Analysis

  • max time kernel
    139s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/02/2023, 00:52

General

  • Target

    file.exe

  • Size

    1.9MB

  • MD5

    af97a8118aacf072359407791e061226

  • SHA1

    55de218612548edd76d537955386c4cb8dc3bfc4

  • SHA256

    5d5f5d1237220b5c74088668ded4ea66f3802eda2a5037a2594349a47602d13d

  • SHA512

    0619a7e506045ba29b1902fbf92b0d6faa3cdbda7db517d8bfbb43486a39e7117e5b12d03df13863ea92435cd654dbb18eb0d664c27b7135aec5b32e2477fd65

  • SSDEEP

    49152:ky1SM0SB8OvtkOAEq6KSAcfJyTAY/9jXe:kQVlOktjq6Vfs/9jO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4828
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Executes dropped EXE
      PID:4296

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    715.9MB

    MD5

    86615b6fcd6dfbf698234c3215c68048

    SHA1

    98b14ef6409d960bfe1944ebdd700597204e3fa6

    SHA256

    30458a0326b3f3856beaa6baab443d2e644c720dfa30f450a371558d0400f279

    SHA512

    e4f082036aed8ff9b8f6a9e7cbdf3c206c7651618ce0eede77cfd63dd2ab4c89eee133ef2eb1e3362f354fda3caf8e37e9d5b48dd34d71c61b3b586fdaa93aad

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    715.9MB

    MD5

    86615b6fcd6dfbf698234c3215c68048

    SHA1

    98b14ef6409d960bfe1944ebdd700597204e3fa6

    SHA256

    30458a0326b3f3856beaa6baab443d2e644c720dfa30f450a371558d0400f279

    SHA512

    e4f082036aed8ff9b8f6a9e7cbdf3c206c7651618ce0eede77cfd63dd2ab4c89eee133ef2eb1e3362f354fda3caf8e37e9d5b48dd34d71c61b3b586fdaa93aad

  • memory/4296-139-0x0000000002496000-0x0000000002640000-memory.dmp

    Filesize

    1.7MB

  • memory/4296-140-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/4296-141-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/4828-132-0x00000000026BD000-0x0000000002867000-memory.dmp

    Filesize

    1.7MB

  • memory/4828-133-0x0000000002870000-0x0000000002C40000-memory.dmp

    Filesize

    3.8MB

  • memory/4828-134-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/4828-138-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB