Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
16-03-2023 16:24
Static task
static1
Behavioral task
behavioral1
Sample
5bc89ac527b9326cfe4e3c88c2271084330cb58fcdbe91da7aab3b2eb49c9d57.exe
Resource
win10-20230220-en
General
-
Target
5bc89ac527b9326cfe4e3c88c2271084330cb58fcdbe91da7aab3b2eb49c9d57.exe
-
Size
1.9MB
-
MD5
8d84e57656a59231cb00e35857f52f5a
-
SHA1
6f2c858adeb1d8c488e2885688982eb8c9798e6f
-
SHA256
5bc89ac527b9326cfe4e3c88c2271084330cb58fcdbe91da7aab3b2eb49c9d57
-
SHA512
7defc51e96af47b849c06534faa0cd5959dd871c61e6b894ee9ceefa9a52925f3a8b35e562c3cf811eb71d727e579cb130d3a332ed5e73ef7c64a48a6125bac9
-
SSDEEP
24576:Tj72QEHHAU0XTLnkXsdC4eZ9jAOXOSs3UUp9KL+koeAPdk5OQpo6w0LFi:iQEAlkXuCVjAOXO6iKL+kojQvu6
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2148 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 5bc89ac527b9326cfe4e3c88c2271084330cb58fcdbe91da7aab3b2eb49c9d57.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 2 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4212 wrote to memory of 2148 4212 5bc89ac527b9326cfe4e3c88c2271084330cb58fcdbe91da7aab3b2eb49c9d57.exe 66 PID 4212 wrote to memory of 2148 4212 5bc89ac527b9326cfe4e3c88c2271084330cb58fcdbe91da7aab3b2eb49c9d57.exe 66 PID 4212 wrote to memory of 2148 4212 5bc89ac527b9326cfe4e3c88c2271084330cb58fcdbe91da7aab3b2eb49c9d57.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bc89ac527b9326cfe4e3c88c2271084330cb58fcdbe91da7aab3b2eb49c9d57.exe"C:\Users\Admin\AppData\Local\Temp\5bc89ac527b9326cfe4e3c88c2271084330cb58fcdbe91da7aab3b2eb49c9d57.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:2148
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
684.1MB
MD5fa7c558f08501dc271c81c659de7f2da
SHA132503cd0e4af28aad804cc1f866ccdb240cbd5f2
SHA256629aaea8546f085c5c1945f0751f5629ce46711b6af839eb3be64683dcc7115d
SHA5128f08766d0822a59e8e19de4466c2d1b714c01f564cdbebeaec6652e26e43bd6e13c6ae2686ce7ef80072c295c52824162890beddc68db47ed340553ae5968e2d
-
Filesize
733.9MB
MD5435803b47a7f3124a551a0623778005e
SHA1f94a8a526032c0ae29cc62c7be6d48831024b3cc
SHA2561bf811bfa9865eb5c6ecb60ca2c664bbb44cfcbeb201502170bfa680a12b0982
SHA512d2034b47e6342e29f5ea1b21dc93931f44ed4af3d866b20d9eb1317a0f7aef499da99ad6b131edbd1ed2c69b6c834845d100151730ffbd5f7ae7c28719899a23