Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2023 11:45
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
1.9MB
-
MD5
e4321deefba7523e1495992b0d8b655a
-
SHA1
78883ae71aea1dd62a0213e54b431553e5e61647
-
SHA256
98446a2ba850c3132d15b9cc773c365052631e83f734a2ec0e19f7b71dce3f3d
-
SHA512
acbeb4cb61276a5464924a972cf0ea874ca287959b6a120588acda8077d54188265b247dd23f7b9a1281f1df0b81437e3e498e1eb22c21fbfba986e77f970b30
-
SSDEEP
49152:yf/wWlz2lOSHEQKH7J4pwF1KmQyAXszJs:ynwblOSkQKH9Kw7KrK
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2468 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" file.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 25 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 432 wrote to memory of 2468 432 file.exe 86 PID 432 wrote to memory of 2468 432 file.exe 86 PID 432 wrote to memory of 2468 432 file.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:2468
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753.1MB
MD5e4afcbeddd22a3877743d591b302b2d3
SHA1498b52aa2a585abac17cca3b4820dffee3655d70
SHA2564e2ad18c6b1cd09883d1d4582f85702524b5a4a86cc06a557051cb028ab17a37
SHA5124edac7c29947b6d3860663bcc865a3cecf16c03154cf357bddd15a0768b835c26e83d560393f1b075165285541ff4bf01b128fa8a9ee67f1dc662157602a19a7
-
Filesize
764.9MB
MD50287a0f624a44b6d3e35625e6891f91a
SHA1ddaa003d8cf0b101cea10ea358ba5b8d7d6edba8
SHA256fa41dc5d51e3a8f0c2551b31c89616e2d060e2040d6ee5986f409b95e49224bb
SHA512c0b9b6cd5fa54ebb1d084f4ab2c5065996c58bb383bd7358283180eec7b2120bc2cb70ee112b2b69e7ac91d3842b547cdd18c196a14af016096c86589bff145d