Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2023, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
1.9MB
-
MD5
50c8ba764864a27471c1e46ec947f944
-
SHA1
e8b13edb9d248a1449d200582e6fdbc6f4285afd
-
SHA256
a4099e49f7b95da7d3017635d34afbfcae9b556f2e3573c4c18fc4c3a891913d
-
SHA512
592d0f73ed9f569b3ff856da1d988be39e61592e3dcc0663fc663cc20e315c34100e8caf35ee562173528f4b22910229176116b5b780845de4a3314485f52002
-
SSDEEP
49152:8TfU9QQZjg5VdTimqf0NSRwP2u3Ipn0ZA3H4fj4v1+Pid:eOQQZ0rdng0m8IpnQA3Y7T
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2484 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" file.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 19 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2484 2224 file.exe 84 PID 2224 wrote to memory of 2484 2224 file.exe 84 PID 2224 wrote to memory of 2484 2224 file.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:2484
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
735.9MB
MD5ffc082b08308d44db855dc44ab943649
SHA1b53555a6f4878cfe88a2c3a721e2fa1b68c50b94
SHA256cf1f8a20893158ba222b14809f85be373fe15a7ce7cd30d646aaf3bb696e24c3
SHA512986c10ec11a1e489cfc5b7b1f76c52784676fb747f93015c8621e0e1801bd8a27f29a6d70d9ddefb7d4d719e74177a28ad314e4bf611174f62e57adf612f22a8
-
Filesize
735.9MB
MD5ffc082b08308d44db855dc44ab943649
SHA1b53555a6f4878cfe88a2c3a721e2fa1b68c50b94
SHA256cf1f8a20893158ba222b14809f85be373fe15a7ce7cd30d646aaf3bb696e24c3
SHA512986c10ec11a1e489cfc5b7b1f76c52784676fb747f93015c8621e0e1801bd8a27f29a6d70d9ddefb7d4d719e74177a28ad314e4bf611174f62e57adf612f22a8