Analysis
-
max time kernel
147s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2023 22:30
Static task
static1
Behavioral task
behavioral1
Sample
e3d43b3b6a41985aa2a8b2e3432bf8409e542113d13df1a1658e0508e187dc3e.exe
Resource
win10v2004-20230220-en
General
-
Target
e3d43b3b6a41985aa2a8b2e3432bf8409e542113d13df1a1658e0508e187dc3e.exe
-
Size
1.9MB
-
MD5
7d1c375649982b6578629a8e3d6633d4
-
SHA1
67a356982d102f4c7520f2efa7e139a1a1541635
-
SHA256
e3d43b3b6a41985aa2a8b2e3432bf8409e542113d13df1a1658e0508e187dc3e
-
SHA512
e3f1939fd64005f3157973ef3582cf19be69163ebe4cb37181da224c97afdb0db8b81be0567a280b52dc72daadae71114ccc0baac166be4e9fd0cbbd343d8d18
-
SSDEEP
49152:FL3A30haYw6K977QCMgLyLbXcSVKHhf9:FTgfjMg+LbXc7H
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1664 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" e3d43b3b6a41985aa2a8b2e3432bf8409e542113d13df1a1658e0508e187dc3e.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 43 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3224 wrote to memory of 1664 3224 e3d43b3b6a41985aa2a8b2e3432bf8409e542113d13df1a1658e0508e187dc3e.exe 89 PID 3224 wrote to memory of 1664 3224 e3d43b3b6a41985aa2a8b2e3432bf8409e542113d13df1a1658e0508e187dc3e.exe 89 PID 3224 wrote to memory of 1664 3224 e3d43b3b6a41985aa2a8b2e3432bf8409e542113d13df1a1658e0508e187dc3e.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3d43b3b6a41985aa2a8b2e3432bf8409e542113d13df1a1658e0508e187dc3e.exe"C:\Users\Admin\AppData\Local\Temp\e3d43b3b6a41985aa2a8b2e3432bf8409e542113d13df1a1658e0508e187dc3e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1664
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
810.9MB
MD540781d56b711de3611bbab14fb182571
SHA117e588f7ad7c56bb623f5025f3736057fd85d5cb
SHA2563422f8c989e24872ae82414164df1e2acd1e157ee0c08ce9bd4709cdd8aa9b8f
SHA512f0cd1b98ce39f42b1a4fcd357a307184e3db435379d517ed7cf4637ca0a85f12df968f555a9b4655c7123e6cf4feaf679b3787fd0e0735f0f558ba8ae4a8d811
-
Filesize
810.9MB
MD540781d56b711de3611bbab14fb182571
SHA117e588f7ad7c56bb623f5025f3736057fd85d5cb
SHA2563422f8c989e24872ae82414164df1e2acd1e157ee0c08ce9bd4709cdd8aa9b8f
SHA512f0cd1b98ce39f42b1a4fcd357a307184e3db435379d517ed7cf4637ca0a85f12df968f555a9b4655c7123e6cf4feaf679b3787fd0e0735f0f558ba8ae4a8d811