Analysis
-
max time kernel
137s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-03-2023 15:00
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
1.9MB
-
MD5
a13a518eeb299eb35ef4dab64ca36dfc
-
SHA1
f70ed33a0ae431538d248186c102588d0a655544
-
SHA256
cbd52e865efdcce13184bb8594a5016cc973b2f30e880fc620c60dc0b5986e1c
-
SHA512
34508043fa6f682396bef2b8638aa382a8eab294042b1ca02071abc9bf3518b866b89538373a2ca2b002e209b72ccd3cbe7c9e86ab4b97edd2a9a448288d877c
-
SSDEEP
49152:+1iXbsGhvUq/AaqDQfM5jx9H2VatXYUq:+AXbfABsU5lrXYU
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1712 ntlhost.exe -
Loads dropped DLL 5 IoCs
pid Process 1480 setup.exe 1480 setup.exe 1712 ntlhost.exe 1712 ntlhost.exe 1712 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" setup.exe -
GoLang User-Agent 3 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 HTTP User-Agent header 3 Go-http-client/1.1 HTTP User-Agent header 4 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1480 wrote to memory of 1712 1480 setup.exe 28 PID 1480 wrote to memory of 1712 1480 setup.exe 28 PID 1480 wrote to memory of 1712 1480 setup.exe 28 PID 1480 wrote to memory of 1712 1480 setup.exe 28 PID 1480 wrote to memory of 1712 1480 setup.exe 28 PID 1480 wrote to memory of 1712 1480 setup.exe 28 PID 1480 wrote to memory of 1712 1480 setup.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1712
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244.4MB
MD5aa94718f9674b7ebee9c49de49c2d9a6
SHA1c027eb2b947776dcaa33b268961546e536ba1429
SHA256e4aaa8f898d6420588b27da1aab0b55eb9f60a9c3f184dd41a505492f105f51c
SHA512fef658e2e155619963f2600e7402b76fa203916b33782f2ceae526c776d01fc2bd9cbcb67f7bbece2c344dfec23fd30cf21fae4922107c61a40dea1af5f60761
-
Filesize
251.0MB
MD5672dad54380c12e4aabb1ddf1f2d0143
SHA1341cf76099a97cfbfcedfdef6b61b3a1785d2f09
SHA2566cd2bb4abb504367958aa6f8b756dc2c840c84fe06cba2505d27eea9ace29a1b
SHA5121dcbb1f685949fc45b2adea20775723aae454a0088db4e042b151dd9a93be8e09fd4ebe543d4877f33dd0d39865653df642ef55f14c177221db2e08d37d16e94
-
Filesize
239.4MB
MD51c059e7e74dcb303a2de1098521fb2d2
SHA1f1ac8726bb0833abe311e183198bff1e037471bf
SHA2562c26d7c602a84d4821e5253a30ea401fd34164e7a8a1029705abdcc3b2afab49
SHA512f6e06c6a534e2dd35b086f3c19cf7c270b434a2a015ebe36949275d3821a865e3270deee49260f43fbbd9ab1e564fa2ffa0485bac1cc0f3efa3564921c1bb1e9
-
Filesize
126.4MB
MD5e34fc52ce017d8472e5ce24d4d3e22a7
SHA145734648298aab1743fb3ef89e46bf82709d48f3
SHA256c9fed114b0ee4b238fb71d76a1962b18fbe62d9369e6dcd216fb63880449f09f
SHA5126b7773074054bd919da06ec706f7262281865327f294311d9d06bf0a301348388652311c97ad0e815f24288fd0c9837276c3e5121cd5bc7f8e0913958595d56e
-
Filesize
136.7MB
MD503beae7754e54613c278cfb0bd0c44e1
SHA10e9f812da4d785c12c4e75b1c26e1bf818168984
SHA256f38ac7f6c6483b95c800608a0681e736175e031e03326f6f3b89988ccdeef631
SHA5126aa35c39be8726ed9e49d4ccec051fc179a469031e01abd850b8fb05f2f5eec6d933c46d3229c85b700376163a514ec7c727c03c824ec6d19678e3e6f1544b59
-
Filesize
248.6MB
MD5c507fe9d95132d32df5e48c6f5634e2b
SHA1b06465ca1e4c59cd96ba458d047ebf85b7c19b63
SHA256f2f2c21dc21b691583d951515c194ee8188d6e4dccfaa1d78dddc03dd6b312e6
SHA51261202c51c8f4e2613c0663437cc02659b9c31d25530733602292117bc151175f985c83f7e70d8cf6f33fb2c73a4e9ebd3293592859fc9671fcd815811540913c
-
Filesize
248.1MB
MD53b0226ad0cae1729c7a9ef1f978e5749
SHA1133ce6c44c77ba27fd49bf2ede86c3f5e3f9c32d
SHA256d09d1c188b65f52b8e36e5d963cfff7c7ddaeaf73f9301b9fbf4df281645307f
SHA5127edde4d28cd3f852f2bac0d45f7569b5f54a876487c5c96bb3390f78b8029151bf71a3dbb6a814d4d42637dcc79a6f07e25de99cbc2ca9dca30722c44131f587
-
Filesize
249.9MB
MD51204db306301f5dc7fd9801644dbe4cf
SHA1a5cb203b1d8b260b2fe1e15e0a6c467e98b2a560
SHA256f9da20c65db86f423d4cc84bd4cf97a16a7ae8c1c309a79afbf30791f140da72
SHA512e5c6206d5eecaf4e172a7dc08f176730e277d5721bcc3663655ce42a81b4cfc5a57b9d90338d0d25ec93a07f3bb98d3f278d37a4c9b6ffa7d44f4e882266d160