Analysis
-
max time kernel
103s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
09-02-2023 04:11
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
1.9MB
-
MD5
69fcca0d67ac4be82b5eed6ce4f155bc
-
SHA1
64e0406663e0355b75a29220ee4490fb25725a90
-
SHA256
291003d022e462dc6ece1e0d6cf6a636520060358683596b71623f1c71a539c3
-
SHA512
21a3a7ca680adcb17b9fcb5b7b6ca01406d0305048dba6ad4b97f1002f8b3023122c770a76ded66eb37d7d0a1732a90f2ceb0b278e60919525e88523c7aa981c
-
SSDEEP
49152:6zDL7X+Yep6nskNEUCeneZa6Hy4vn78HQSUkXe:mteApNEdeeZa6dYokO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1556 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1120 file.exe 1120 file.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" file.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 2 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1120 wrote to memory of 1556 1120 file.exe 27 PID 1120 wrote to memory of 1556 1120 file.exe 27 PID 1120 wrote to memory of 1556 1120 file.exe 27 PID 1120 wrote to memory of 1556 1120 file.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1556
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
437.2MB
MD5e28dc728bcb44d38dcf0a86f65c36c16
SHA1b6a43232001077930f8948f14b5ff5eae0d88c15
SHA256dd587093598e44409a387d8e2ad274433c26dd9168dae61484ef8f99a5b123af
SHA512d0175f024ecaec60b2a089bc65fed46973582fa96e7047173935b4983bd723fe313a6daa491fe220dd1198d2ad23807b227bdfecaffdff4ca5bd3e7a24a332d6
-
Filesize
543.1MB
MD54c121bc2bf6e19e3926b380604ac5de7
SHA1aa0d6cbd0f102127b1bc733462642b1e17f16940
SHA256e4c14760980afe60c2d33d666d2d0fc3ad16ff90bbf48a810a8a89365bb13843
SHA51286e032b6b5f5ab4effeb4cc69ffd66c143948d18dc609d10ffef095caea2c5433ff91a14d3a61b7b10161d3945ddcc972c07a8b56d9010df69976513ceca8150
-
Filesize
458.1MB
MD55fd5680699483d0aab5ddbbc1ec05eaf
SHA10d3b82cee9ccbb5f2550bac85c2b0f07abd65841
SHA25699a835a8c8ffb4668bd3b767c33cd42034f2ae8c68b4ac702a83d12135761659
SHA51232b971bfdab13785eb6527defb54871fb08125d9bca3e161d376701b325b434ef2fcff99f3d5089987c1a7439f5598f1ef04ef0465d6d27983b9df1f023c2c23