Analysis
-
max time kernel
126s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 18:47
Static task
static1
Behavioral task
behavioral1
Sample
a38740f27d72f631a071f9b8d4707b4c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a38740f27d72f631a071f9b8d4707b4c.exe
Resource
win10v2004-20230220-en
General
-
Target
a38740f27d72f631a071f9b8d4707b4c.exe
-
Size
238KB
-
MD5
a38740f27d72f631a071f9b8d4707b4c
-
SHA1
3dae530f1fa4329bdb10d79ae20fa56e77b19ae5
-
SHA256
967c720bf123abc4385306cd0ce6c25fa515b2c107c2ae6f670e4d863912a660
-
SHA512
da87468cebb4f835c6b5ca84bdef1852ec242e269173f344c85bab821e974dda16f7ce1d07c72c94916b8a59fade6e053a8bea3381e7702789ce5870c312e735
-
SSDEEP
6144:yKvu7/cjSdN2K5YU13i3o4Ms2eXAOt3va:yQEgSdNjeXby
Malware Config
Extracted
laplas
http://65.109.140.234
-
api_key
df447cf68e10f5a0e77c16bf0c96d9b97c6c34c9cb2157c2676b9d321b5633cc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1988 svcservice.exe -
Loads dropped DLL 1 IoCs
pid Process 2040 a38740f27d72f631a071f9b8d4707b4c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" a38740f27d72f631a071f9b8d4707b4c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1988 2040 a38740f27d72f631a071f9b8d4707b4c.exe 28 PID 2040 wrote to memory of 1988 2040 a38740f27d72f631a071f9b8d4707b4c.exe 28 PID 2040 wrote to memory of 1988 2040 a38740f27d72f631a071f9b8d4707b4c.exe 28 PID 2040 wrote to memory of 1988 2040 a38740f27d72f631a071f9b8d4707b4c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a38740f27d72f631a071f9b8d4707b4c.exe"C:\Users\Admin\AppData\Local\Temp\a38740f27d72f631a071f9b8d4707b4c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
PID:1988
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
807.2MB
MD50001f0e10616f62e89530855e91afcf5
SHA1ad8f4da28cd36c53781f9076b361b1ba3789f27e
SHA256c0bac4fa73aacaabf52cc98911c036a95cf60ea4d7ee37da53acff6f2b2bc6d1
SHA512fc12d6383f7384798e1b8aa8ac862061800c5e6409ca89d994d32d3de9cd34f213033222621aec661cf5a55004fa6c3c1b2ab297bb3e26d181e889f9c7d18122
-
Filesize
807.2MB
MD50001f0e10616f62e89530855e91afcf5
SHA1ad8f4da28cd36c53781f9076b361b1ba3789f27e
SHA256c0bac4fa73aacaabf52cc98911c036a95cf60ea4d7ee37da53acff6f2b2bc6d1
SHA512fc12d6383f7384798e1b8aa8ac862061800c5e6409ca89d994d32d3de9cd34f213033222621aec661cf5a55004fa6c3c1b2ab297bb3e26d181e889f9c7d18122