Analysis
-
max time kernel
132s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2023 13:55
Static task
static1
Behavioral task
behavioral1
Sample
clifdthjsjkdgaoker.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
clifdthjsjkdgaoker.exe
Resource
win10v2004-20230220-en
General
-
Target
clifdthjsjkdgaoker.exe
-
Size
7.5MB
-
MD5
fb0deff37fe12bbc4f0c1fe21e2d15ef
-
SHA1
180325b8b6e64638e167601c67cd9c53331ba9f6
-
SHA256
ece100b8240f7eb032cb319a019eba1552ac19f563a291cf8422b1090ccf9b76
-
SHA512
9fc013111994e943fd800abeb543563713eebebcd940b28973809a40d85271f0ed781dd95ca508e55788de2e2a575b1cb8734636f15b51a9d68f773b2cb4e73d
-
SSDEEP
196608:bdj1WcTeKCVpVAKegYv6Pvz7xCVfQeYDprOtpN6x1Cd:RReKaAlRgxMfvihOwxy
Malware Config
Extracted
laplas
http://185.174.137.94
-
api_key
b54641cc29f95948635d659de94166b4528e39706396a99bb9c54497b2ee3421
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation clifdthjsjkdgaoker.exe -
Executes dropped EXE 1 IoCs
pid Process 3484 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" clifdthjsjkdgaoker.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3128 clifdthjsjkdgaoker.exe 3128 clifdthjsjkdgaoker.exe 3484 svcservice.exe 3484 svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3128 clifdthjsjkdgaoker.exe 3128 clifdthjsjkdgaoker.exe 3128 clifdthjsjkdgaoker.exe 3128 clifdthjsjkdgaoker.exe 3484 svcservice.exe 3484 svcservice.exe 3484 svcservice.exe 3484 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3128 wrote to memory of 3484 3128 clifdthjsjkdgaoker.exe 90 PID 3128 wrote to memory of 3484 3128 clifdthjsjkdgaoker.exe 90 PID 3128 wrote to memory of 3484 3128 clifdthjsjkdgaoker.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\clifdthjsjkdgaoker.exe"C:\Users\Admin\AppData\Local\Temp\clifdthjsjkdgaoker.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
756.5MB
MD51de5ce660740b2493b536a4c5ab48bf8
SHA1b9b55a828e058452e0e633219f44bdfd2c89508a
SHA2560068134861d3efdcd1782644238e68c8876fa069e41f2a0dfc4303ceadc84d1b
SHA512247c368514e5d0f24367fa6bf70ee2d2a50d2e931bdbd66103f995a8aaad27ddede962eaed9c936df551f086bb080a5935f1e4a8e8944e0787ba90d5473d91ff
-
Filesize
733.9MB
MD5b561219bd475429132ff628b8ddd0653
SHA1dcde09629848972128502b528a7ea226ac7b912b
SHA256a3ade6a1e269639e2de033a886f832919112973c20d5a28549126bb7afa37c86
SHA5126731442052d85f0fa27c8447879617dbf82500c11bfc96c207b5734be24dd1087275bf1d94b64c3bd5839587bf725cd3c57a5f04ea0fb94cd7fd6732853ebfc2
-
Filesize
720.1MB
MD54cb17ba810397e152525db2587822835
SHA10870d09c26bf1bcc0dbcae60709a8cbe56c87cab
SHA256ceefb20e2ae97ed7c63c39d59b17f08b92c11870827ee65b54a02229c723abc1
SHA512993d607ceb1c6571f5437d34978c5320d89cf5d0d701d09c8a5ca0a36dfcff58f8217ed09b6b44ab42336729efebd8b5cc668af14c7f5f5a682a8ead853259e8