Analysis
-
max time kernel
148s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2023 14:19
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
1.9MB
-
MD5
e90f2482c026aab425f916f8c178350c
-
SHA1
1bc4d3728e9eda9fb248d1aec58b22f9990c0a40
-
SHA256
612b18a70f6dab4cf630c4892bfe908e0eaa7ffc9411f3ac2bb37f25e3187ead
-
SHA512
fe91ab479db3ded438b41a638494d58901957a0ac7d6d80425d2048aff069791008ce6bf8d343bd8f54c3e2cf032413afc574a5ee76c4957551ac14fa197b900
-
SSDEEP
49152:QcvCEnJ5rrgx7U/FFOAnh0Q7OuQJL/KAF4pJJ9peX9:Q0tJ5oxodTx2JR4pJJveX9
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3568 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" setup.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 22 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4444 wrote to memory of 3568 4444 setup.exe 88 PID 4444 wrote to memory of 3568 4444 setup.exe 88 PID 4444 wrote to memory of 3568 4444 setup.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:3568
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
725.9MB
MD502ee79eef7b5572444a2ee01d633b352
SHA15063826ba718cf48d8c7943027e7f8af7e65f1df
SHA2569cba84c15da748077bb22f34243cc51396a8ca672f6c849b171536524372bec7
SHA51245bc47f7fbc8bfc5b1a86f690d760c080e4f815a68a11a31c170032bb500243b4bdf9f78210b10ae909648e100365b9286755916fb1d201b5870c04e23223ca5
-
Filesize
725.9MB
MD502ee79eef7b5572444a2ee01d633b352
SHA15063826ba718cf48d8c7943027e7f8af7e65f1df
SHA2569cba84c15da748077bb22f34243cc51396a8ca672f6c849b171536524372bec7
SHA51245bc47f7fbc8bfc5b1a86f690d760c080e4f815a68a11a31c170032bb500243b4bdf9f78210b10ae909648e100365b9286755916fb1d201b5870c04e23223ca5