Analysis
-
max time kernel
51s -
max time network
129s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
10/02/2023, 10:20
Static task
static1
Behavioral task
behavioral1
Sample
2b9e545eec4b581f7cc869bd4ebbfe37635ccca40c863a371fa491afb6a9f7e0.exe
Resource
win10-20220901-en
General
-
Target
2b9e545eec4b581f7cc869bd4ebbfe37635ccca40c863a371fa491afb6a9f7e0.exe
-
Size
1.9MB
-
MD5
d66265fee59a1c1ae4d516905110244c
-
SHA1
43bb6557a1a3a2c10f806e679a5f157c0c0e0f49
-
SHA256
2b9e545eec4b581f7cc869bd4ebbfe37635ccca40c863a371fa491afb6a9f7e0
-
SHA512
4bc2c4df10c6dd45a018908f5e5256fe7888b10ef4cf7c2025a642c7d0f520ef8b7bb5ca6cb94a0ec433f165803c19692a5e6ee0d641157b4f7434545ff2f80f
-
SSDEEP
49152:YFiHHqOho7ILVDK0PBuPpVMHxSchBiNvj0FrO9Ng:IiqOzI+OwxSchqgQbg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3444 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 2b9e545eec4b581f7cc869bd4ebbfe37635ccca40c863a371fa491afb6a9f7e0.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 2 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2652 wrote to memory of 3444 2652 2b9e545eec4b581f7cc869bd4ebbfe37635ccca40c863a371fa491afb6a9f7e0.exe 66 PID 2652 wrote to memory of 3444 2652 2b9e545eec4b581f7cc869bd4ebbfe37635ccca40c863a371fa491afb6a9f7e0.exe 66 PID 2652 wrote to memory of 3444 2652 2b9e545eec4b581f7cc869bd4ebbfe37635ccca40c863a371fa491afb6a9f7e0.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b9e545eec4b581f7cc869bd4ebbfe37635ccca40c863a371fa491afb6a9f7e0.exe"C:\Users\Admin\AppData\Local\Temp\2b9e545eec4b581f7cc869bd4ebbfe37635ccca40c863a371fa491afb6a9f7e0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:3444
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
647.5MB
MD5b4b2b0e6778c740267a364df6fb28049
SHA1df5a0d9abfac93c7f87c98ed9c9c4743e4b01ab8
SHA256317d86a0731e3b8688ca871c3ed03b33f5785796ff9d09ee28d0733999a1a582
SHA5127fd203961308c314980ace203f6832642b2a2626510e448e60d9189633741dca236c1efbaef96439c6514b72a6ef97f0a0b6e13f8f9a50b369c186a3454a447b
-
Filesize
619.6MB
MD58c7053dff61535e2a8ef0c279efe3add
SHA158e3e6247f68d3e9eee1da260018d84cc55a02ae
SHA25697948823308641e7cf4362f7d8869e65e763abb10d8ec360803c1cb0959f6785
SHA5124afd8cf02e0e2c9839d2c4ac3df50f7c4007b11c7f0ee075262123fd8629641b399cb547cfa2b8c9c65e0e44f35a944f5645ddb032ff00a83bac9e57617d069d