Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 19:14
Static task
static1
Behavioral task
behavioral1
Sample
6b4854e6cad19b61eda6eb5e68dcfd80.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6b4854e6cad19b61eda6eb5e68dcfd80.exe
Resource
win10v2004-20230220-en
General
-
Target
6b4854e6cad19b61eda6eb5e68dcfd80.exe
-
Size
1.9MB
-
MD5
6b4854e6cad19b61eda6eb5e68dcfd80
-
SHA1
f9d95d56f4a68a997154b2e9bc7a362cc1a1dc36
-
SHA256
dcd60ec48ce671c27c2dd6abac75f015e64d5eeb1fdefe9a85bb706e99f2071c
-
SHA512
bd48825e56e677026c6a6f5d6b74b4bd3f42eeacce2e4b9ec47a6e961ecc4ac692aa3e1b640f6f6ab41c4e0b0403bf8e4f098af12ea3f8366650b7e9576263f9
-
SSDEEP
49152:ockHSWlipdOYnk04IoVMWPxpCP9I8VYiFFTMQheFE06PXqQ:RkHSWlaOYk9IoVhPxpCP9I8JFFZh3a
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 232 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 6b4854e6cad19b61eda6eb5e68dcfd80.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5024 wrote to memory of 232 5024 6b4854e6cad19b61eda6eb5e68dcfd80.exe 87 PID 5024 wrote to memory of 232 5024 6b4854e6cad19b61eda6eb5e68dcfd80.exe 87 PID 5024 wrote to memory of 232 5024 6b4854e6cad19b61eda6eb5e68dcfd80.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b4854e6cad19b61eda6eb5e68dcfd80.exe"C:\Users\Admin\AppData\Local\Temp\6b4854e6cad19b61eda6eb5e68dcfd80.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:232
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
764.9MB
MD5d11362d07fe5d5498e147d45fc321098
SHA13944054bc2494a5c23c6bac6945bea152187e5c0
SHA2560e7ac3154d7a71b20054623299ca93f5f51d5e84fa28e0eb2e824af90813c9ae
SHA5122f8fe3be71b7a75f83cf8c2e298c0fd502e7140823cc1c6c046a621529d20e96a490dd913b1ff282d93b421f882bdb6075bb4e0fbf82a4f00f73ab989f47b351
-
Filesize
764.9MB
MD5d11362d07fe5d5498e147d45fc321098
SHA13944054bc2494a5c23c6bac6945bea152187e5c0
SHA2560e7ac3154d7a71b20054623299ca93f5f51d5e84fa28e0eb2e824af90813c9ae
SHA5122f8fe3be71b7a75f83cf8c2e298c0fd502e7140823cc1c6c046a621529d20e96a490dd913b1ff282d93b421f882bdb6075bb4e0fbf82a4f00f73ab989f47b351