Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 01:06
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
1.9MB
-
MD5
66cb9bf8324c1de0e44b0f376b60ab1c
-
SHA1
59709e524dd2a2d589a9f548530bb5a682368a01
-
SHA256
4cacc59732f82d1c1f2d3b1c327981b23438f7f47aa326e4298bee763226e85e
-
SHA512
a511be876646d3956d1facad8b5371c26533aaa4e101db3cc974dcdbb2159562bd70d0fdceba12cea08ad00cd14b45d7367d98ba7e8087d19018145dfdb141a6
-
SSDEEP
24576:GyekufYPXnljXYjIAu/pbifU4EvOAzfVz0dTMA8Ej06EvdxMnJlZXzk0PHDawz6f:G5gPl0CxObEWuIdITEj0XMnTZhLF6
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1680 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" setup.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 33 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1052 wrote to memory of 1680 1052 setup.exe 88 PID 1052 wrote to memory of 1680 1052 setup.exe 88 PID 1052 wrote to memory of 1680 1052 setup.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1680
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
796.9MB
MD5a63b4a53835e5e9f0be8c467835d05d2
SHA1acbfc36cc6410e2647f5aa0595c1c4f0da03e80d
SHA2560f0caf18f549440b2cf53a028142c1ea0c7f436abe72e019ba2d13fac335dd88
SHA512c40411d094a029f8a898957bcde45834bc1ed3832177837b39d1953be319194d791abc26640adde787b7741899cab10024e3af9c797c2d2dbe42c11ff17b32dc
-
Filesize
796.9MB
MD5a63b4a53835e5e9f0be8c467835d05d2
SHA1acbfc36cc6410e2647f5aa0595c1c4f0da03e80d
SHA2560f0caf18f549440b2cf53a028142c1ea0c7f436abe72e019ba2d13fac335dd88
SHA512c40411d094a029f8a898957bcde45834bc1ed3832177837b39d1953be319194d791abc26640adde787b7741899cab10024e3af9c797c2d2dbe42c11ff17b32dc