Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
19-03-2023 01:30
Static task
static1
Behavioral task
behavioral1
Sample
de7320a71b9a0de261be6f7a8d36a6f13c3989681bb98627bc169d0e3f3c76eb.exe
Resource
win10-20230220-en
General
-
Target
de7320a71b9a0de261be6f7a8d36a6f13c3989681bb98627bc169d0e3f3c76eb.exe
-
Size
1.9MB
-
MD5
87b5057f44c2a25338f03f6ba10358ad
-
SHA1
b8d68c22a48b7b1dabecf2d0cb830392291e3cab
-
SHA256
de7320a71b9a0de261be6f7a8d36a6f13c3989681bb98627bc169d0e3f3c76eb
-
SHA512
2c6463eb46b6f2f263beb3601bdf909f7dfb24c4b1b0cb5dd6f19777ae703d7daa84c483e575ffce2792751925668afb6bf4bf0bd2f7e0898f057900eb4b9367
-
SSDEEP
49152:oM/+7nPk+ae5ce+4E4+OFqG5nYhdB8DrMFm:oM/gPkzeXEORnYhUi
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4060 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" de7320a71b9a0de261be6f7a8d36a6f13c3989681bb98627bc169d0e3f3c76eb.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 4 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3236 wrote to memory of 4060 3236 de7320a71b9a0de261be6f7a8d36a6f13c3989681bb98627bc169d0e3f3c76eb.exe 66 PID 3236 wrote to memory of 4060 3236 de7320a71b9a0de261be6f7a8d36a6f13c3989681bb98627bc169d0e3f3c76eb.exe 66 PID 3236 wrote to memory of 4060 3236 de7320a71b9a0de261be6f7a8d36a6f13c3989681bb98627bc169d0e3f3c76eb.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\de7320a71b9a0de261be6f7a8d36a6f13c3989681bb98627bc169d0e3f3c76eb.exe"C:\Users\Admin\AppData\Local\Temp\de7320a71b9a0de261be6f7a8d36a6f13c3989681bb98627bc169d0e3f3c76eb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:4060
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
613.8MB
MD58ae72b72916e7739ecc68eaca37fe3a0
SHA1b3f5f68bf4a98377a9fe91344aabdefb6a6230e4
SHA256ac519b633a0f5537d4dfd5e86a0f2cad18dd4f504947da06dce3ad274978c0a7
SHA5124049e941960c334815ac5ea82f614bdc82f7fae73c07926f6e2389b2f061e9d309f86b468bff0ef191768955d2e4343dea782cc8d09d0088e9bde2eacbf1db60
-
Filesize
582.6MB
MD532cd8ca3a900cd57ed00ee7abd9a3583
SHA143d89dc81aee924cda94d35ceaf758f73d932f25
SHA2560bfe8b2f4350a0d76890a1706c3155ef525366f72d8291073b0547eb69ac63a2
SHA5129654bea5b3eafe2665187040dfd23647d9291347af2504128c35dafa7df8694d837b595187227c6101c1893c200238409747275dde70100d1cfe3f7f77ecc327