Analysis
-
max time kernel
136s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22-03-2023 01:08
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
1.9MB
-
MD5
5419d85dbbb8c57fb337f1490b3d6c21
-
SHA1
780a46377db73dc921d3a7795412b4405ea290bf
-
SHA256
8ee9f9bf18880afccd96ece9f1d4c384825b0de092b0ef6bd78d6d0276f67051
-
SHA512
e1d84bb5105f62fe53c2be15d6c5f1c64accb17960aa1aa9cf2be7fef5a2de695bd0d11bc1c4d5f6ede8923f59847a6f5c052091ecf93a3ff3d10747b38d33ab
-
SSDEEP
49152:d/P9nuxcamIidEoNDD1eHi8xvrRoHvVHQx2HylA5:dn9nMcaZidz/1eHBxvrqvefA5
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1740 ntlhost.exe -
Loads dropped DLL 5 IoCs
pid Process 1932 setup.exe 1932 setup.exe 1740 ntlhost.exe 1740 ntlhost.exe 1740 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" setup.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1740 1932 setup.exe 28 PID 1932 wrote to memory of 1740 1932 setup.exe 28 PID 1932 wrote to memory of 1740 1932 setup.exe 28 PID 1932 wrote to memory of 1740 1932 setup.exe 28 PID 1932 wrote to memory of 1740 1932 setup.exe 28 PID 1932 wrote to memory of 1740 1932 setup.exe 28 PID 1932 wrote to memory of 1740 1932 setup.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1740
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268.9MB
MD5fa3c40daf9b8d168cd7d70e71f7cd99c
SHA13d80d924e79d8c0240905bbbfecc6b000dd75cfd
SHA256e1ff2110adef08239a8e5ade14171a9d852ccece4fd71b12461f61ca081a6ede
SHA5124dc8120f3029a88a6c6284a28ef02473b9f7abcb6444f175225b1c23e6420355e0bb9f5dca5d5c23093d408012766dc849e5ef910e85bea8be747638aad40b55
-
Filesize
263.5MB
MD514464642ca54eeaa3348a4af3841ed5e
SHA14e823a4e69b9fdb4b6245c6108e16750fc83a49a
SHA256975c825e6ec3bc10005c7428fb0a264abd2a7e4a9c16d1f02a121ef8e696ea4c
SHA5123ff37a476db5984226e07b640508232d1e7282b5c1d547ad3635e68edea903f31d2601dee5f6163cdacb03d223ea13d0298b760badfc8af8c59419d3538a8323
-
Filesize
294.1MB
MD54d26442836e9d63ecbd5ef673891a170
SHA189ec181ec500737eb1c57c6c28b43a86a9b96da7
SHA256e5433cc5a90e2f442d113db2758a665fac773f05dd422af369595f0d1db30159
SHA5128b2511913363fe4806c50efb066bf74e08eec10b3423a31cef936fd015e6a4e4086ef13fc67fe22ca7286121963faca356e2ba0df5fd688f619f7cdc5ce16f6b
-
Filesize
147.7MB
MD5e279f5653e89a8c466e2924343a11721
SHA1f862aac762cf1f7eec5318aeb805cdc29ad1d06c
SHA256581b2a81232945bf755bbb5ca83dcf8dc353bf01193c09aa5baabaf718d0b78e
SHA512c7ec9f7b474532d5db6139026257877d33c5c7d76cee0de473f249869d0ddf052b9a23d03a9c00c4d329cce3c961223c8269bdda3615ef0a638d2611b3a3f6ae
-
Filesize
288.2MB
MD57b6416448fbbdd6872b2a742eedcaeb0
SHA11e59891bbf97455824df5f94ff0a78a352ffe8b5
SHA256ebed80179630694076ff760aab4fcd6076146d0e0c6548d95a157164b4427799
SHA512da6a4ec6e601628bf7a107b0f9da77e1c1af503bbf06d517adf11e8512080e6f56d8c0bf867267e35d6d4c4e3ab8846ac86c22cdabeede29d05fa9ec31eb6044
-
Filesize
290.9MB
MD54428a95c8659d22fcbdc31cef34980e9
SHA1b3d53f5f0165344d693c767f555072d9bc298cf4
SHA256ae0de1cba09872bc6eac3ff5dde2a9e5ad90309ed73df9a18a4691bf7be78b2c
SHA5129d30707d3ec30cf5d2cd48ccebb464ad541845bfbca949eddc9ceff7b66c91d03bc9c2db8793b704ab5c3b01dfff43422ec79a63cf63210852e28e0f1822ee93
-
Filesize
257.9MB
MD52eb8530bd4d78adb26b118b31d14bef9
SHA16c3b9d8220ec0e42d984eac5fa2f80a64c7dd5f0
SHA256b8b110d828663a709be7db9feda309dc98a0d6c5e414dd822aaabcd826b2b973
SHA512ca9695bb293e9a58b4b8819b842377147dd24c4b3811fe7ce23a34a91956d586dfefe2de2f9d5c22dac3c74ffe284b807be835bda31349be60f058a579d10968
-
Filesize
243.4MB
MD57491d8886f62262b4dea9a64e0d17e4a
SHA118472d69bf2afd6bc3093d7f99cc8bee92b09ff7
SHA25616c561ab4ccdf4ac7b6a10d566d44bbf79ef24db52c4dabdd93eb30137b2e6cf
SHA51257f72764ea71caf7289cbcf0f2fec3d2a66f1fbdd4bdc069143e17058330c2342bb612ed67fb34ddada0436c3b98405d58f5e92a4ae66368b499ef9b60345a47