Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
18-03-2023 14:41
Static task
static1
Behavioral task
behavioral1
Sample
c18e099aff653a5616a1401ca0268c2f7a33b86012a07b2be1bd19ccde628f38.exe
Resource
win10-20230220-en
General
-
Target
c18e099aff653a5616a1401ca0268c2f7a33b86012a07b2be1bd19ccde628f38.exe
-
Size
1.9MB
-
MD5
3434c9617dfb31a20021d756d977f6ff
-
SHA1
a5b24fcad8e1fb557fea8780449e88a14131b639
-
SHA256
c18e099aff653a5616a1401ca0268c2f7a33b86012a07b2be1bd19ccde628f38
-
SHA512
9dadb7eade2bf1bbe13e76491eaef2fe2bce97072414af712ceead6f85b4ff1665d7a5727a1d9f77d6fec60cf5453028dd751d1b7d2249177d082fbb2980a0c7
-
SSDEEP
49152:chH2KphK+nilTSxMDvPaqVQFghGhULV7JMRS:chpK5RSxMDvPMgGhyG
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4168 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" c18e099aff653a5616a1401ca0268c2f7a33b86012a07b2be1bd19ccde628f38.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 2 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4108 wrote to memory of 4168 4108 c18e099aff653a5616a1401ca0268c2f7a33b86012a07b2be1bd19ccde628f38.exe 66 PID 4108 wrote to memory of 4168 4108 c18e099aff653a5616a1401ca0268c2f7a33b86012a07b2be1bd19ccde628f38.exe 66 PID 4108 wrote to memory of 4168 4108 c18e099aff653a5616a1401ca0268c2f7a33b86012a07b2be1bd19ccde628f38.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\c18e099aff653a5616a1401ca0268c2f7a33b86012a07b2be1bd19ccde628f38.exe"C:\Users\Admin\AppData\Local\Temp\c18e099aff653a5616a1401ca0268c2f7a33b86012a07b2be1bd19ccde628f38.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:4168
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
585.6MB
MD5ce463e78e6d0eaf504b8582b38a62f0e
SHA1a4f0d29b2b935cfe0934c6801d38e1623794989f
SHA256b669e1edf1917da85d09a423d37dcee12ba146b4ff32b662eae43404303c527b
SHA512d8eb8d815e6caa02fadcb01de955fc59b9c7fefd470a907cf17282d862610bada38aafa3952da18bb6367986e2dac0d9111483241101f94547017a445c403fe3
-
Filesize
530.6MB
MD5c15cb4bdde3474de9a566c975004ed69
SHA168f9480e113325d2268ebc4ae00c38edc371cd98
SHA256dd2a00d907fc53b87020f5da8b1cb1331a0385fd39a6eacaae1fdb30fb2a0184
SHA5123bedb905fc287f93662cb689c58b9623a746573459d774df905be03e872edfabf93bfa2649546702d3965a53cbef85014b2387b14f013301a5fc452b5058fd65