Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 01:08
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
1.9MB
-
MD5
5419d85dbbb8c57fb337f1490b3d6c21
-
SHA1
780a46377db73dc921d3a7795412b4405ea290bf
-
SHA256
8ee9f9bf18880afccd96ece9f1d4c384825b0de092b0ef6bd78d6d0276f67051
-
SHA512
e1d84bb5105f62fe53c2be15d6c5f1c64accb17960aa1aa9cf2be7fef5a2de695bd0d11bc1c4d5f6ede8923f59847a6f5c052091ecf93a3ff3d10747b38d33ab
-
SSDEEP
49152:d/P9nuxcamIidEoNDD1eHi8xvrRoHvVHQx2HylA5:dn9nMcaZidz/1eHBxvrqvefA5
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4548 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" setup.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 16 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3428 wrote to memory of 4548 3428 setup.exe 84 PID 3428 wrote to memory of 4548 3428 setup.exe 84 PID 3428 wrote to memory of 4548 3428 setup.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:4548
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
790.9MB
MD5728a531ddcef4c134d6bd2f36724f8d5
SHA1f05a13568aafacd74137e172528acc5bee4105c9
SHA256c6bbb8d6de5750dc128965ea6d7a25b0aa456cc3b2aac7529f7b30dd61a5339a
SHA5123ce1cbea95fcb7869b56e5a6509538379c027906f62c7e5bbd084b96cfaf418b24cff56a72d93aad961908d8b4c1ba3ad9d484326985d072195a92c196dd7312
-
Filesize
790.9MB
MD5728a531ddcef4c134d6bd2f36724f8d5
SHA1f05a13568aafacd74137e172528acc5bee4105c9
SHA256c6bbb8d6de5750dc128965ea6d7a25b0aa456cc3b2aac7529f7b30dd61a5339a
SHA5123ce1cbea95fcb7869b56e5a6509538379c027906f62c7e5bbd084b96cfaf418b24cff56a72d93aad961908d8b4c1ba3ad9d484326985d072195a92c196dd7312