Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 01:07
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
1.9MB
-
MD5
2cab02f2e9bdffa47eabd1fe499cb659
-
SHA1
dda9070cebb6e9f4cd452ab681815497d590a719
-
SHA256
1e85dc00b32d476b0f48f95c74b4d414a91144f5b181815d55908067ac0f25c0
-
SHA512
2b56cae6faa229365a7b1297ab5078fef485b6084ba5ac699cde93af700f831d92c58f5dcffd08b7ec7187b2b173036b4ddeb197b16f8c429f6e0136cc1b8079
-
SSDEEP
49152:Z4W99T3jU5/iEhr9pk59e0GPkZs9M47Ke2t/vGlcC6H7WCag6lX:Zj/T3IFiA85GNKp5GlGH7W66lX
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2656 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" setup.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 25 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4868 wrote to memory of 2656 4868 setup.exe 90 PID 4868 wrote to memory of 2656 4868 setup.exe 90 PID 4868 wrote to memory of 2656 4868 setup.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:2656
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
848.9MB
MD559696d2a4044d1645d03a8867fc3fc10
SHA11953c0ebd6ae77bd0a897d7fdde81d30df6d4b19
SHA256b6f2f4a090d2fab1237ef67373dfcbe8202d68b598dfc7f3a81526d537412d81
SHA512eb16b72890c73ee48243d5c3c22a86f329a88d49b46f464c5a81f23d950012d78470de3a74a2db2e0366d18cc3bf0e17381dd1a8c0f6f91bd9c57204d47a0cb2
-
Filesize
848.9MB
MD559696d2a4044d1645d03a8867fc3fc10
SHA11953c0ebd6ae77bd0a897d7fdde81d30df6d4b19
SHA256b6f2f4a090d2fab1237ef67373dfcbe8202d68b598dfc7f3a81526d537412d81
SHA512eb16b72890c73ee48243d5c3c22a86f329a88d49b46f464c5a81f23d950012d78470de3a74a2db2e0366d18cc3bf0e17381dd1a8c0f6f91bd9c57204d47a0cb2