Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2023 02:39
Static task
static1
Behavioral task
behavioral1
Sample
UD094I8g.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
UD094I8g.exe
Resource
win10v2004-20230220-en
General
-
Target
UD094I8g.exe
-
Size
25.7MB
-
MD5
ec9598150d9cdcc100cc3d741f4074b6
-
SHA1
eeec6007d96fb3ea4d47e8fdff39df4dff78a03c
-
SHA256
78362eb5c4529001a3bc7ecab62b904afef81c63b6778ba00b99eb3398140dab
-
SHA512
0f90cb187b42b93ea31474260de8966cdd7a7f80f20dd73b3dca6b8ec2340ab518d88aee61f9c914041d0ac14047d55a20885e82029f3eef843085e38d806a2f
-
SSDEEP
196608:HW36QOxQ8JEgOpcqGs4anqH4mJsMQOgKmEiTBh:S63Q8JExpIGnqYxMNmEiTf
Malware Config
Extracted
laplas
http://85.192.40.252
-
api_key
a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation UD094I8g.exe -
Executes dropped EXE 1 IoCs
pid Process 3536 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" UD094I8g.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1832 UD094I8g.exe 1832 UD094I8g.exe 1832 UD094I8g.exe 1832 UD094I8g.exe 3536 svcservice.exe 3536 svcservice.exe 3536 svcservice.exe 3536 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1832 wrote to memory of 3536 1832 UD094I8g.exe 88 PID 1832 wrote to memory of 3536 1832 UD094I8g.exe 88 PID 1832 wrote to memory of 3536 1832 UD094I8g.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\UD094I8g.exe"C:\Users\Admin\AppData\Local\Temp\UD094I8g.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3536
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751.7MB
MD5dc2f358ef76fc1a6a8f2fdc8d4b0446e
SHA11cc0408d1a38d29d8cd0bc2025bc6356375caad7
SHA256b2f0db59fba44dccbda5d250b19b99f4eec4150de98610a60db202f443b22f96
SHA512f6332662be6dfa586bd6e64d08f65fe233da9482fc7c822cc6799ddb62da3516ebfb7e4017129cad8efde2888249efabbbf8bdc5d2dd1ca909066c5d24b8896c
-
Filesize
751.7MB
MD5dc2f358ef76fc1a6a8f2fdc8d4b0446e
SHA11cc0408d1a38d29d8cd0bc2025bc6356375caad7
SHA256b2f0db59fba44dccbda5d250b19b99f4eec4150de98610a60db202f443b22f96
SHA512f6332662be6dfa586bd6e64d08f65fe233da9482fc7c822cc6799ddb62da3516ebfb7e4017129cad8efde2888249efabbbf8bdc5d2dd1ca909066c5d24b8896c
-
Filesize
739.2MB
MD58be8a1361c38c424e171a931f4717738
SHA1d8bdd53084fb54999ec3ff4ba6edd29e712b3933
SHA256691dfd072ab4a007b8bb62d8182e64eaf5d4deba6a82829d2d07796b2b79a1b8
SHA5122dcbd9d279157340f33205dde6a32217bd0747c207ce97c38bcb64b5d8ef8b0a64a0ce6a88b74ff78989997de35aa82925cd24f876e62526c07b17f02da6616d