Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2023, 01:38
Static task
static1
Behavioral task
behavioral1
Sample
aacf8d390d8155217d2f3eb4a24229d4b0b6e7b69a88db1cdd2416ced097468b.exe
Resource
win10v2004-20230221-en
General
-
Target
aacf8d390d8155217d2f3eb4a24229d4b0b6e7b69a88db1cdd2416ced097468b.exe
-
Size
1.8MB
-
MD5
57af99b291e3c520d7f97f5dfeae538b
-
SHA1
9234ac2a21b99eeb0cab055d43dba526f4347b05
-
SHA256
aacf8d390d8155217d2f3eb4a24229d4b0b6e7b69a88db1cdd2416ced097468b
-
SHA512
3a7913a8ec25850c0ddf7432a6fa41e2e0ae07247e66138d58ceeeb66bc1cc33f051f2f2b2df09f5fc4e8a6efc1e64c746db6df020308a8ac6151d7cc86b6002
-
SSDEEP
49152:KaefEiciYyUKFrlDtvu8y9gkmFwOEA9MCVp+0w:KSiX1UKx9tvnHuOl5jS
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5100 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" aacf8d390d8155217d2f3eb4a24229d4b0b6e7b69a88db1cdd2416ced097468b.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 29 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4764 wrote to memory of 5100 4764 aacf8d390d8155217d2f3eb4a24229d4b0b6e7b69a88db1cdd2416ced097468b.exe 84 PID 4764 wrote to memory of 5100 4764 aacf8d390d8155217d2f3eb4a24229d4b0b6e7b69a88db1cdd2416ced097468b.exe 84 PID 4764 wrote to memory of 5100 4764 aacf8d390d8155217d2f3eb4a24229d4b0b6e7b69a88db1cdd2416ced097468b.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\aacf8d390d8155217d2f3eb4a24229d4b0b6e7b69a88db1cdd2416ced097468b.exe"C:\Users\Admin\AppData\Local\Temp\aacf8d390d8155217d2f3eb4a24229d4b0b6e7b69a88db1cdd2416ced097468b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:5100
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
701.8MB
MD56b31389365b5eef155fafba1c3a6e80a
SHA1da6d6176875af975811fd80891f19181c3b92801
SHA2565406e72a271d733bd1743a0ef7e54fa8aec603da9ad10fd7b3e09dafccdcbb21
SHA512e2d0092ccc917bff993a05f83043b23a7c90ae523ef2a81432137cc1d42511a6f46263c859412b58c1827847c1d05e2b9de2ac5c14e4140940f3786149c1b2f9
-
Filesize
701.8MB
MD56b31389365b5eef155fafba1c3a6e80a
SHA1da6d6176875af975811fd80891f19181c3b92801
SHA2565406e72a271d733bd1743a0ef7e54fa8aec603da9ad10fd7b3e09dafccdcbb21
SHA512e2d0092ccc917bff993a05f83043b23a7c90ae523ef2a81432137cc1d42511a6f46263c859412b58c1827847c1d05e2b9de2ac5c14e4140940f3786149c1b2f9