Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21-03-2023 13:16
Static task
static1
Behavioral task
behavioral1
Sample
4b8c8646cd4c8e21217281a7c2155d9821126f1f7594e43b29c402a4a33b6d80.exe
Resource
win10-20230220-en
General
-
Target
4b8c8646cd4c8e21217281a7c2155d9821126f1f7594e43b29c402a4a33b6d80.exe
-
Size
1.9MB
-
MD5
78804a23aeb68beb488a3cc4b2181935
-
SHA1
ce08cacdbb4ce93c487d452f967a6aff73ba614e
-
SHA256
4b8c8646cd4c8e21217281a7c2155d9821126f1f7594e43b29c402a4a33b6d80
-
SHA512
b70bfbe64e19d37a2be5e082d69e8b68caa6dfc13a337acbd9c8b6a6ea1e790aec1395acbb62a07b44ea56a833a99877d8f9a03b4b5a9031bb0641940e9ac621
-
SSDEEP
49152:kYOWavOzMz0Ls8b71Iz34gc7fQzGBliwRG:kjWakw0j1Iz34PUii6G
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4952 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 4b8c8646cd4c8e21217281a7c2155d9821126f1f7594e43b29c402a4a33b6d80.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 2 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 708 wrote to memory of 4952 708 4b8c8646cd4c8e21217281a7c2155d9821126f1f7594e43b29c402a4a33b6d80.exe 66 PID 708 wrote to memory of 4952 708 4b8c8646cd4c8e21217281a7c2155d9821126f1f7594e43b29c402a4a33b6d80.exe 66 PID 708 wrote to memory of 4952 708 4b8c8646cd4c8e21217281a7c2155d9821126f1f7594e43b29c402a4a33b6d80.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b8c8646cd4c8e21217281a7c2155d9821126f1f7594e43b29c402a4a33b6d80.exe"C:\Users\Admin\AppData\Local\Temp\4b8c8646cd4c8e21217281a7c2155d9821126f1f7594e43b29c402a4a33b6d80.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:4952
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
682.7MB
MD552c531ce94b61c624dd416649a5903b4
SHA1f83a444896fe37f28edc1503e1603eb9835a8496
SHA25687a0991be11e6582354a624f1a55004ee713c1ed82586553ded1d6939ebc1d0b
SHA512d876f8c312e9b8382b1dbb15272006a7f5fbbebc0b7d5295ba171df78adedf4ec195ddebf22159fa548b23ca772162346cb3900e979ebe67aa540329f4a4932b
-
Filesize
684.5MB
MD546831b7fa4a6850f436a26ffb142da4e
SHA194cf2cf7450884700d4042f5b42925458255d95a
SHA2560a2eaacf0231ac26e98dcee3fd3546dcd807bc6f9e03ace04520a172843bef90
SHA51288f34fb5de332c50a7883bf2bedf276c078b2ec07e6cea9dbd9d3b5d3f8c92eff85836ce00c86b594ac431e38f60b34b08e5bbc0a4ea3e6c510c29c69416b2ce