Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2023 15:04
Static task
static1
Behavioral task
behavioral1
Sample
09327699.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
09327699.exe
Resource
win10v2004-20230220-en
General
-
Target
09327699.exe
-
Size
25.7MB
-
MD5
ec9598150d9cdcc100cc3d741f4074b6
-
SHA1
eeec6007d96fb3ea4d47e8fdff39df4dff78a03c
-
SHA256
78362eb5c4529001a3bc7ecab62b904afef81c63b6778ba00b99eb3398140dab
-
SHA512
0f90cb187b42b93ea31474260de8966cdd7a7f80f20dd73b3dca6b8ec2340ab518d88aee61f9c914041d0ac14047d55a20885e82029f3eef843085e38d806a2f
-
SSDEEP
196608:HW36QOxQ8JEgOpcqGs4anqH4mJsMQOgKmEiTBh:S63Q8JExpIGnqYxMNmEiTf
Malware Config
Extracted
laplas
http://85.192.40.252
-
api_key
a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 09327699.exe -
Executes dropped EXE 1 IoCs
pid Process 652 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" 09327699.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4424 09327699.exe 4424 09327699.exe 4424 09327699.exe 4424 09327699.exe 652 svcservice.exe 652 svcservice.exe 652 svcservice.exe 652 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4424 wrote to memory of 652 4424 09327699.exe 92 PID 4424 wrote to memory of 652 4424 09327699.exe 92 PID 4424 wrote to memory of 652 4424 09327699.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\09327699.exe"C:\Users\Admin\AppData\Local\Temp\09327699.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:652
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
726.7MB
MD5a932d4d99f998664c53aa72028e66fd6
SHA1cebc7acb053012167de21bb3c96a762fea94d1ad
SHA256f79efb386bfb0899b19f361199805e83bd86164d67cbaaa8c477ae9d9d86d58b
SHA512f3d383685a2b52af80c9146c59da485c1ca0995776bdffc9b4c7cbd1044d27d90827a0bfb4af7078825e553f0987553695b38455804ac29e37a076ab85e1796d
-
Filesize
726.7MB
MD5a932d4d99f998664c53aa72028e66fd6
SHA1cebc7acb053012167de21bb3c96a762fea94d1ad
SHA256f79efb386bfb0899b19f361199805e83bd86164d67cbaaa8c477ae9d9d86d58b
SHA512f3d383685a2b52af80c9146c59da485c1ca0995776bdffc9b4c7cbd1044d27d90827a0bfb4af7078825e553f0987553695b38455804ac29e37a076ab85e1796d
-
Filesize
726.7MB
MD5a932d4d99f998664c53aa72028e66fd6
SHA1cebc7acb053012167de21bb3c96a762fea94d1ad
SHA256f79efb386bfb0899b19f361199805e83bd86164d67cbaaa8c477ae9d9d86d58b
SHA512f3d383685a2b52af80c9146c59da485c1ca0995776bdffc9b4c7cbd1044d27d90827a0bfb4af7078825e553f0987553695b38455804ac29e37a076ab85e1796d