Analysis
-
max time kernel
147s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2023 19:04
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
1.9MB
-
MD5
bdd49eb42688886ee312ae57d9d1f654
-
SHA1
9fa1b8eb6b546d78150324b2303b9425b8f23dc5
-
SHA256
eb9e358c4d722aff74cbcf3a4f7c11a69aad1c80e93f52f75ad94d5e4a29db02
-
SHA512
6bb152f179c781a26107e9f3e2084f2e70fc15835c30d40cfc27d3d354ebb3214851a9cd350f1504b151fa792c5ac8d6290f3b4da5c8839ee3b759766e92a586
-
SSDEEP
49152:fzmvpQccgreskIaAUgrqgHkrWIF994X5IBY:fzOJtqgHkVoIB
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2680 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" setup.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 39 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4312 wrote to memory of 2680 4312 setup.exe 90 PID 4312 wrote to memory of 2680 4312 setup.exe 90 PID 4312 wrote to memory of 2680 4312 setup.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:2680
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
813.9MB
MD5d5204f389154e606178addeab36542c6
SHA149e6c204b1e39aa2ea475f23e3fd1495f368153a
SHA2560e65669e6c32dc2b0292330fb4ce75e8aec101243410e90e0d5b4958b75a03a5
SHA512e6b1ff9dcfa1e1ec26982fcff0badb5ea758ff0d3cab0aa8b8c74358b7b98d0131565985b67e701f0b1a115f534c093c042eace3b385838bb9b9554431a95c1a
-
Filesize
813.9MB
MD5d5204f389154e606178addeab36542c6
SHA149e6c204b1e39aa2ea475f23e3fd1495f368153a
SHA2560e65669e6c32dc2b0292330fb4ce75e8aec101243410e90e0d5b4958b75a03a5
SHA512e6b1ff9dcfa1e1ec26982fcff0badb5ea758ff0d3cab0aa8b8c74358b7b98d0131565985b67e701f0b1a115f534c093c042eace3b385838bb9b9554431a95c1a