Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17-03-2023 14:44
Static task
static1
Behavioral task
behavioral1
Sample
d433fee70e60de32de4608f07bed7d2a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d433fee70e60de32de4608f07bed7d2a.exe
Resource
win10v2004-20230220-en
General
-
Target
d433fee70e60de32de4608f07bed7d2a.exe
-
Size
1.8MB
-
MD5
d433fee70e60de32de4608f07bed7d2a
-
SHA1
8b84224c8319705317340392ad99bc529183a7db
-
SHA256
0a93f3cfdedbd88dce010e4a2e54dc8c2a2135e58f037b55a513ed8b1dc49cb7
-
SHA512
ec62acdea29ce1c56f09729c8e0832ffbd95755746305a35b0c361c92a03c88c8efb1c14eff35a9bdde26f965cd743408cacc08a5b2eb317a067fc876b9844d8
-
SSDEEP
24576:OGjR/w861Jx8ShKAhJ8PwNIe19bcOPnRQBgOGq0CsBNkj2aoQ5icqh:pY1Jx5vmkxJPnR8GTJNBHt
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3260 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" d433fee70e60de32de4608f07bed7d2a.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3852 4872 WerFault.exe 85 -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 30 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4872 wrote to memory of 3260 4872 d433fee70e60de32de4608f07bed7d2a.exe 89 PID 4872 wrote to memory of 3260 4872 d433fee70e60de32de4608f07bed7d2a.exe 89 PID 4872 wrote to memory of 3260 4872 d433fee70e60de32de4608f07bed7d2a.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d433fee70e60de32de4608f07bed7d2a.exe"C:\Users\Admin\AppData\Local\Temp\d433fee70e60de32de4608f07bed7d2a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:3260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 4762⤵
- Program crash
PID:3852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4872 -ip 48721⤵PID:4780
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
831.8MB
MD5af8b5347bd695871e4940bb9f4cb09e7
SHA19f89fcf9ab52adc9d2e609d3a7e52a7682f07a29
SHA256e0242366b06970febb23cecf1b69104a0f3b42f27c156dcdb9494b25e2a8ca55
SHA512938892958ee20ca9d825ff5d583a2ecf3bc68b57dbd604a9fe9f84d91985fddd7f4003e4403d3c3bf6d955186d5f2b06a225630aafa30f362007fd6e25410da7
-
Filesize
831.8MB
MD5af8b5347bd695871e4940bb9f4cb09e7
SHA19f89fcf9ab52adc9d2e609d3a7e52a7682f07a29
SHA256e0242366b06970febb23cecf1b69104a0f3b42f27c156dcdb9494b25e2a8ca55
SHA512938892958ee20ca9d825ff5d583a2ecf3bc68b57dbd604a9fe9f84d91985fddd7f4003e4403d3c3bf6d955186d5f2b06a225630aafa30f362007fd6e25410da7