Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-03-2023 05:31
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
1.9MB
-
MD5
85a5e1cf0fe1fd7647a3aea9c9bfc899
-
SHA1
c834a3b50c982dfc91fd5bd2451ce1dbe0ac4c58
-
SHA256
c4e0c474010d9ecdcef21ad9d656c28ad11e89c6a213d015692c2424e7e75773
-
SHA512
80ef2f871887e7bf76e9df9edf6f1b941e9f566b9a69afebe4c0d37f6592e620788b074ad469085136f03bedcebac93d20bda18a581c767faf43975818514290
-
SSDEEP
49152:fyXUsF6XUSHfAp6AR2hlSTmnowstL/8A2:fwiUSHpPkTkwL/8H
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2024 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1808 file.exe 1808 file.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" file.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2024 1808 file.exe 28 PID 1808 wrote to memory of 2024 1808 file.exe 28 PID 1808 wrote to memory of 2024 1808 file.exe 28 PID 1808 wrote to memory of 2024 1808 file.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:2024
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
537.0MB
MD50dcf513f1c4320e2f4d1e81ce871fe9a
SHA1ff30db38f756ae0c473ace8b97fea36d319f37c7
SHA256d1d25b2352550fad352c6d38a69f6e6e13e9bd5af039b384a13a879fe55055ea
SHA512e722b4dc8e6a4bb1c50575517544a52dd992be3d7e628bf5f2228601b2091aae49264ac1363c853fc007b93f64dc62bb1b9de5c52c777c21a63a711bd575f374
-
Filesize
501.3MB
MD575e81462c2b56ab8131529b8b0520af9
SHA102491b148d29f648b67f6d936134aadc3459c020
SHA25684069dfbef0932ff23d13060d0e75dbc94e61570bcabf837cd7be13a9c1bb1aa
SHA512a42b8a95dc8f40b4f93a320676840b279f70bf3a910793a435bd899d72129bc02abd436d575a74af6036f72b925a61166edbdcb3671ba85505a2fddc0962799f
-
Filesize
343.5MB
MD5dcda93621809bd2ad58b3599b7eed8b2
SHA121ab497bc523ac01ab241eb35143637ad2a2a94a
SHA256423e3e9412df0aa8a20fd88f876254bf8427c64adb12e4ad8631bdb0d8dc647c
SHA512b7f2a56a814a1b500aa3cf89a23e44de90ccce9e3a0e9a04be0370a147bfe669f419ec430178660c110aac31bac31adcc90d2aef02a0fa1e7237d893027ae433
-
Filesize
558.3MB
MD543acfcbd21e4ddb478f5abc4f2266ff4
SHA177158a119d550a72f085630fb9ad656762bee581
SHA2568c94d5b8db12c6ed7bbc44eb0f70c47ce101eac904b72909eedb592999ddcdfe
SHA512e406b7cf7d635f609e0384c5d9839b5ba599344f9f8304af82e96b128f9c74fb277eb37b02ce5c606f9976b0f65a9130b4690195fceebadd6661f7ff09620146