Analysis
-
max time kernel
131s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20-03-2023 12:09
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
General
-
Target
setup.exe
-
Size
291KB
-
MD5
8cca6d631010620a368ddc7925c0649c
-
SHA1
cbac7cdb0b393a64a25726c09c718616e83ffa8f
-
SHA256
15539a353d5b7e18b87b30f717454dc25c4261954d97af791596ea49acb1fa92
-
SHA512
4c38a618668d2fe78ee950aaadd4f32d7f4ff3130039efefb1e039bc79aeedb2e065141fdd96d4255735ffb68a991b83e0d4609e02a76a958c99feda4f24135c
-
SSDEEP
3072:2D2H6X9LmnZiTw5aX/ifwSYt3pkki/c9yEh+vp5nbrSLJhCe:MX9LmnMTlX/iYSYPkR/cWvzvohC
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 1888 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 656 FCAEBFIJKE.exe 960 ntlhost.exe -
Loads dropped DLL 10 IoCs
pid Process 2044 setup.exe 2044 setup.exe 1548 cmd.exe 1548 cmd.exe 656 FCAEBFIJKE.exe 656 FCAEBFIJKE.exe 656 FCAEBFIJKE.exe 656 FCAEBFIJKE.exe 960 ntlhost.exe 960 ntlhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" FCAEBFIJKE.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString setup.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1044 timeout.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 5 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2044 setup.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1548 2044 setup.exe 29 PID 2044 wrote to memory of 1548 2044 setup.exe 29 PID 2044 wrote to memory of 1548 2044 setup.exe 29 PID 2044 wrote to memory of 1548 2044 setup.exe 29 PID 2044 wrote to memory of 1548 2044 setup.exe 29 PID 2044 wrote to memory of 1548 2044 setup.exe 29 PID 2044 wrote to memory of 1548 2044 setup.exe 29 PID 2044 wrote to memory of 1888 2044 setup.exe 31 PID 2044 wrote to memory of 1888 2044 setup.exe 31 PID 2044 wrote to memory of 1888 2044 setup.exe 31 PID 2044 wrote to memory of 1888 2044 setup.exe 31 PID 2044 wrote to memory of 1888 2044 setup.exe 31 PID 2044 wrote to memory of 1888 2044 setup.exe 31 PID 2044 wrote to memory of 1888 2044 setup.exe 31 PID 1888 wrote to memory of 1044 1888 cmd.exe 33 PID 1888 wrote to memory of 1044 1888 cmd.exe 33 PID 1888 wrote to memory of 1044 1888 cmd.exe 33 PID 1888 wrote to memory of 1044 1888 cmd.exe 33 PID 1888 wrote to memory of 1044 1888 cmd.exe 33 PID 1888 wrote to memory of 1044 1888 cmd.exe 33 PID 1888 wrote to memory of 1044 1888 cmd.exe 33 PID 1548 wrote to memory of 656 1548 cmd.exe 34 PID 1548 wrote to memory of 656 1548 cmd.exe 34 PID 1548 wrote to memory of 656 1548 cmd.exe 34 PID 1548 wrote to memory of 656 1548 cmd.exe 34 PID 1548 wrote to memory of 656 1548 cmd.exe 34 PID 1548 wrote to memory of 656 1548 cmd.exe 34 PID 1548 wrote to memory of 656 1548 cmd.exe 34 PID 656 wrote to memory of 960 656 FCAEBFIJKE.exe 35 PID 656 wrote to memory of 960 656 FCAEBFIJKE.exe 35 PID 656 wrote to memory of 960 656 FCAEBFIJKE.exe 35 PID 656 wrote to memory of 960 656 FCAEBFIJKE.exe 35 PID 656 wrote to memory of 960 656 FCAEBFIJKE.exe 35 PID 656 wrote to memory of 960 656 FCAEBFIJKE.exe 35 PID 656 wrote to memory of 960 656 FCAEBFIJKE.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\FCAEBFIJKE.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\FCAEBFIJKE.exe"C:\Users\Admin\AppData\Local\Temp\FCAEBFIJKE.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:960
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\setup.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:1044
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5aa3321fbcbc033da9e097aacf740fdc5
SHA1e9ecea40f56118e22d2d2bd53588d53804b2e91f
SHA2564ca3dbb5395f00dd3e6a76add2069626e3db6222be3b8bba9a29444c5960f47f
SHA512f8459386d1ec1151b1217587111a14584e2cf3086f2895e9c6ec67a3d50df93d20213e482999895ff9d0f58b3b9311254457a21fd15e14995cba5726758a7caa
