Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2023 17:55
Static task
static1
Behavioral task
behavioral1
Sample
clifdthjsjkdgaoker.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
clifdthjsjkdgaoker.exe
Resource
win10v2004-20230220-en
General
-
Target
clifdthjsjkdgaoker.exe
-
Size
7.5MB
-
MD5
fb0deff37fe12bbc4f0c1fe21e2d15ef
-
SHA1
180325b8b6e64638e167601c67cd9c53331ba9f6
-
SHA256
ece100b8240f7eb032cb319a019eba1552ac19f563a291cf8422b1090ccf9b76
-
SHA512
9fc013111994e943fd800abeb543563713eebebcd940b28973809a40d85271f0ed781dd95ca508e55788de2e2a575b1cb8734636f15b51a9d68f773b2cb4e73d
-
SSDEEP
196608:bdj1WcTeKCVpVAKegYv6Pvz7xCVfQeYDprOtpN6x1Cd:RReKaAlRgxMfvihOwxy
Malware Config
Extracted
laplas
http://185.174.137.94
-
api_key
b54641cc29f95948635d659de94166b4528e39706396a99bb9c54497b2ee3421
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation clifdthjsjkdgaoker.exe -
Executes dropped EXE 1 IoCs
pid Process 2604 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" clifdthjsjkdgaoker.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 5052 clifdthjsjkdgaoker.exe 5052 clifdthjsjkdgaoker.exe 2604 svcservice.exe 2604 svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5052 clifdthjsjkdgaoker.exe 5052 clifdthjsjkdgaoker.exe 5052 clifdthjsjkdgaoker.exe 5052 clifdthjsjkdgaoker.exe 2604 svcservice.exe 2604 svcservice.exe 2604 svcservice.exe 2604 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5052 wrote to memory of 2604 5052 clifdthjsjkdgaoker.exe 86 PID 5052 wrote to memory of 2604 5052 clifdthjsjkdgaoker.exe 86 PID 5052 wrote to memory of 2604 5052 clifdthjsjkdgaoker.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\clifdthjsjkdgaoker.exe"C:\Users\Admin\AppData\Local\Temp\clifdthjsjkdgaoker.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
718.5MB
MD5dbf66e2f2326310424d0fbdda89a67f3
SHA11327756d0ea790c3e0cd8d69259269e04ee9f857
SHA2569cb77d490d8501398b0167913d0f2d8520b97e9ea6964d128f1761a3ae2c95eb
SHA512fd63e9b026a291c0980d756d25c1cf0205d648e112046360215e9823ee91426f46936442ceaa423acf78f703f4a8dae5bebe9ed268ee2eae3cdf4ec70bfb1d30
-
Filesize
718.5MB
MD5dbf66e2f2326310424d0fbdda89a67f3
SHA11327756d0ea790c3e0cd8d69259269e04ee9f857
SHA2569cb77d490d8501398b0167913d0f2d8520b97e9ea6964d128f1761a3ae2c95eb
SHA512fd63e9b026a291c0980d756d25c1cf0205d648e112046360215e9823ee91426f46936442ceaa423acf78f703f4a8dae5bebe9ed268ee2eae3cdf4ec70bfb1d30
-
Filesize
718.5MB
MD5dbf66e2f2326310424d0fbdda89a67f3
SHA11327756d0ea790c3e0cd8d69259269e04ee9f857
SHA2569cb77d490d8501398b0167913d0f2d8520b97e9ea6964d128f1761a3ae2c95eb
SHA512fd63e9b026a291c0980d756d25c1cf0205d648e112046360215e9823ee91426f46936442ceaa423acf78f703f4a8dae5bebe9ed268ee2eae3cdf4ec70bfb1d30