Analysis
-
max time kernel
128s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03-05-2023 01:30
Static task
static1
Behavioral task
behavioral1
Sample
a38740f27d72f631a071f9b8d4707b4c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a38740f27d72f631a071f9b8d4707b4c.exe
Resource
win10v2004-20230220-en
General
-
Target
a38740f27d72f631a071f9b8d4707b4c.exe
-
Size
238KB
-
MD5
a38740f27d72f631a071f9b8d4707b4c
-
SHA1
3dae530f1fa4329bdb10d79ae20fa56e77b19ae5
-
SHA256
967c720bf123abc4385306cd0ce6c25fa515b2c107c2ae6f670e4d863912a660
-
SHA512
da87468cebb4f835c6b5ca84bdef1852ec242e269173f344c85bab821e974dda16f7ce1d07c72c94916b8a59fade6e053a8bea3381e7702789ce5870c312e735
-
SSDEEP
6144:yKvu7/cjSdN2K5YU13i3o4Ms2eXAOt3va:yQEgSdNjeXby
Malware Config
Extracted
laplas
http://65.109.140.234
-
api_key
df447cf68e10f5a0e77c16bf0c96d9b97c6c34c9cb2157c2676b9d321b5633cc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 548 svcservice.exe -
Loads dropped DLL 1 IoCs
pid Process 1636 a38740f27d72f631a071f9b8d4707b4c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" a38740f27d72f631a071f9b8d4707b4c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1636 wrote to memory of 548 1636 a38740f27d72f631a071f9b8d4707b4c.exe 27 PID 1636 wrote to memory of 548 1636 a38740f27d72f631a071f9b8d4707b4c.exe 27 PID 1636 wrote to memory of 548 1636 a38740f27d72f631a071f9b8d4707b4c.exe 27 PID 1636 wrote to memory of 548 1636 a38740f27d72f631a071f9b8d4707b4c.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\a38740f27d72f631a071f9b8d4707b4c.exe"C:\Users\Admin\AppData\Local\Temp\a38740f27d72f631a071f9b8d4707b4c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
PID:548
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
729.2MB
MD543e059354993ea861d6a74f5fe188a32
SHA103b02152de406d4c475868a9045db0dc54ad414a
SHA256fdc3c4b5ac0b5519f1cacf83deab680b6614d4f4eb4f56a87e58298145c4aa04
SHA512980c59869ce7f241d8c72a012eca0b41632157a386e93298949275d9ae6d7fe974f8c60d2bf2c238ff42bced95436cd67c07cba621f63b30a7272b4d7a77484f
-
Filesize
729.2MB
MD543e059354993ea861d6a74f5fe188a32
SHA103b02152de406d4c475868a9045db0dc54ad414a
SHA256fdc3c4b5ac0b5519f1cacf83deab680b6614d4f4eb4f56a87e58298145c4aa04
SHA512980c59869ce7f241d8c72a012eca0b41632157a386e93298949275d9ae6d7fe974f8c60d2bf2c238ff42bced95436cd67c07cba621f63b30a7272b4d7a77484f