Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17-03-2023 20:25
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
1.9MB
-
MD5
665c62d3bd6c21614fafb9a9b50bb574
-
SHA1
56322f2bb8a61954e6ec974612154402cdd98b29
-
SHA256
a82b9eff2dde393899dfa05985773fc9d124816b675019a0a8c551d9bb6d4d99
-
SHA512
07fda86a50c1aca80db3906e4201ec4f97be00d1563eb386d750b28160cd30bed1435e473c9330943d5c854a55fc7078bcdd3c99731fabd8019b1b22e10f9ed7
-
SSDEEP
49152:vmixags4hfkNAm3X86KoCwwJFZTjS7Pt5o:vNagdhcNAqHKoCnbUPt
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1268 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" tmp.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1424 1604 WerFault.exe 83 -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 20 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1604 wrote to memory of 1268 1604 tmp.exe 84 PID 1604 wrote to memory of 1268 1604 tmp.exe 84 PID 1604 wrote to memory of 1268 1604 tmp.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 4802⤵
- Program crash
PID:1424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1604 -ip 16041⤵PID:320
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
667.9MB
MD5f64d800c5b626846bdc6527ec2574ad5
SHA1ae333064b24138b51c84084f543249e5e238c2e6
SHA256ea15d2e1ff530b925f6ef6aad7c1c3cc6851efb58400a85b524d508fc4942c4a
SHA512dd8138fecb6f8bb9165e2686937ce826b6e226f0becfb3c18a77644cbed35a907d0b435704828be21e2c65f661b916c4bbeefb9a4c703338222e74abad638030
-
Filesize
652.3MB
MD53cb8de55db567e5b04a46dc240d29fa8
SHA1d3840a7d22395ac41451fe56a47242a39db72e4d
SHA2560f4437e7667a8e36ecd60f8b439baf40360d451b134de9630dd525d6ead1ad7d
SHA51262017f91fae75fbfffc93d458a4b49e7830cf16b508f8e61e4c1922fc2690c83bf7b094577cef22ce0da417be4ade279bdc3021482f5f5484064ab393d263e5d