Analysis
-
max time kernel
144s -
max time network
128s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
18-03-2023 20:42
Static task
static1
General
-
Target
559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e.exe
-
Size
292KB
-
MD5
5eed4c197a3f3830e36728e36fe0d63a
-
SHA1
c672bac7f861a93ce84652080b6d75acdc7f75ee
-
SHA256
559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e
-
SHA512
9ad56004de4cba6f574393373da00cf5748434f5a4e50f6ef5cde98b83cf6172cd61cd415ed1f4876136ed52587b091146185dfc913a8bfc53358eccbecaed59
-
SSDEEP
3072:MnBIggLi5GMPpdeEsCW0MGxoMjZ++Py5Rt4OvzhG6/SzBZog5E5tBlrH:lggLiYMPvTNMcoM9o4OvNFukNRlrH
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 4512 ECBGIEHDBA.exe 4828 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2112 559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e.exe 2112 559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" ECBGIEHDBA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1560 timeout.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 5 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2112 559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e.exe 2112 559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2820 2112 559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e.exe 66 PID 2112 wrote to memory of 2820 2112 559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e.exe 66 PID 2112 wrote to memory of 2820 2112 559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e.exe 66 PID 2112 wrote to memory of 3748 2112 559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e.exe 68 PID 2112 wrote to memory of 3748 2112 559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e.exe 68 PID 2112 wrote to memory of 3748 2112 559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e.exe 68 PID 3748 wrote to memory of 1560 3748 cmd.exe 70 PID 3748 wrote to memory of 1560 3748 cmd.exe 70 PID 3748 wrote to memory of 1560 3748 cmd.exe 70 PID 2820 wrote to memory of 4512 2820 cmd.exe 71 PID 2820 wrote to memory of 4512 2820 cmd.exe 71 PID 2820 wrote to memory of 4512 2820 cmd.exe 71 PID 4512 wrote to memory of 4828 4512 ECBGIEHDBA.exe 72 PID 4512 wrote to memory of 4828 4512 ECBGIEHDBA.exe 72 PID 4512 wrote to memory of 4828 4512 ECBGIEHDBA.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e.exe"C:\Users\Admin\AppData\Local\Temp\559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\ECBGIEHDBA.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\ECBGIEHDBA.exe"C:\Users\Admin\AppData\Local\Temp\ECBGIEHDBA.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Executes dropped EXE
PID:4828
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:1560
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
1.9MB
MD53a91b7ba77d714f9a9cd4a351b5965f0
SHA11c35a08edffae00dfe6592b30f35aa1a2c3da5c5
SHA256d0033b63960e146dbb9f2ae189a8acafd945a646f624b84148030827c18c6d06
SHA51292d14ff13e4c4befd664d8065403954c651841ccfda724118ff38fa89783a88eb9e30825ba4ca548478de526f9a77ed7279333c894f1e9d9f4bf39fd173af29b
-
Filesize
1.9MB
MD53a91b7ba77d714f9a9cd4a351b5965f0
SHA11c35a08edffae00dfe6592b30f35aa1a2c3da5c5
SHA256d0033b63960e146dbb9f2ae189a8acafd945a646f624b84148030827c18c6d06
SHA51292d14ff13e4c4befd664d8065403954c651841ccfda724118ff38fa89783a88eb9e30825ba4ca548478de526f9a77ed7279333c894f1e9d9f4bf39fd173af29b
-
Filesize
571.5MB
MD58f214769044c771040bddbf4811028e6
SHA1d32adb344d99e4f2a15a23e2afbe52bd5729429d
SHA256e80f74350fe64ec5b9423b8ed7323d24332d473c22a599b5d951e3d507bde5d3
SHA51254e976613e788ecd5fac31f6b944890550c2e2d8cf55723ff23e6717364a1cd9b10e1e4c57d7a90f8b2292a3c206439a8bc32039fb19d1bdbd20831064465a91
-
Filesize
481.9MB
MD5b9fbd5e51815f7615ba05d297fe75ae3
SHA1d41efcb427c1a224404b6b972c70f57e52f98c6a
SHA2565d1226a5d8f3ecabc46296f1e2bc0b316162e885f9968c335521aae8e7882942
SHA512dda128e6e544ce41a1d0feef254783f6c0c1c26d84054dd9d7ec929b9b38e6e8ea9a7d05decd7e0eeccde7179276ba7e832ab300b94777ddff36230648057ff8
-
Filesize
506.1MB
MD5d823e49fde1cf33f31544c9749e05953
SHA1635401b33f1bbd6896200f2a829b9d8cf6c5a556
SHA256b100ecf1b0a69ca1a93563ddda0857d7af98ac86714c37c9916ec6cec1244288
SHA512e91baa0e3371c852f99cad2e3f4861291de50c6f8b559fd6949a4db74f321a93e4d02bccb138424ff82c510a2da2e1fd7493765c019686e251814be15be2f534
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571