Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2023 14:38
Static task
static1
Behavioral task
behavioral1
Sample
21bf75dfd6fd3ff24b1e13302414fd0d09e6d0fe2cfa6bcc3a21fdda66792b2b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
21bf75dfd6fd3ff24b1e13302414fd0d09e6d0fe2cfa6bcc3a21fdda66792b2b.exe
Resource
win10v2004-20230220-en
General
-
Target
21bf75dfd6fd3ff24b1e13302414fd0d09e6d0fe2cfa6bcc3a21fdda66792b2b.exe
-
Size
1.9MB
-
MD5
c8fa0087f27ed56934adf9f106755304
-
SHA1
ae27342a17c8bc32a68f6e68436a6ae380f90ed9
-
SHA256
21bf75dfd6fd3ff24b1e13302414fd0d09e6d0fe2cfa6bcc3a21fdda66792b2b
-
SHA512
1401f941d8a0e06ef5754e8c2bc36930ffa121fa99759c4b90d031e191a107903a115ad9b2f67d08c6082d3c0850e94ef7cd9b4659264af85ae691ee0d5d8b0d
-
SSDEEP
49152:zWrbeHdtxdC968KLFVvLw5xs0baRMJ1K4yo:zW+Hdt/861LFVLuGkyo
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4272 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 21bf75dfd6fd3ff24b1e13302414fd0d09e6d0fe2cfa6bcc3a21fdda66792b2b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5032 wrote to memory of 4272 5032 21bf75dfd6fd3ff24b1e13302414fd0d09e6d0fe2cfa6bcc3a21fdda66792b2b.exe 83 PID 5032 wrote to memory of 4272 5032 21bf75dfd6fd3ff24b1e13302414fd0d09e6d0fe2cfa6bcc3a21fdda66792b2b.exe 83 PID 5032 wrote to memory of 4272 5032 21bf75dfd6fd3ff24b1e13302414fd0d09e6d0fe2cfa6bcc3a21fdda66792b2b.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\21bf75dfd6fd3ff24b1e13302414fd0d09e6d0fe2cfa6bcc3a21fdda66792b2b.exe"C:\Users\Admin\AppData\Local\Temp\21bf75dfd6fd3ff24b1e13302414fd0d09e6d0fe2cfa6bcc3a21fdda66792b2b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:4272
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35.2MB
MD5deccfd6a0c8c9654e9e9773683382b65
SHA15f9f1a7345fbc9b70c4e72c49133c24010b330c1
SHA256ed884aa47f393eb712bbf6ad6b2b7283fc4633a4c92aefbaafc21875bf2a715b
SHA5126afe86da5749fb2ec2f12735cd6268955dd40c57a02ca86ad34604c98a1bc1ec05d513b4a77b78321b7520acc3d83c6f24a32a640e7cfe0211a9c97ceca7aba5
-
Filesize
35.4MB
MD592cd18b320394915f6ca0e88c0baebb3
SHA12c131b5ceb6faeefd2c1b5d944d5f0275288125a
SHA256b1baa6359c625fa3f229490ce939d594ea190192aea9f27f5382c05180e1dc46
SHA512c2574b9aa16728088eef46d33295c95535bb0d495e9d38ce3343599dead4b00c4eaa97dc9e7e24d859a67daccc0a9c93ca6590f835ff3d4700521f7a59c14bd3