Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2023 16:16
Static task
static1
Behavioral task
behavioral1
Sample
8d84e57656a59231cb00e35857f52f5a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8d84e57656a59231cb00e35857f52f5a.exe
Resource
win10v2004-20230220-en
General
-
Target
8d84e57656a59231cb00e35857f52f5a.exe
-
Size
1.9MB
-
MD5
8d84e57656a59231cb00e35857f52f5a
-
SHA1
6f2c858adeb1d8c488e2885688982eb8c9798e6f
-
SHA256
5bc89ac527b9326cfe4e3c88c2271084330cb58fcdbe91da7aab3b2eb49c9d57
-
SHA512
7defc51e96af47b849c06534faa0cd5959dd871c61e6b894ee9ceefa9a52925f3a8b35e562c3cf811eb71d727e579cb130d3a332ed5e73ef7c64a48a6125bac9
-
SSDEEP
24576:Tj72QEHHAU0XTLnkXsdC4eZ9jAOXOSs3UUp9KL+koeAPdk5OQpo6w0LFi:iQEAlkXuCVjAOXO6iKL+kojQvu6
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 220 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 8d84e57656a59231cb00e35857f52f5a.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 28 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4376 wrote to memory of 220 4376 8d84e57656a59231cb00e35857f52f5a.exe 86 PID 4376 wrote to memory of 220 4376 8d84e57656a59231cb00e35857f52f5a.exe 86 PID 4376 wrote to memory of 220 4376 8d84e57656a59231cb00e35857f52f5a.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d84e57656a59231cb00e35857f52f5a.exe"C:\Users\Admin\AppData\Local\Temp\8d84e57656a59231cb00e35857f52f5a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:220
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
807.9MB
MD55a94c9e86a5782a5bb76e7ecd686db97
SHA17f961bd4fde953ee69589250c323221845610484
SHA2563f0f0c3fcf0445000fcce888b15a705e4a0ea8badde42847cdc8f6b152c41e37
SHA51260dc9412d9b9ca4c17c5800d19615cecac770c1367385619fea8fcf45a4709766d07d4ccf3c1603f766c292ad4d54c7f3058385c596fa10f39d6bbc3121c07d6
-
Filesize
807.9MB
MD55a94c9e86a5782a5bb76e7ecd686db97
SHA17f961bd4fde953ee69589250c323221845610484
SHA2563f0f0c3fcf0445000fcce888b15a705e4a0ea8badde42847cdc8f6b152c41e37
SHA51260dc9412d9b9ca4c17c5800d19615cecac770c1367385619fea8fcf45a4709766d07d4ccf3c1603f766c292ad4d54c7f3058385c596fa10f39d6bbc3121c07d6