Analysis
-
max time kernel
137s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20-03-2023 01:37
Static task
static1
Behavioral task
behavioral1
Sample
eb9e358c4d722aff74cbcf3a4f7c11a69aad1c80e93f52f75ad94d5e4a29db02.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
eb9e358c4d722aff74cbcf3a4f7c11a69aad1c80e93f52f75ad94d5e4a29db02.exe
Resource
win10v2004-20230221-en
General
-
Target
eb9e358c4d722aff74cbcf3a4f7c11a69aad1c80e93f52f75ad94d5e4a29db02.exe
-
Size
1.9MB
-
MD5
bdd49eb42688886ee312ae57d9d1f654
-
SHA1
9fa1b8eb6b546d78150324b2303b9425b8f23dc5
-
SHA256
eb9e358c4d722aff74cbcf3a4f7c11a69aad1c80e93f52f75ad94d5e4a29db02
-
SHA512
6bb152f179c781a26107e9f3e2084f2e70fc15835c30d40cfc27d3d354ebb3214851a9cd350f1504b151fa792c5ac8d6290f3b4da5c8839ee3b759766e92a586
-
SSDEEP
49152:fzmvpQccgreskIaAUgrqgHkrWIF994X5IBY:fzOJtqgHkVoIB
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2024 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2040 eb9e358c4d722aff74cbcf3a4f7c11a69aad1c80e93f52f75ad94d5e4a29db02.exe 2040 eb9e358c4d722aff74cbcf3a4f7c11a69aad1c80e93f52f75ad94d5e4a29db02.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" eb9e358c4d722aff74cbcf3a4f7c11a69aad1c80e93f52f75ad94d5e4a29db02.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 3 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2024 2040 eb9e358c4d722aff74cbcf3a4f7c11a69aad1c80e93f52f75ad94d5e4a29db02.exe 28 PID 2040 wrote to memory of 2024 2040 eb9e358c4d722aff74cbcf3a4f7c11a69aad1c80e93f52f75ad94d5e4a29db02.exe 28 PID 2040 wrote to memory of 2024 2040 eb9e358c4d722aff74cbcf3a4f7c11a69aad1c80e93f52f75ad94d5e4a29db02.exe 28 PID 2040 wrote to memory of 2024 2040 eb9e358c4d722aff74cbcf3a4f7c11a69aad1c80e93f52f75ad94d5e4a29db02.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb9e358c4d722aff74cbcf3a4f7c11a69aad1c80e93f52f75ad94d5e4a29db02.exe"C:\Users\Admin\AppData\Local\Temp\eb9e358c4d722aff74cbcf3a4f7c11a69aad1c80e93f52f75ad94d5e4a29db02.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:2024
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506.6MB
MD5aa4b111b905728cf46eff3f6365e10f6
SHA1b3ca654612a0f45b19f0494d938215b423538cb6
SHA256e090f9f0f0dae937329af92abb45c0dafe6c3b542e73e758dec3a4252e9388e4
SHA5128fd8290c0e365ef3e2af1816aca60e49bf40b1c1a4a24d2edbc03004dbae3a4f9305f0a0af2d4e406de5b70626fc69b8ff2ad3d0f3798f208ba84efdbdd77119
-
Filesize
504.9MB
MD54a53766696d1000037356761d5995dc7
SHA10db346ae996525aac2798f25c0581dd8a85e0649
SHA2564aa74a43854c3333de8d43186a41ba6dc4ce58796973a53de3e2d349c0172a5a
SHA5127f908d78b908e5a2c3524597f1461d8a37d97e0c3bf07ccfa504a6ed9d649c745a9320f7e7fb179fcaea974d6376c57e292895ec2071e622109414c5821c14c4
-
Filesize
310.4MB
MD558df2e5142ecaad72742c443eaf19d26
SHA1c60ebcb121293b38c01e73b21df0e8c7b14b1774
SHA256106eab2fdd6d9fc992f2ae87d753b1c7cf3b8879a296ac7f8baf3ad4e389a504
SHA51291f152db9ae15dbc8f527cb335b5afe6b9e7a4b5b2282484fe1446e0b2c5e846ba173fda14fdf80a7e3610a3c9b290683db2f4d712c4b7d2af32ac43c29261be
-
Filesize
537.8MB
MD56ba80e2d4d76495d6424e7d343f13da1
SHA1b527502f4316928fa517ecd2cdf500cfba83986e
SHA256ff31de13c7de594e4a5de6cfbcdd01f42a887ed7715e6316cbcdb04ad2e12646
SHA51262476ef7f1af0f7f0c04dc082636fc6174f854575ad9288a5bbe028a4530ed21532699618aa41eb5c94de4612e4d364644d3b86e675b55bf8cf89dfb21e8ed09