Analysis
-
max time kernel
103s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-04-2023 13:27
Static task
static1
Behavioral task
behavioral1
Sample
vdcs.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
vdcs.exe
Resource
win10v2004-20230220-en
General
-
Target
vdcs.exe
-
Size
726.4MB
-
MD5
8e550f6a030e464657cad196e93b54ef
-
SHA1
2ccc4dbb3efe605dd3d68cacbd98ecbb91c42284
-
SHA256
8a4556d74daa2806d18dc91baacd78214e0aec0403daf9cbfdf75b18894a1eb0
-
SHA512
e59aae5ac79c667bbdf52dc26108610c6e871da231122c36117c94b103a60bd20ed59b30ae4dae520c777574f76a1e6199fe2606d7cdb888a7f9da20b66d7ba9
-
SSDEEP
98304:ponC5g4H7xXJqStkoRYXGRdKocRaG/n85B7Gv9n+J4P6F9RuBhSMf5rXEAxbxtq2:pz5z1JNSo2XlzuB7M9nRYuXzf+ABZb
Malware Config
Extracted
laplas
http://85.192.40.252
-
api_key
a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation vdcs.exe -
Executes dropped EXE 1 IoCs
pid Process 3620 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" vdcs.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3900 vdcs.exe 3900 vdcs.exe 3620 svcservice.exe 3620 svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3900 vdcs.exe 3900 vdcs.exe 3900 vdcs.exe 3900 vdcs.exe 3620 svcservice.exe 3620 svcservice.exe 3620 svcservice.exe 3620 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3900 wrote to memory of 3620 3900 vdcs.exe 90 PID 3900 wrote to memory of 3620 3900 vdcs.exe 90 PID 3900 wrote to memory of 3620 3900 vdcs.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\vdcs.exe"C:\Users\Admin\AppData\Local\Temp\vdcs.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
682.3MB
MD56eb73cfa6dbb32d7c88ce0f2e868af94
SHA18e7642a6216700844ba66b546ef66fa45241fb0a
SHA256619bc9086588f40d938cdf9b25c7c4d198e544d64bcc613e250b8404bbad3d12
SHA5127695060fc19e9fda3f11672e0132bb338ee517b53bd3da6db3052be23ec4941787d47240fd70884894e5810b9b44692d05d929856b821ab0486264a26c3cb05a
-
Filesize
717.0MB
MD56cd025edeadcf29fe9018a1b6121945e
SHA1583b31517b1824df22563fd33ff4b82bd866a732
SHA256e3f9618ebbe159bcfcb1b7617938e39c5e63cb9d7fd9bd7a814f10773f77ae2d
SHA51217b8658f248026cade2b0fd8a8e0fdd04f54de9d87b2bb39f147942306aec8dde9092bc015cd9e73141ff139a4d2239da8dab99e483a94ba5e300635fc0ad891
-
Filesize
645.5MB
MD5add4d2adc8b093265e8983421b1bff88
SHA1d57cc84551863e15fde473368d8dbf2c1ed5b434
SHA256ca912d96d7d4af5df8e1a25a222a71161d138617ceb7a093726626f3eb7881a2
SHA512ad113e1033675a1c2fe835b1087c34a758865b5e4c903799ed35c0faa5f77dacb931d7083aba0c499b1eb6f2aff945e9ab28f6d8ebe267e3401da8823ed19ab4