Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 01:12
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
1.9MB
-
MD5
eaa8dbc48c3f6d5a935141690bed014c
-
SHA1
5778105a7e42446503dbfc69cbbd20bfd148f444
-
SHA256
1863e62e713302b15c27801878cc1a085e6e0382bd4cc719e2ecb254d0a43051
-
SHA512
267e2592dc91cd63ee64824cfc63fe1a42629eac6b35ea7fc5be2169cb8a3d7c6e74b41831f96bfbd87b54ac4d97484e74fddefb2465271ba3f442043f11a111
-
SSDEEP
24576:dVPcOBkwVC63STHaiNdh8fB8dmwJVoYIlpQI0gneH3Lwk0zcdfKkQE/VQmwzQcGK:dv9LkxdKf25gneH3LwXYKkkXQeoP1w
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1304 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" setup.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 33 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 684 wrote to memory of 1304 684 setup.exe 86 PID 684 wrote to memory of 1304 684 setup.exe 86 PID 684 wrote to memory of 1304 684 setup.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1304
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
810.9MB
MD574271f2029c456b8df368566983a8fcc
SHA104f52bd88b4337fc411515bc7077024d6f75b430
SHA2569415598c4d27bcd99a9095ede25eb2d4a60526ef8c2d3ca3c6f2f40247378af3
SHA51241ebee3008967b3356ea8641212bed4029ed029812eefa59c592fc939bdc641eedb252d42098b05bbb30e69fc25481fd8336b6062a30f8cc5b83380b307237a0
-
Filesize
810.9MB
MD574271f2029c456b8df368566983a8fcc
SHA104f52bd88b4337fc411515bc7077024d6f75b430
SHA2569415598c4d27bcd99a9095ede25eb2d4a60526ef8c2d3ca3c6f2f40247378af3
SHA51241ebee3008967b3356ea8641212bed4029ed029812eefa59c592fc939bdc641eedb252d42098b05bbb30e69fc25481fd8336b6062a30f8cc5b83380b307237a0