Analysis
-
max time kernel
127s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18-03-2023 14:16
Static task
static1
Behavioral task
behavioral1
Sample
Installer.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Installer.exe
Resource
win10v2004-20230220-en
General
-
Target
Installer.exe
-
Size
1.9MB
-
MD5
78d8d347bab1cea911f9c841654acef0
-
SHA1
81597af51260f0e810095374b3a997952dd67101
-
SHA256
7c849ca7534ee84e5e769f3f84f6af78121bc4e45b9888d1fdbfedd338b7e606
-
SHA512
77db0a76049cd38999753b7b7d0fb22ab6d5d5ae6727c2385526e2da5bdd7617e5a67f2e5419a06622a8e674ef810fa7cfe3d1bdefbb8a79253d890b07d39230
-
SSDEEP
24576:YcOkrpxc/T6kiXls2hPSu/9h0rxJSAWI3Hlbgcgtoz9Le7+fC8US431Tgt/Ts:YXkrH0Wdf9yTRlbgcgq9Le7+fppw1T
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1764 ntlhost.exe -
Loads dropped DLL 5 IoCs
pid Process 1760 Installer.exe 1760 Installer.exe 1764 ntlhost.exe 1764 ntlhost.exe 1764 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" Installer.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1764 1760 Installer.exe 28 PID 1760 wrote to memory of 1764 1760 Installer.exe 28 PID 1760 wrote to memory of 1764 1760 Installer.exe 28 PID 1760 wrote to memory of 1764 1760 Installer.exe 28 PID 1760 wrote to memory of 1764 1760 Installer.exe 28 PID 1760 wrote to memory of 1764 1760 Installer.exe 28 PID 1760 wrote to memory of 1764 1760 Installer.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1764
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219.9MB
MD5508dac8fef26e2ca4f839f0a1611749d
SHA10f4b51a67bf76b2936fae43dbca11456a004287a
SHA2566890f89e0ac24ce14d5e2184570b5fd87ee45b1b96899be48cc28b1418b4599e
SHA5128913c47b0197082caaad73953eb128b25a18765dd51e17d71d16135a77ae846f4dbf3aad63cd58560c22071759d2870631962824e09db1773a05bf20a718329e
-
Filesize
229.1MB
MD5dfc852b4893f2db3aae7c96eca19f424
SHA139d6dee1e63b4ff5d021b86e7da914fdbecd56d0
SHA2566998b179402afa95c6d19ca29041794fddf8b10f95c80b5d9640a4e395e2ca99
SHA512a712aa92a91259c92f2a3eece186b1a30ec7fdc6c08e0db053053cd749a4b7b877ec8f9f63dc6559656fa83f73c3d27ca3462bf60f357744058dd0b97cc7d817
-
Filesize
204.4MB
MD54b8613d064967089af5e01d5e327b3b0
SHA1ead9f3728986dd0f2d6fca80db4abc6012d5cc44
SHA25604ebe0c31388d69af03532659422b65b5fdead63f8c39f4cc845c37dca84159b
SHA51219a29702deefa2c63b8ec7a72221563eac971521fea9fa8e5ab4e3bea69e09f50435f2ca5a55befc919bb13167d7be42041cfe14cdd30874d6869982a4207c8c
-
Filesize
133.2MB
MD52550fd6e42af59338ceb50c6ba79ae09
SHA193f115212b557f5fe9a9b8b1f7e2adb8fb0a395f
SHA25683bfc1430612d7bb4e914fdf3d84c1095bc3d2fd9f9f1ed9de6288f60ee4ea16
SHA512680431f9f47e0c18235b27f415e7ae5ce2dd217edecabd469fb8fcf9d5fa76f56d6ca690ae83b29d0e45e12f9627092aa0799cf22d7e799662bb0e2e726c3ca4
-
Filesize
236.3MB
MD5a27e09338c37d8bafb9e306cbdfb358b
SHA15dc5bea9d8f2918d4015042f9465d2850b9aa3a9
SHA2562bd2f993b6e2ab715aea294ff9ed6519115e8f6665e61a495e5a897f3f1047fc
SHA5123c18a7431c457806c69391bccb5cb8f0ed7d286739302c747fb1546f5d4b57e344c5a7f6d1d54aa81cbf40a523246dfe37788b6c4ce5f6160cb6ea341137cc61
-
Filesize
235.3MB
MD55ed6834ede6e5a64e7745474c13f88be
SHA141fa9ecc3c92341cb60ce8f99072438d61c4bb15
SHA25641d877864a88dfb006851919969245321867f4cf4d12de66d34096c2385c6521
SHA5129a070a15b893c2cdecb5a605b9cff95d9fe5245793bf12f610635133132f68c6875502a7605857e536e72784f4e1873abd5bb5b89ed20bc6fce341017e086243
-
Filesize
218.9MB
MD51f141ddc297299c1ab1bb3cb86ecf194
SHA1ee7e8346fb176cb4c5e01936d332ea250b24142b
SHA25685a40b4445a94311d6be2843e2f11be0078717a3d3d1cf1fe7c9e135ad227eba
SHA51270e6dbc3fe4cd9f9e15da5bc49df0e678325713c30e7b4c9f1557e6a87a0b08abe78a341b24eaeff3a6f2156a776ea67564d48909c315af94ac316b636621e49
-
Filesize
237.8MB
MD5a81819b6dcb5621682f084fd6b50a079
SHA1ad6dbf49491778c860eda6221b0e128704557470
SHA256973697279e14596dfb5ca4c2ad8f87f5949104bbaba29fc58e368f1cd1043f79
SHA5125430031a1f4c35b1fa0a1854940379bab84ead7d67b5e0f7ca71c8dd9733a05c62ea6d9c39a62b2a7e1a5aeed35a32451410cb3ace21dc22d960987df52e1a87