Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2023 13:23
Static task
static1
Behavioral task
behavioral1
Sample
UD094I8g.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
UD094I8g.exe
Resource
win10v2004-20230220-en
General
-
Target
UD094I8g.exe
-
Size
25.7MB
-
MD5
ec9598150d9cdcc100cc3d741f4074b6
-
SHA1
eeec6007d96fb3ea4d47e8fdff39df4dff78a03c
-
SHA256
78362eb5c4529001a3bc7ecab62b904afef81c63b6778ba00b99eb3398140dab
-
SHA512
0f90cb187b42b93ea31474260de8966cdd7a7f80f20dd73b3dca6b8ec2340ab518d88aee61f9c914041d0ac14047d55a20885e82029f3eef843085e38d806a2f
-
SSDEEP
196608:HW36QOxQ8JEgOpcqGs4anqH4mJsMQOgKmEiTBh:S63Q8JExpIGnqYxMNmEiTf
Malware Config
Extracted
laplas
http://85.192.40.252
-
api_key
a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation UD094I8g.exe -
Executes dropped EXE 1 IoCs
pid Process 2420 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" UD094I8g.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4420 UD094I8g.exe 4420 UD094I8g.exe 4420 UD094I8g.exe 4420 UD094I8g.exe 2420 svcservice.exe 2420 svcservice.exe 2420 svcservice.exe 2420 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4420 wrote to memory of 2420 4420 UD094I8g.exe 89 PID 4420 wrote to memory of 2420 4420 UD094I8g.exe 89 PID 4420 wrote to memory of 2420 4420 UD094I8g.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\UD094I8g.exe"C:\Users\Admin\AppData\Local\Temp\UD094I8g.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
737.7MB
MD58a8a94459bd03ed354eb3b372fbdd718
SHA15db25ddf0af836306d109b65a8ba15c39ade92a6
SHA256314e03b9975dde4a56a12a49fd96e548cb3b66332cf81a87e9c55fa33ac2a206
SHA5129fe46dc81b2e2bcaba3bf7d4d4b97c4510b4d52cbfd5d4256c026c6544fd826a894b3050b0bfa0204a955179ed52482762440446c012eba16f6bd08bed9c3701
-
Filesize
691.8MB
MD558c967a451976c09717e98ddfdd0d824
SHA1d88f153f81c25a3c75ca9918873fcf50656226ed
SHA256cd4e5bb91c9aa0e2ba5b0163d7784db2a7ee7cf26ae13e92fe694f205817fa15
SHA512ebb72d8fa130b176569d4d35538e57f1ad0cff77a149bd3ea4644df0fb4a4f0d73b8771131deead29fdea1816917dd2ad09ddc0b71e5a8072fe9ae0ca1231a01
-
Filesize
665.4MB
MD5674a6049f0aa4ab5efe280d8b68c35b6
SHA11fed92722fe431629f3ec428555b81504de2dc1a
SHA256456d50c223ec7a3ee1f62e5387624e419ce70a573d37b7f9b6b8adf5bd89f040
SHA512b174bda875d5285d53a460005181829a495bce5719f6f36375cd874fa7f1ace602538a79f6ed573f014bea6ce61ac39ff45bc7982f3196110ef000152a85dfd3