Analysis
-
max time kernel
137s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16-03-2023 16:16
Static task
static1
Behavioral task
behavioral1
Sample
8d84e57656a59231cb00e35857f52f5a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8d84e57656a59231cb00e35857f52f5a.exe
Resource
win10v2004-20230220-en
General
-
Target
8d84e57656a59231cb00e35857f52f5a.exe
-
Size
1.9MB
-
MD5
8d84e57656a59231cb00e35857f52f5a
-
SHA1
6f2c858adeb1d8c488e2885688982eb8c9798e6f
-
SHA256
5bc89ac527b9326cfe4e3c88c2271084330cb58fcdbe91da7aab3b2eb49c9d57
-
SHA512
7defc51e96af47b849c06534faa0cd5959dd871c61e6b894ee9ceefa9a52925f3a8b35e562c3cf811eb71d727e579cb130d3a332ed5e73ef7c64a48a6125bac9
-
SSDEEP
24576:Tj72QEHHAU0XTLnkXsdC4eZ9jAOXOSs3UUp9KL+koeAPdk5OQpo6w0LFi:iQEAlkXuCVjAOXO6iKL+kojQvu6
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1308 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1728 8d84e57656a59231cb00e35857f52f5a.exe 1728 8d84e57656a59231cb00e35857f52f5a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 8d84e57656a59231cb00e35857f52f5a.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1308 1728 8d84e57656a59231cb00e35857f52f5a.exe 28 PID 1728 wrote to memory of 1308 1728 8d84e57656a59231cb00e35857f52f5a.exe 28 PID 1728 wrote to memory of 1308 1728 8d84e57656a59231cb00e35857f52f5a.exe 28 PID 1728 wrote to memory of 1308 1728 8d84e57656a59231cb00e35857f52f5a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d84e57656a59231cb00e35857f52f5a.exe"C:\Users\Admin\AppData\Local\Temp\8d84e57656a59231cb00e35857f52f5a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1308
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479.6MB
MD53673ddf9a5ef711b1eb17b74bc45214e
SHA1125b8990286a661d6f4c72a34a663fbf6979d46a
SHA256290fa748eee976bb19c68d8ddcc7de68342107efbad42fc53e3cd3d10e1fed62
SHA51202b1165f65e27879d38e293204d5a33453597693c1339e482fe2bfd75f02b4977946cde3e35b00b5b645527af0a8a307631dfd5f71a819c84e0d667a7b27a782
-
Filesize
488.6MB
MD5109f1d54987ef5575a48ff991f73bc3a
SHA1104af7407a375c3ce4c4f1ead5e18b57661c907a
SHA256c74871ab638a950e8d7c88fdc08f6cdfa2f693d6e334f035bbce18d421829706
SHA51291705dd190f6ee189c2d1cd2480f2ecb2c7b606b4a23a95f4fa3ed86d1a23401e28b4d38dd4366a2cc61ff8d6557e741906ffa543c16831494cb6886a3306ba1
-
Filesize
273.1MB
MD5b80f18550a741729ebe34ddd9baaea02
SHA11418c0d1b92a5cdf230f36f0ebb607f817421159
SHA2567d2e88726d2680ba81d07cb16e61ae328d5830e99ed33a58f81992f1769c6fd3
SHA512b3b5b0013a95310f7e114913554166093fedddedba85a76994e387e3402a9ebd925e78a09e676ad83ec4327bba3065d8e49dddf584dcf63ba4f8866ddb23b8a1
-
Filesize
477.5MB
MD52e83d846d0a6f4d2410fdffb897f6264
SHA1ec52f48a6381bb6c9de0f21047f815a7d2db1a80
SHA25690ad77fd5b5da8aa99d61e921ed6850036ff0042d12df7d9daaa679973a2d26e
SHA5129ff1b24cb5390286097c38b33309ca654efd12ad8b7b326087012e37ac5d902847390cd75735254d9b393d3f11c37420ac667031b80c1806ab3717334f02b38c