Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2023, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
1.9MB
-
MD5
7e1ee04719bea1b532ed44609632ccd9
-
SHA1
f6ad1ded616f8877cb34f873b3597aa6df50e957
-
SHA256
b46481ba0ba92b4cf9306181a82bff5cd1f1213fd23fb73c01a5b46435c7bebc
-
SHA512
0bbb7c9e68f27d05476a301ec95b0a3ee7ab46ab3e912adcb14bbe44015b07ef1668e076518076abf79c6b366a1d59f057553411383a263ab539786853bc2819
-
SSDEEP
24576:prRWZ35JhqWpgXEC9CsacGA2XqHO4fOD22eAbFKhvb12pG5UojUsw1EyYMoPBETh:prsvJhS7Rj26H/fOyj1qG5UojUslMoJ
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5060 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" setup.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 25 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3704 wrote to memory of 5060 3704 setup.exe 88 PID 3704 wrote to memory of 5060 3704 setup.exe 88 PID 3704 wrote to memory of 5060 3704 setup.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:5060
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
808.9MB
MD5720c1b26403ce07f4b84457585c4332a
SHA19b89fa1da5ad495e2eec9df88fb404e95a2d3342
SHA25667aafdee90d6444f1bf06a15ff3887486fef11529d270113860341ead865b254
SHA5128d509aec901fbd645a315aea534004e2cc89a7c371753c4a6161158c110b7020864b6dc9f171f9c4d9f339b474788fef1c82341095f715abc3d84bf51fbb2bfb
-
Filesize
808.9MB
MD5720c1b26403ce07f4b84457585c4332a
SHA19b89fa1da5ad495e2eec9df88fb404e95a2d3342
SHA25667aafdee90d6444f1bf06a15ff3887486fef11529d270113860341ead865b254
SHA5128d509aec901fbd645a315aea534004e2cc89a7c371753c4a6161158c110b7020864b6dc9f171f9c4d9f339b474788fef1c82341095f715abc3d84bf51fbb2bfb