Analysis
-
max time kernel
147s -
max time network
134s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
19-03-2023 17:48
Static task
static1
Behavioral task
behavioral1
Sample
76cc8757ee316be0f5df4dc50c3a037c80c973010bf14865530c6565ed9dd6cc.exe
Resource
win10-20230220-en
General
-
Target
76cc8757ee316be0f5df4dc50c3a037c80c973010bf14865530c6565ed9dd6cc.exe
-
Size
1.9MB
-
MD5
43c579b61538e72afa5307046c2f110d
-
SHA1
b8c34206cec5c7993ec20c4bf6ce78c024179137
-
SHA256
76cc8757ee316be0f5df4dc50c3a037c80c973010bf14865530c6565ed9dd6cc
-
SHA512
3b4dfeea0d5c44bb419eba2a063d4ecee83862b2a06aae446b7a591c60bce93dfcd58c382a72d597a302ea12be3efa6711fb9791b34c85faed5867c3bef59d52
-
SSDEEP
49152:TWtQzK/HdYuPKuWoUhjlT0O5Ch05Tjij:TLK/HSuPKuWZhjt0OQqJj6
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2552 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 76cc8757ee316be0f5df4dc50c3a037c80c973010bf14865530c6565ed9dd6cc.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2552 2236 76cc8757ee316be0f5df4dc50c3a037c80c973010bf14865530c6565ed9dd6cc.exe 66 PID 2236 wrote to memory of 2552 2236 76cc8757ee316be0f5df4dc50c3a037c80c973010bf14865530c6565ed9dd6cc.exe 66 PID 2236 wrote to memory of 2552 2236 76cc8757ee316be0f5df4dc50c3a037c80c973010bf14865530c6565ed9dd6cc.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\76cc8757ee316be0f5df4dc50c3a037c80c973010bf14865530c6565ed9dd6cc.exe"C:\Users\Admin\AppData\Local\Temp\76cc8757ee316be0f5df4dc50c3a037c80c973010bf14865530c6565ed9dd6cc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:2552
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
703.0MB
MD543ca64080bef10ab9387c67b6a132729
SHA1b052931cd625a38ccd5213434c2acaf155bb4bd5
SHA2563790b73270dd6b70e1b70de4e030e80b2c860024b6b00b5642e3cc1bf1500ae3
SHA512a32bce1b48bd6ce8a596172f2fca05976c0af6194fdbc23c2dff6db2a49db3b43953a087c2d5bff318abf84352380992d1718d64582ab50b0eeb68c1e3a35357
-
Filesize
617.2MB
MD52129e5d0e5d652c7f76e5546e74a421f
SHA1ae91d4e73dff9f6438f3621fbfb19cbc480fb038
SHA256928c4f8a1fae87f99ea13dea2124546024d45745d9870f6901185e62abe07748
SHA512ed19be1674767b5d1319baf77728218d4a8bfb1766b1e0416173959a2319a1f007b6b16d9d80ce2601d2551c306fc43972efcb09b0dca6894f40cc21a56d47a5