Analysis
-
max time kernel
134s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2023 23:00
Static task
static1
Behavioral task
behavioral1
Sample
vadwax.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
vadwax.exe
Resource
win10v2004-20230220-en
General
-
Target
vadwax.exe
-
Size
1205.9MB
-
MD5
2bdd63a7fd97796129b56bd964c8af83
-
SHA1
5ea8f5f06cb702b4e8d205cc08b860ffd2239c87
-
SHA256
f91d9de259052595946250a1440a2457dbda9ee8aec8add24419ff939f13e003
-
SHA512
f0383898783a2194e5a91de0d923a924787c40aa29f0095ef20bdef9e80ad515b7493edd1f5335b8c52e9b68469165103f92d6095a97a2e36a16f4b310582a7f
-
SSDEEP
196608:HW36QOxQ8JEgOpcqGs4anqH4mJsMQOgKmEiTBh:S63Q8JExpIGnqYxMNmEiTf
Malware Config
Extracted
laplas
http://85.192.40.252
-
api_key
a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation vadwax.exe -
Executes dropped EXE 1 IoCs
pid Process 4632 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" vadwax.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2232 vadwax.exe 2232 vadwax.exe 2232 vadwax.exe 2232 vadwax.exe 4632 svcservice.exe 4632 svcservice.exe 4632 svcservice.exe 4632 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2232 wrote to memory of 4632 2232 vadwax.exe 91 PID 2232 wrote to memory of 4632 2232 vadwax.exe 91 PID 2232 wrote to memory of 4632 2232 vadwax.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\vadwax.exe"C:\Users\Admin\AppData\Local\Temp\vadwax.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
553.4MB
MD5bc20369eec0916f2d986d412956edd85
SHA1e0ef5ffd85e37bbda5ac79d21d75f444991acc02
SHA256e769a5d76b8c02c39cc4c5cc5014ba8348c7f8595cc7baa65ea2ffbcc33e0722
SHA5120ef7ae063d9d60ad0e06f517862b02bc48452c6aa9e6a958c66081a84c7c43903086377d2f5974cd9dce133b79bfad4bfa3541a153c22f604ca82daa227b9b40
-
Filesize
610.4MB
MD529cb9c09c0244557c56ab06e0fd7fbe0
SHA11d1518d6f7c0b6b420d1fd266ee11ba831c5b9aa
SHA25655753d34d714f6203e674b970a00163312ec253e28d762c6f987c3b13e525d58
SHA5128b7f3ee391a24c54e83e86d42e856d233d456f217026c9b533b44991cbc6bd91b3cb01c8df24f48dfacca9d7d7cb1b613deb8d9e94fc68c362261a11bbc7c10a
-
Filesize
635.3MB
MD5ca507bd7c5febe2ec8407867530e6b73
SHA1976e354d64916187b9802ec12e8a309e601ea428
SHA256565dbd61e8b33e669e2c68f08d5367a8a7ec52624b3c6793a7942d5d0eedda9a
SHA5124adb08ae2607b1fb2004e0c274864d9740717551ae0a7904baa589beb47e1e61b829ec709a09f5fa209d057a03ef86961d9ccee5950996d6c790d9be1e917a1e