-
Filesize
1.9MB
MD5aa3321fbcbc033da9e097aacf740fdc5
SHA1e9ecea40f56118e22d2d2bd53588d53804b2e91f
SHA2564ca3dbb5395f00dd3e6a76add2069626e3db6222be3b8bba9a29444c5960f47f
SHA512f8459386d1ec1151b1217587111a14584e2cf3086f2895e9c6ec67a3d50df93d20213e482999895ff9d0f58b3b9311254457a21fd15e14995cba5726758a7caa
-
Filesize
223.9MB
MD5473cf9499de2ec29f05277d67ec36697
SHA1ef93fc911ebc3a8faae145693109be2e4dca1b68
SHA2560a465f72ae0aadec610579631f25520c484272aadd313618c9ee1b046c7f0975
SHA5120d2fecdfdb1e0458e2e660290b92bab60c2dc104243ff498a39ad0102e169457c9119bb4def6c5d4b43ca4c64adca90a94ec7074ec8e2f86ac6758fe9dc3ca51
-
Filesize
212.6MB
MD5a28eccfaaa2b973ae583ff6b21e428c0
SHA19661bce47e4c42242ba00fe6508537c66527d1c3
SHA256480728a4c7706cf8462bd5c005a54a02261ed295e22ac2f0f7474c0f91927376
SHA512ababce10ac189180a03171a43e945f064ad73903581bd43fde41c730d0c63d4ac4f2d2d070adf219f0f4a86b5aa9ef19f1bce5a106b5e5fcff271f80a627e325
-
Filesize
215.2MB
MD5aa1971f35973b8d222e1332569b3e08a
SHA1a85e181c0003d61232043dce890466ca3486dd5d
SHA2561999b6d3eded1f8e4d11c3b58f9cbb3afd618288cdf888a59071bf25cbdba573
SHA512f0edb295450a3649eb867f1e11b85c55b2474ad02cb17179b7c6ccf922f8333c4ca65526972d49a494284d12567dcf8fd127fe97247779f748cad5736e9a96dc
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.9MB
MD5aa3321fbcbc033da9e097aacf740fdc5
SHA1e9ecea40f56118e22d2d2bd53588d53804b2e91f
SHA2564ca3dbb5395f00dd3e6a76add2069626e3db6222be3b8bba9a29444c5960f47f
SHA512f8459386d1ec1151b1217587111a14584e2cf3086f2895e9c6ec67a3d50df93d20213e482999895ff9d0f58b3b9311254457a21fd15e14995cba5726758a7caa
-
Filesize
1.9MB
MD5aa3321fbcbc033da9e097aacf740fdc5
SHA1e9ecea40f56118e22d2d2bd53588d53804b2e91f
SHA2564ca3dbb5395f00dd3e6a76add2069626e3db6222be3b8bba9a29444c5960f47f
SHA512f8459386d1ec1151b1217587111a14584e2cf3086f2895e9c6ec67a3d50df93d20213e482999895ff9d0f58b3b9311254457a21fd15e14995cba5726758a7caa
-
Filesize
1.9MB
MD5aa3321fbcbc033da9e097aacf740fdc5
SHA1e9ecea40f56118e22d2d2bd53588d53804b2e91f
SHA2564ca3dbb5395f00dd3e6a76add2069626e3db6222be3b8bba9a29444c5960f47f
SHA512f8459386d1ec1151b1217587111a14584e2cf3086f2895e9c6ec67a3d50df93d20213e482999895ff9d0f58b3b9311254457a21fd15e14995cba5726758a7caa
-
Filesize
1.9MB
MD5aa3321fbcbc033da9e097aacf740fdc5
SHA1e9ecea40f56118e22d2d2bd53588d53804b2e91f
SHA2564ca3dbb5395f00dd3e6a76add2069626e3db6222be3b8bba9a29444c5960f47f
SHA512f8459386d1ec1151b1217587111a14584e2cf3086f2895e9c6ec67a3d50df93d20213e482999895ff9d0f58b3b9311254457a21fd15e14995cba5726758a7caa
-
Filesize
223.7MB
MD5fd564257cb6eb67d5a05c4cdda64d600
SHA1d6f4865ed37779b503d634ce45a10f5fe0bd6217
SHA256c5fe6100953ac91f2b73e76268275cd71bdc1b24f29eac66d2805b336b269d07
SHA5120c978f665abffdd303c15d3dafba8d876c95e508235036a8c24155a38646dc678bb821075c00b7593fa00ad2b391ccd1e910d2efa09319bb6931df9ce11e20b3
-
Filesize
224.3MB
MD54cf99307682412ea9b16226a5e6b66a6
SHA164d9f35f4e347f2cd7e127fa9179891a9c1434a1
SHA256dd792cb50b930478c759bb1a5c7f1a0c4b54c392bfb26bdca742acb4709a2ced
SHA512fbe5fc7ad8bb355f7f15934195ba2ba9e4311a8e81f917092120dc23cc87372440f91943b1215b6b7e827837d4469f2727e87fdcd3bdb83ce5ec434c54df8d63
-
Filesize
220.1MB
MD53e8e7a9cf56f2ebad8a59973e8f0366e
SHA13d82ef99625db4c2cece72985bfa0b9adda34285
SHA256be9e299f9eb364f2ea38affd4d9ac9b0d837901ff1d9638a035cd2f8f2dc68b6
SHA5128014720d21db606bc099150d536416c2f2031c17d3df38aa6ad59127d96568b8c8c59c69b4473e3649babfe8267a1514f33c6c49133522b0c487ae2a37aca285
-
Filesize
218.8MB
MD53674436110668cda357096a6b9b81642
SHA1acf03b80c5ab0b77029a59a79061783eba145b6c
SHA256b58d79f3de36bee5c2b0c9853794f10094cc0f34371edf61d1d3a5a738ae2499
SHA5127972d98cdce3821d8049a040e5be2903f4ff98a81c2f4197ffb43f5be24b531a2e730983b123e5f2faf705b68dcc6337030ed49697df3832674ede2787c68126