Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17-03-2023 15:03
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
1.9MB
-
MD5
27c3e0708804985d4f0758f873509805
-
SHA1
926ae820a61da9a6241ea94299edfcac963bcf78
-
SHA256
83224bbf17e2eaad3e40aa076696d35daef0a126d7c7c8125920ff457b4de93d
-
SHA512
bfca20c53257b54cbd8939bfa3023f3db10e796db0db5a3d445638d3ed73bf79d4510017f2e99470091fb20c615a82ee1d22962770ab053b94947f435aa69966
-
SSDEEP
49152:RQ7IJR3VJ9Ln5CI3o4U9ekXJkGB0qj5Bl+w:RZJR3VJ9VCAce45BD
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4904 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" setup.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3252 1496 WerFault.exe 84 -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 21 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1496 wrote to memory of 4904 1496 setup.exe 87 PID 1496 wrote to memory of 4904 1496 setup.exe 87 PID 1496 wrote to memory of 4904 1496 setup.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1496 -s 8322⤵
- Program crash
PID:3252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1496 -ip 14961⤵PID:4268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
724.9MB
MD58938267ab50d123845a20df96c8ff27e
SHA1b77161f6663c0877579e5172a2b08d8c6cd70cae
SHA2565a750c1f5d080ed6f621a23e6a0b82a8b206cbc2a72ce7383777a4ddfbea670d
SHA5122adf2b9b4424eac6a78677a5e9ce4e6d0ab63700fd85fc7c28b11fb9555ea2f8100d7e0fc67b819da184cd69ad395e534650cfa67ae71e924d7c60d1bc07824f
-
Filesize
724.9MB
MD58938267ab50d123845a20df96c8ff27e
SHA1b77161f6663c0877579e5172a2b08d8c6cd70cae
SHA2565a750c1f5d080ed6f621a23e6a0b82a8b206cbc2a72ce7383777a4ddfbea670d
SHA5122adf2b9b4424eac6a78677a5e9ce4e6d0ab63700fd85fc7c28b11fb9555ea2f8100d7e0fc67b819da184cd69ad395e534650cfa67ae71e924d7c60d1bc07824f