cf3657de88a8d6ea1d9c9f9f0f9c7bf7551e351a846219bd1dcdf8784b4e6b