Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 01:15
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
1.8MB
-
MD5
f465d008c8ac27c3946376b5a5a9f5f9
-
SHA1
614b5376bfb761e2177af0b5c097081d31689883
-
SHA256
483fde1fba538fd23eff241ac85960f2710850c8bcb7bde0024e298d065fc01d
-
SHA512
beaca0330c79e27a2eae1770cf448e4e021d0aab6f918bc97e848d1ced85cd7d2fab00841abc65dc53ebb973a21b2efdaa1d94d6a7a01428ceb0456ebcb1f79e
-
SSDEEP
49152:W7WhJ7cYDtLPUx4Pz6zqhxldCkVjBVn9:WkN7xIq+zqh7wkrVn
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2336 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" setup.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1276 2276 WerFault.exe 85 -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 17 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2336 2276 setup.exe 88 PID 2276 wrote to memory of 2336 2276 setup.exe 88 PID 2276 wrote to memory of 2336 2276 setup.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:2336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2276 -s 7922⤵
- Program crash
PID:1276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2276 -ip 22761⤵PID:4828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
840.8MB
MD575c22f17e6dee844a1b7241524d0fedd
SHA190c3bb267012f72bf82ab1e7be2ac266651b33f5
SHA256f93282f8bedb41d86355f53017ca65b8171617cd70c5d9793c6356411421fdce
SHA51215de93a2050508d4ab0fabc4950d1dc1a57d4bc8843148005c2d6c0692ef04c596162f49f2a1833df998f77de1747ebca4fa730b11c9a023a8d4985138df1237
-
Filesize
840.8MB
MD575c22f17e6dee844a1b7241524d0fedd
SHA190c3bb267012f72bf82ab1e7be2ac266651b33f5
SHA256f93282f8bedb41d86355f53017ca65b8171617cd70c5d9793c6356411421fdce
SHA51215de93a2050508d4ab0fabc4950d1dc1a57d4bc8843148005c2d6c0692ef04c596162f49f2a1833df998f77de1747ebca4fa730b11c9a023a8d4985138df1237