Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 10:16
Static task
static1
Behavioral task
behavioral1
Sample
3011d8256ead8820223359556ec2c85b.exe
Resource
win7-20230220-en
General
-
Target
3011d8256ead8820223359556ec2c85b.exe
-
Size
360KB
-
MD5
3011d8256ead8820223359556ec2c85b
-
SHA1
403343881d8440f0cae73e82bc41b32c8b9d4816
-
SHA256
1978eba30a4ec1374d09affead3a90d4175c97e58f34497d798aaa56e685df20
-
SHA512
49259be1b24ddb1607a78f4760bc937dff58917984a473101f0c5b27e363e90dad72455314e8725832238785dd3b84454637b5018ce0c434a7c6b90f58a5ab3d
-
SSDEEP
3072:040TlxQfw/y/7juaehfHY1Agbv6oL4OHkfk235cDk5v0WKSNyg/fbakoggwn0JV:O8myVs/Al4OHU3ODkJU6f2E
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 3011d8256ead8820223359556ec2c85b.exe -
Executes dropped EXE 2 IoCs
pid Process 3176 AEGHIJEHJD.exe 4860 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 3488 3011d8256ead8820223359556ec2c85b.exe 3488 3011d8256ead8820223359556ec2c85b.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" AEGHIJEHJD.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 5012 3488 WerFault.exe 85 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3011d8256ead8820223359556ec2c85b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3011d8256ead8820223359556ec2c85b.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4984 timeout.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 48 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3488 3011d8256ead8820223359556ec2c85b.exe 3488 3011d8256ead8820223359556ec2c85b.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3488 wrote to memory of 1020 3488 3011d8256ead8820223359556ec2c85b.exe 91 PID 3488 wrote to memory of 1020 3488 3011d8256ead8820223359556ec2c85b.exe 91 PID 3488 wrote to memory of 1020 3488 3011d8256ead8820223359556ec2c85b.exe 91 PID 3488 wrote to memory of 3800 3488 3011d8256ead8820223359556ec2c85b.exe 93 PID 3488 wrote to memory of 3800 3488 3011d8256ead8820223359556ec2c85b.exe 93 PID 3488 wrote to memory of 3800 3488 3011d8256ead8820223359556ec2c85b.exe 93 PID 3800 wrote to memory of 4984 3800 cmd.exe 97 PID 3800 wrote to memory of 4984 3800 cmd.exe 97 PID 3800 wrote to memory of 4984 3800 cmd.exe 97 PID 1020 wrote to memory of 3176 1020 cmd.exe 96 PID 1020 wrote to memory of 3176 1020 cmd.exe 96 PID 1020 wrote to memory of 3176 1020 cmd.exe 96 PID 3176 wrote to memory of 4860 3176 AEGHIJEHJD.exe 102 PID 3176 wrote to memory of 4860 3176 AEGHIJEHJD.exe 102 PID 3176 wrote to memory of 4860 3176 AEGHIJEHJD.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\3011d8256ead8820223359556ec2c85b.exe"C:\Users\Admin\AppData\Local\Temp\3011d8256ead8820223359556ec2c85b.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\AEGHIJEHJD.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\AEGHIJEHJD.exe"C:\Users\Admin\AppData\Local\Temp\AEGHIJEHJD.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Executes dropped EXE
PID:4860
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\3011d8256ead8820223359556ec2c85b.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:4984
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 21922⤵
- Program crash
PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3488 -ip 34881⤵PID:4820
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.9MB
MD56b4854e6cad19b61eda6eb5e68dcfd80
SHA1f9d95d56f4a68a997154b2e9bc7a362cc1a1dc36
SHA256dcd60ec48ce671c27c2dd6abac75f015e64d5eeb1fdefe9a85bb706e99f2071c
SHA512bd48825e56e677026c6a6f5d6b74b4bd3f42eeacce2e4b9ec47a6e961ecc4ac692aa3e1b640f6f6ab41c4e0b0403bf8e4f098af12ea3f8366650b7e9576263f9
-
Filesize
1.9MB
MD56b4854e6cad19b61eda6eb5e68dcfd80
SHA1f9d95d56f4a68a997154b2e9bc7a362cc1a1dc36
SHA256dcd60ec48ce671c27c2dd6abac75f015e64d5eeb1fdefe9a85bb706e99f2071c
SHA512bd48825e56e677026c6a6f5d6b74b4bd3f42eeacce2e4b9ec47a6e961ecc4ac692aa3e1b640f6f6ab41c4e0b0403bf8e4f098af12ea3f8366650b7e9576263f9
-
Filesize
743.9MB
MD545da7194bb459321e75cf45a056d72f1
SHA1cca704b5d7475df58442e97f396781dfc471c1e8
SHA256f3593bf0401199636ae91cd25413a095011bb646f2181089600b9bcf8b6d026a
SHA512f6f9d3e3115baa6c7fc8f37f48f2e7c3d8153cdeb2f56fefc492e071637514ff180b899b65094434f03f0ab26ed456a91b2ce5c1f2136e01701c6755d53fc328
-
Filesize
743.9MB
MD545da7194bb459321e75cf45a056d72f1
SHA1cca704b5d7475df58442e97f396781dfc471c1e8
SHA256f3593bf0401199636ae91cd25413a095011bb646f2181089600b9bcf8b6d026a
SHA512f6f9d3e3115baa6c7fc8f37f48f2e7c3d8153cdeb2f56fefc492e071637514ff180b899b65094434f03f0ab26ed456a91b2ce5c1f2136e01701c6755d53fc328
-
Filesize
743.9MB
MD545da7194bb459321e75cf45a056d72f1
SHA1cca704b5d7475df58442e97f396781dfc471c1e8
SHA256f3593bf0401199636ae91cd25413a095011bb646f2181089600b9bcf8b6d026a
SHA512f6f9d3e3115baa6c7fc8f37f48f2e7c3d8153cdeb2f56fefc492e071637514ff180b899b65094434f03f0ab26ed456a91b2ce5c1f2136e01701c6755d53fc328