Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2023 14:16
Static task
static1
Behavioral task
behavioral1
Sample
Installer.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Installer.exe
Resource
win10v2004-20230220-en
General
-
Target
Installer.exe
-
Size
1.9MB
-
MD5
78d8d347bab1cea911f9c841654acef0
-
SHA1
81597af51260f0e810095374b3a997952dd67101
-
SHA256
7c849ca7534ee84e5e769f3f84f6af78121bc4e45b9888d1fdbfedd338b7e606
-
SHA512
77db0a76049cd38999753b7b7d0fb22ab6d5d5ae6727c2385526e2da5bdd7617e5a67f2e5419a06622a8e674ef810fa7cfe3d1bdefbb8a79253d890b07d39230
-
SSDEEP
24576:YcOkrpxc/T6kiXls2hPSu/9h0rxJSAWI3Hlbgcgtoz9Le7+fC8US431Tgt/Ts:YXkrH0Wdf9yTRlbgcgq9Le7+fppw1T
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 264 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" Installer.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 26 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1764 wrote to memory of 264 1764 Installer.exe 88 PID 1764 wrote to memory of 264 1764 Installer.exe 88 PID 1764 wrote to memory of 264 1764 Installer.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:264
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
762.9MB
MD58133d3a4a69282c7749dbdb748bf76f3
SHA14ffe650a4ed384be68b6ead1e1e1ee0ec0c7769a
SHA2563e3d9699961f386463339062537cf7bd3533deb99d5c204c83f2e1fcd5ee5dc6
SHA5120060694a1fe06b7bf4c0dcdd55172fcbca6c4ebd96a428b27c5a3ab897a2ef2b1b961e800b0be1c30137cba17f273828458a1b88247d1bb1ec7774c5d143dfe3
-
Filesize
762.9MB
MD58133d3a4a69282c7749dbdb748bf76f3
SHA14ffe650a4ed384be68b6ead1e1e1ee0ec0c7769a
SHA2563e3d9699961f386463339062537cf7bd3533deb99d5c204c83f2e1fcd5ee5dc6
SHA5120060694a1fe06b7bf4c0dcdd55172fcbca6c4ebd96a428b27c5a3ab897a2ef2b1b961e800b0be1c30137cba17f273828458a1b88247d1bb1ec7774c5d143dfe3