Analysis
-
max time kernel
127s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18-03-2023 14:14
Static task
static1
Behavioral task
behavioral1
Sample
IDH1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
IDH1.exe
Resource
win10v2004-20230221-en
General
-
Target
IDH1.exe
-
Size
1.9MB
-
MD5
ad71a24d622cbb5f8335ead026d1bdfc
-
SHA1
f95ddc723a16ed62fc670069a2e33e358ff68faf
-
SHA256
9178d0152c7511a2f09a96a647508c211ad860780a50a753ed4c22c0fd71ec98
-
SHA512
c5fe10a019dabe6cac7e2b50c3e5e2616a66a35c46d7aad600f501a1afa71020e53527c13a3e1bdf0606d362a4c13ed36cda44b2cd8be06cc330d4fa4fca47f1
-
SSDEEP
49152:KQMNpBLv05kosHTzRIMvQyxmNTD/dscF96zpP6rF/c:KNNLvGkJTywxmIpzcry
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 844 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1104 IDH1.exe 1104 IDH1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" IDH1.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1104 wrote to memory of 844 1104 IDH1.exe 27 PID 1104 wrote to memory of 844 1104 IDH1.exe 27 PID 1104 wrote to memory of 844 1104 IDH1.exe 27 PID 1104 wrote to memory of 844 1104 IDH1.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\IDH1.exe"C:\Users\Admin\AppData\Local\Temp\IDH1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:844
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389.3MB
MD559bf7612ddd0891307dcf821ce4af3ff
SHA1c8827549ec4b62cb6be19685dcc209c82ba098fb
SHA2561521ef0bd53b6133859050f60c797648d628c4b9d1c80c8e2d2dd06cf7bb539a
SHA512bee6e098639f3e4b5fb35e1c24d425a62ba72daf0fd28fb00725d7c173c707da89af50809d9488740b3c63bacd5724219d81725f5efe1cf89fb9c7bb35457678
-
Filesize
360.3MB
MD56783baf581b2bdd50ecf3671c6d8a180
SHA18d68233271d0bab6d8e1da19055532fc1bcabfba
SHA25634f58e12dbb7f2877f32633379bff75af9d5456e8c30d9efb03e5ab9dd4e1a57
SHA512a54705802d0d77a23e083a079ea802f23a2eee2aa3b9b0ed0c79a808bf414bd0ea41f91766f2b53e2de153dfa7acfb33adfe6f330ddfa4a4a97392365720751f
-
Filesize
282.1MB
MD5ebef0e7204658fb5bc3b5b830e10609d
SHA1b7655651948c873a37832bc856b587cedf59bbec
SHA256e009e98a2f89e3720e39b236a5ecd632b34e3ffce8de518b9676d0ba59919b9e
SHA512870640c5e9760ef3c7f301b0a45f21ae5162c18a6c229eda65480a9ac7d6ed2745e0e36510305dd2cba0250489b07e3ab63622d33901efea32ab30a50d9f38e2
-
Filesize
384.8MB
MD56501e8939011518cd0403bd57ebd6ce7
SHA13601deb8f90ee7756ddb8392cce2e4f364025723
SHA2560c721bf31d55b3e7d5137e0be7d74e614ec910ba2e3b4b752cc71842f242d568
SHA512ee0818efdba2c99962077d29b7630710106c867c8949917ddf182f175725092221bcdaa2d17771044ee27ab228cd7030d98854e961a67f217bc9b9ffee344018