Analysis
-
max time kernel
137s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03-05-2023 01:26
Static task
static1
Behavioral task
behavioral1
Sample
a38740f27d72f631a071f9b8d4707b4c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a38740f27d72f631a071f9b8d4707b4c.exe
Resource
win10v2004-20230220-en
General
-
Target
a38740f27d72f631a071f9b8d4707b4c.exe
-
Size
238KB
-
MD5
a38740f27d72f631a071f9b8d4707b4c
-
SHA1
3dae530f1fa4329bdb10d79ae20fa56e77b19ae5
-
SHA256
967c720bf123abc4385306cd0ce6c25fa515b2c107c2ae6f670e4d863912a660
-
SHA512
da87468cebb4f835c6b5ca84bdef1852ec242e269173f344c85bab821e974dda16f7ce1d07c72c94916b8a59fade6e053a8bea3381e7702789ce5870c312e735
-
SSDEEP
6144:yKvu7/cjSdN2K5YU13i3o4Ms2eXAOt3va:yQEgSdNjeXby
Malware Config
Extracted
laplas
http://65.109.140.234
-
api_key
df447cf68e10f5a0e77c16bf0c96d9b97c6c34c9cb2157c2676b9d321b5633cc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2044 svcservice.exe -
Loads dropped DLL 1 IoCs
pid Process 2040 a38740f27d72f631a071f9b8d4707b4c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" a38740f27d72f631a071f9b8d4707b4c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2044 2040 a38740f27d72f631a071f9b8d4707b4c.exe 28 PID 2040 wrote to memory of 2044 2040 a38740f27d72f631a071f9b8d4707b4c.exe 28 PID 2040 wrote to memory of 2044 2040 a38740f27d72f631a071f9b8d4707b4c.exe 28 PID 2040 wrote to memory of 2044 2040 a38740f27d72f631a071f9b8d4707b4c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a38740f27d72f631a071f9b8d4707b4c.exe"C:\Users\Admin\AppData\Local\Temp\a38740f27d72f631a071f9b8d4707b4c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
PID:2044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
841.2MB
MD5addcd7cf321e31020b4c9a841c7535cc
SHA163d0a49663d8cb558e7fd284e06f5777ba5bd1a2
SHA256cf11c8dac5aca7106dde3e124e4c3be8344c10d423e1e86b6bc509f2c305d9e1
SHA51212011572fe005bc376ceda99f1c275cc0a54bdf1df925c6eca705cf4975401007f9b3b235f672d8ed3ece42da8b8be97ab156bc9a20a47ad80b1677fcc802eca
-
Filesize
841.2MB
MD5addcd7cf321e31020b4c9a841c7535cc
SHA163d0a49663d8cb558e7fd284e06f5777ba5bd1a2
SHA256cf11c8dac5aca7106dde3e124e4c3be8344c10d423e1e86b6bc509f2c305d9e1
SHA51212011572fe005bc376ceda99f1c275cc0a54bdf1df925c6eca705cf4975401007f9b3b235f672d8ed3ece42da8b8be97ab156bc9a20a47ad80b1677fcc802eca