Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2023 20:59
Static task
static1
Behavioral task
behavioral1
Sample
avicapn32.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
avicapn32.exe
Resource
win10v2004-20230220-en
General
-
Target
avicapn32.exe
-
Size
8.6MB
-
MD5
8d7cf73ce0624c89820492186e81268e
-
SHA1
f43f83b11e6e4b850297443a30803f72cef99489
-
SHA256
2a8e2ab611c7ea1a7c4e7b6fd50cef0a812ae4921a66d25106a039c90582ce29
-
SHA512
2bc53e07e6d5d6b4267430011943824590001d8c341a5ccffb2260fc26fa1693d4a146f27a26a579450f822c5998551dfda50814e0b24d4cba8c903ccd8289cd
-
SSDEEP
196608:dCFM0/NuKzJqwRCCuNhH8DuSHVKiPxtgDe/3jyAan7Ftnl+6+GVp7:KMMsA3U4t1HDOAI7T7
Malware Config
Extracted
laplas
http://185.223.93.223
-
api_key
afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4532 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" avicapn32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3748 avicapn32.exe 3748 avicapn32.exe 4532 ntlhost.exe 4532 ntlhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 45 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3748 avicapn32.exe 3748 avicapn32.exe 4532 ntlhost.exe 4532 ntlhost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3748 wrote to memory of 4532 3748 avicapn32.exe 92 PID 3748 wrote to memory of 4532 3748 avicapn32.exe 92 PID 3748 wrote to memory of 4532 3748 avicapn32.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\avicapn32.exe"C:\Users\Admin\AppData\Local\Temp\avicapn32.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
759.6MB
MD5c82a2c38076c9cb1f8492fae9bfc5a60
SHA11c8f596839f48614240a4d5316b1d084d83e8814
SHA256f00bef85a23fa4c15ce7d38e00c9647213ea13556149f66e5d08d2b9bae241ad
SHA5125120b6a258f5185636141d701961fe0a4a22e052fdd7a171fb2ce15a8a3ec75f8fb2e0a89cace61fe3a3d50a528e7e552994b053eabab4b226b56ba66595a84e
-
Filesize
759.6MB
MD5c82a2c38076c9cb1f8492fae9bfc5a60
SHA11c8f596839f48614240a4d5316b1d084d83e8814
SHA256f00bef85a23fa4c15ce7d38e00c9647213ea13556149f66e5d08d2b9bae241ad
SHA5125120b6a258f5185636141d701961fe0a4a22e052fdd7a171fb2ce15a8a3ec75f8fb2e0a89cace61fe3a3d50a528e7e552994b053eabab4b226b56ba66595a84e