Analysis
-
max time kernel
128s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03-05-2023 01:26
Static task
static1
Behavioral task
behavioral1
Sample
a38740f27d72f631a071f9b8d4707b4c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a38740f27d72f631a071f9b8d4707b4c.exe
Resource
win10v2004-20230220-en
General
-
Target
a38740f27d72f631a071f9b8d4707b4c.exe
-
Size
238KB
-
MD5
a38740f27d72f631a071f9b8d4707b4c
-
SHA1
3dae530f1fa4329bdb10d79ae20fa56e77b19ae5
-
SHA256
967c720bf123abc4385306cd0ce6c25fa515b2c107c2ae6f670e4d863912a660
-
SHA512
da87468cebb4f835c6b5ca84bdef1852ec242e269173f344c85bab821e974dda16f7ce1d07c72c94916b8a59fade6e053a8bea3381e7702789ce5870c312e735
-
SSDEEP
6144:yKvu7/cjSdN2K5YU13i3o4Ms2eXAOt3va:yQEgSdNjeXby
Malware Config
Extracted
laplas
http://65.109.140.234
-
api_key
df447cf68e10f5a0e77c16bf0c96d9b97c6c34c9cb2157c2676b9d321b5633cc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 672 svcservice.exe -
Loads dropped DLL 1 IoCs
pid Process 928 a38740f27d72f631a071f9b8d4707b4c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" a38740f27d72f631a071f9b8d4707b4c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 928 wrote to memory of 672 928 a38740f27d72f631a071f9b8d4707b4c.exe 28 PID 928 wrote to memory of 672 928 a38740f27d72f631a071f9b8d4707b4c.exe 28 PID 928 wrote to memory of 672 928 a38740f27d72f631a071f9b8d4707b4c.exe 28 PID 928 wrote to memory of 672 928 a38740f27d72f631a071f9b8d4707b4c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a38740f27d72f631a071f9b8d4707b4c.exe"C:\Users\Admin\AppData\Local\Temp\a38740f27d72f631a071f9b8d4707b4c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
PID:672
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749.2MB
MD5dbddb36e2b1139c95337f053f3c599ba
SHA1b00a7e604e682cb07bd055255bbd52c9955e3526
SHA25666c34fed2d074e459c7fecd2db0fef45cf1cda38c336e1c1432ad19e8a9c7f9a
SHA5122fc5795ef17a36755bfac782c6af559b6447b49ee0120063fd74559bf88749ba6cd4e9b96fe2d2ec93db78e3e495083d6e3f512f5c442cf17cbd0a8c9a47653e
-
Filesize
749.2MB
MD5dbddb36e2b1139c95337f053f3c599ba
SHA1b00a7e604e682cb07bd055255bbd52c9955e3526
SHA25666c34fed2d074e459c7fecd2db0fef45cf1cda38c336e1c1432ad19e8a9c7f9a
SHA5122fc5795ef17a36755bfac782c6af559b6447b49ee0120063fd74559bf88749ba6cd4e9b96fe2d2ec93db78e3e495083d6e3f512f5c442cf17cbd0a8c9a47653e