Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2023 04:52
Static task
static1
Behavioral task
behavioral1
Sample
lap.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
lap.exe
Resource
win10v2004-20230220-en
General
-
Target
lap.exe
-
Size
1.9MB
-
MD5
3c491cde84daac60101335966f900fbd
-
SHA1
864776f60349bd90f2ae409286d3401e4ec9b63c
-
SHA256
f82abb756b52669b2dc6911e2d84189018887416fbcf090f8ce32dc7c55a6fb7
-
SHA512
72f8c94c990bc04f9e48b7124c44b16b617eb02d0fbc11875fe62d01e8da336f4f11e93ca1bae9918a01767174a7232eabed2132c8124ef807ffed964de42f1e
-
SSDEEP
24576:mf8Wd/isEwOuPdRIsUG5uttp+CUbs0VhKF8gcC8h+WPzJezRevpepQ/nT0WDdOp:4FiTwO8HIsUG8tp+C8jth+IezeqeZO
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4368 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" lap.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4748 2244 WerFault.exe 84 -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 20 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2244 wrote to memory of 4368 2244 lap.exe 87 PID 2244 wrote to memory of 4368 2244 lap.exe 87 PID 2244 wrote to memory of 4368 2244 lap.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\lap.exe"C:\Users\Admin\AppData\Local\Temp\lap.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 4282⤵
- Program crash
PID:4748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2244 -ip 22441⤵PID:4056
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
760.9MB
MD51d7b002e84b725a859caeb8baee5cf4e
SHA1e2ce22c80a4316a590a82b0c3847537e6ea10155
SHA25615baa91dcd5fd86521966f62c6ac20bc18d6496067126619d4fd446666b9ee38
SHA51276b7a684c9d5236aa891b310984975ab33a185cb21ffdae5a3545d237dad0e4b0e881b2c1d6f2302daeab8a74adaab2d10778f110c2ec5f431635a9061d6fe93
-
Filesize
645.7MB
MD5c9de8592fb9b582f936e49e41c36cd6b
SHA1c4aed02a5ee003b46e985cfb60750a81ec50f7d2
SHA2569e779699e9f2dddf9c882271f5cd0d432ec47b5b108ca386bee105f1ea6b70aa
SHA51282755a76df7fc10e1655e18459a982fe7ec2f3685624ffabce3957eed148d7af3e7e72a486b7f215936acebd95a9941c51191504b678bab77ca96afe5542476e