Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 01:13
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230221-en
General
-
Target
setup.exe
-
Size
1.9MB
-
MD5
e478dd003ab0c8cf0bbe61ffb0b77c3c
-
SHA1
9e1d30e2ed508b4473061fd46994332246af458e
-
SHA256
178666b82d3f9f6d4785ea5934870cd87d8e19c42b07379556a54e3007625fc3
-
SHA512
de4d7fd760acc976f79dd92ebe7a148b2f9787ab611e249815a8af511fa174730b04d143d26f6db384ab929746e441217268cde9b5a14128d4549340f5426d18
-
SSDEEP
24576:ZHt2b1Jo7ja0mbxvAruakDKnWXb4qx6zNFdN1UDgAiUjl5TMOPdR8feOTkjgRi/5:bwX9l1fDeWrskDgJUzdR8wjT/Sxju
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1436 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" setup.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 49 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1436 1740 setup.exe 91 PID 1740 wrote to memory of 1436 1740 setup.exe 91 PID 1740 wrote to memory of 1436 1740 setup.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1436
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824.9MB
MD538b4d253158acdbb49efa60755095bf4
SHA1ca35f12a210a681b41ddecf1e26685ba8b21ff4f
SHA25632998a25b07bcf6fe08bbd19fd4d2b5d33b7bcdd50bcd7d6da41a309a3eeed22
SHA51256cb4c59badb076e8e83b2b7b83afcad215bcd4ea96b4f5af126404651d3ea42f14701c540a98c1fe7552742f515bade65f837a5dbf86357e196760fd31783ce
-
Filesize
824.9MB
MD538b4d253158acdbb49efa60755095bf4
SHA1ca35f12a210a681b41ddecf1e26685ba8b21ff4f
SHA25632998a25b07bcf6fe08bbd19fd4d2b5d33b7bcdd50bcd7d6da41a309a3eeed22
SHA51256cb4c59badb076e8e83b2b7b83afcad215bcd4ea96b4f5af126404651d3ea42f14701c540a98c1fe7552742f515bade65f837a5dbf86357e196760fd31783ce