Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09/02/2023, 00:52
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
1.9MB
-
MD5
af97a8118aacf072359407791e061226
-
SHA1
55de218612548edd76d537955386c4cb8dc3bfc4
-
SHA256
5d5f5d1237220b5c74088668ded4ea66f3802eda2a5037a2594349a47602d13d
-
SHA512
0619a7e506045ba29b1902fbf92b0d6faa3cdbda7db517d8bfbb43486a39e7117e5b12d03df13863ea92435cd654dbb18eb0d664c27b7135aec5b32e2477fd65
-
SSDEEP
49152:ky1SM0SB8OvtkOAEq6KSAcfJyTAY/9jXe:kQVlOktjq6Vfs/9jO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4296 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" file.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 6 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4828 wrote to memory of 4296 4828 file.exe 81 PID 4828 wrote to memory of 4296 4828 file.exe 81 PID 4828 wrote to memory of 4296 4828 file.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:4296
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
715.9MB
MD586615b6fcd6dfbf698234c3215c68048
SHA198b14ef6409d960bfe1944ebdd700597204e3fa6
SHA25630458a0326b3f3856beaa6baab443d2e644c720dfa30f450a371558d0400f279
SHA512e4f082036aed8ff9b8f6a9e7cbdf3c206c7651618ce0eede77cfd63dd2ab4c89eee133ef2eb1e3362f354fda3caf8e37e9d5b48dd34d71c61b3b586fdaa93aad
-
Filesize
715.9MB
MD586615b6fcd6dfbf698234c3215c68048
SHA198b14ef6409d960bfe1944ebdd700597204e3fa6
SHA25630458a0326b3f3856beaa6baab443d2e644c720dfa30f450a371558d0400f279
SHA512e4f082036aed8ff9b8f6a9e7cbdf3c206c7651618ce0eede77cfd63dd2ab4c89eee133ef2eb1e3362f354fda3caf8e37e9d5b48dd34d71c61b3b586fdaa93aad