Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
17-03-2023 15:05
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230221-en
General
-
Target
setup.exe
-
Size
1.9MB
-
MD5
4ac3b05f28208a1c41831fd781327f12
-
SHA1
7660c9502daf62105414244e07b5e594874d45be
-
SHA256
a6a66627e3422140f5e1bb3eaca83d8b124c85734029b9ce216d5d33a35af69a
-
SHA512
ea03824f65e138a31180ec442f60e3de347e0e20fd91144eecd695c1c92caf42b576e24c8d5f96c18acdfdbdeb2aee392a95566b361c884a610c0fc0d8b66720
-
SSDEEP
49152:nVM1o+LRAoWrYMgxE407GpZl44dphdLVMh3/fYgnPfX09:nVM1okOoaYzxE40Kp44PfUjf
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4664 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" setup.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 36 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1764 wrote to memory of 4664 1764 setup.exe 90 PID 1764 wrote to memory of 4664 1764 setup.exe 90 PID 1764 wrote to memory of 4664 1764 setup.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:4664
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
738.9MB
MD54bb65968dac26e706f17f29972d8bdf6
SHA130066e3990ac7e7b298e2a22d65be2e1666a466d
SHA256f3ee67f22d03ffab712be3681f756cc8545877f9090ab9e0e56d5c1e1c165ccd
SHA51226f44e7045ff2387f3f64551486bba81be75dd5424a87f6ac4b34c61787fa72737dfe5e0d0cd8b6bd6003e16c54bf837054ccf032cfaff492d5679a11b468517
-
Filesize
738.9MB
MD54bb65968dac26e706f17f29972d8bdf6
SHA130066e3990ac7e7b298e2a22d65be2e1666a466d
SHA256f3ee67f22d03ffab712be3681f756cc8545877f9090ab9e0e56d5c1e1c165ccd
SHA51226f44e7045ff2387f3f64551486bba81be75dd5424a87f6ac4b34c61787fa72737dfe5e0d0cd8b6bd6003e16c54bf837054ccf032cfaff492d5679a11b468517