Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 01:05
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
1.9MB
-
MD5
181cf5e5f39bbe387b3b985b826b16f1
-
SHA1
4de92a14f49359ed21c3ee0be536f3126eda37db
-
SHA256
2f76513c2b7c8f967a70526fdcf1e5c7976a4a77496e81be277c71fbbfcc3f54
-
SHA512
56acae12a3af47a0ac9cf7261e5e51e4f34fb37fed8026f3694ab013eed3c5a5898733ab0d8dc99294af8b1cd80348f75efc262697b7ccea4c69188a9eb7b6b8
-
SSDEEP
49152:TkLM27jaMzaTnmg4Gd+cauh5ZvumK3GVtoxRTGs:TGM2GMuCg4h05ZvpILRL
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5044 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" setup.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 26 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2392 wrote to memory of 5044 2392 setup.exe 85 PID 2392 wrote to memory of 5044 2392 setup.exe 85 PID 2392 wrote to memory of 5044 2392 setup.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:5044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
760.9MB
MD53f050d9990b1dc17458e9675f13352f0
SHA12f6d2fc5fa3525cca536012f64bf1d4262cb4ff0
SHA2565223da38296934f17cc1b6465020579edd46b045daa599a6ed6a7c8a8580d9c7
SHA512a4046511fa29d08041c14a24e69cd903e0c1d9fad8f988805044f3398c8a2f5548e3f3740271dfb9d5215a7da33e59a3e2c1bc68694443743db2d8a811c102fa
-
Filesize
760.9MB
MD53f050d9990b1dc17458e9675f13352f0
SHA12f6d2fc5fa3525cca536012f64bf1d4262cb4ff0
SHA2565223da38296934f17cc1b6465020579edd46b045daa599a6ed6a7c8a8580d9c7
SHA512a4046511fa29d08041c14a24e69cd903e0c1d9fad8f988805044f3398c8a2f5548e3f3740271dfb9d5215a7da33e59a3e2c1bc68694443743db2d8a811c102fa