Analysis
-
max time kernel
136s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22-03-2023 01:15
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
1.8MB
-
MD5
f465d008c8ac27c3946376b5a5a9f5f9
-
SHA1
614b5376bfb761e2177af0b5c097081d31689883
-
SHA256
483fde1fba538fd23eff241ac85960f2710850c8bcb7bde0024e298d065fc01d
-
SHA512
beaca0330c79e27a2eae1770cf448e4e021d0aab6f918bc97e848d1ced85cd7d2fab00841abc65dc53ebb973a21b2efdaa1d94d6a7a01428ceb0456ebcb1f79e
-
SSDEEP
49152:W7WhJ7cYDtLPUx4Pz6zqhxldCkVjBVn9:WkN7xIq+zqh7wkrVn
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1360 ntlhost.exe -
Loads dropped DLL 5 IoCs
pid Process 1540 setup.exe 1540 setup.exe 1360 ntlhost.exe 1360 ntlhost.exe 1360 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" setup.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1540 wrote to memory of 1360 1540 setup.exe 28 PID 1540 wrote to memory of 1360 1540 setup.exe 28 PID 1540 wrote to memory of 1360 1540 setup.exe 28 PID 1540 wrote to memory of 1360 1540 setup.exe 28 PID 1540 wrote to memory of 1360 1540 setup.exe 28 PID 1540 wrote to memory of 1360 1540 setup.exe 28 PID 1540 wrote to memory of 1360 1540 setup.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1360
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
305.7MB
MD5c08da0317cdcefcb67d8ca4420eb8327
SHA107b8e2fcd14794fe1f99f27073bd51ddd0a80502
SHA25683e8579763feeaa289a71aec5d9e4addbb19c19263b4af9a42e589d62d8075b8
SHA512d45e87c707e229aac140ead2ef9d5e71fe111288fd96c28472c6468966374350a3e76d5cc24eed6ee9fc3a5c625c4e827512206ea59e8c01fedd8791eb4907bf
-
Filesize
295.7MB
MD52edab75395edc059692c8e113a637463
SHA17e9e4b57e5133038a08d85a0b19f736e5f61b2ad
SHA2565b34fe89dae91caf0951c7c76218e5e1969db4c68c56eabde67fa86399ce39c6
SHA5129cddd36b1325bc19fdfcdcfd439ad87e192395c1fa4378c4e52a4c4518d0bd27c2b2f68f4e322b761794ac680635695830fbe2c45ba5d0fa8d59d98f446a2510
-
Filesize
306.4MB
MD51015990a964d24c729f425df692a05ca
SHA1810ce02b98d4d4ce58ef7b41d981920c19e1c2d3
SHA2569907c0bd228a88c9bd71052ab2a11170110ff580ab47e14ac03ab6b54d2c30bf
SHA512c5b19c77c6408153e4dc0a258b76c40baffdac0655ae9cbbacb99f35efa301d1369ae58323e5de344492968dd26244dc14032b8efbef39b0c4cde8c059133934
-
Filesize
160.9MB
MD5a94472ebeb08abbf649c6e34d8083bbf
SHA1f9ea07e69fa98e552ee232e334e13bf8736d295f
SHA256e0b8d12886e974a9e2af78a03fea3e6e47122791094e5c337c2fc1c6830e2e8a
SHA51234e64c64df8c82ba8359e8c8e479b4e9da5c4ca95efd842b528b7109df335611550f12c0a7240463f02115f08d9b03b48dbfb382bd4a79d9adbe8abffeb569e3
-
Filesize
164.6MB
MD514853e09d1b27ac33420959db9d08811
SHA123bef01cda73fee217b2f6033e2439a86018c872
SHA256da0fb046844b5125e70fe667768628dc0fec2416620c07f7198a4bea6235da74
SHA512e39e10f8652d4f6ed518897cdda6179bcb407d710668cb9e120c3d452fa09d36d1fdf353fc7139f855404d07a5cafe6b7ddef4cbe60dda2001e646b16638309a
-
Filesize
301.1MB
MD55b3767d48489d2092cbdd843cc576f98
SHA170a9b889954482e50cab3e64fa00abb50afa8cde
SHA2563371f2ff80bc954fc596d26679708e4862fca0859a53250d587b9975a2972dbc
SHA512205087ae054ebbafd9837316f05785166d952e8c5ec412c4f99b7c7bfa23365f60086fdadde871385948bb861073598ce7f811d3432317b2e2b3b84c09661d50
-
Filesize
304.8MB
MD56a60740587996ac32b298f483157ffe7
SHA115b73603c2b0927bd62606184b3f85a86e5d9dd8
SHA256a3a9ccb88f90ea6027360f693aed29f17fc8234f450aae4cf13a3ecda2201ab5
SHA512ee5b292e6d0f95c49c28c8515a2c8896e6e5adbdaf2e53105c6a005876d7ff70e3e977bae3e54f54ec212909b05aeaf11a356c70b5906058ddede81f8851946e
-
Filesize
301.9MB
MD52e522979c625bfca981f6f781fb0392f
SHA1ee9f6ccbe45628be2640dd0731d6d6e5940332a5
SHA25635560cc8b45b2e45c948f2ee3e1f76c99249cdc3dcc905355125c02a06f7a874
SHA51277ee56305c47ff8a88ca16d7dc08b7e7b308dc2113b94225ac34f8264d942645a97b84ab139cab07990ecbb9c33a23778570d31a2a3002e3d88e8519ef4c06c5