Analysis
-
max time kernel
138s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23-03-2023 01:53
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
1.9MB
-
MD5
d6303b5e2715697555ca0a3fc515cf9a
-
SHA1
6f3237546882a9363184b5450cd9806e65be1834
-
SHA256
5c7cb9a9b08fcef3597ee3c317d52e202895aaa9387727e7c68941740c8938b1
-
SHA512
675dda1890f44de32b63946f2a9cad5a65b2cc50fe55152756f2abc3238c495faea1dec89e5bbcf181fb1cc6e3c709c1e8bfc5deae3cec8b835f3696252c9e76
-
SSDEEP
49152:wyLf8FgO/T2/mQgLqaUO5EDkbw1etC8wZkg:jD8Fg//m3Lqa3AktKkg
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1540 ntlhost.exe -
Loads dropped DLL 5 IoCs
pid Process 1604 setup.exe 1604 setup.exe 1540 ntlhost.exe 1540 ntlhost.exe 1540 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1604 wrote to memory of 1540 1604 setup.exe 28 PID 1604 wrote to memory of 1540 1604 setup.exe 28 PID 1604 wrote to memory of 1540 1604 setup.exe 28 PID 1604 wrote to memory of 1540 1604 setup.exe 28 PID 1604 wrote to memory of 1540 1604 setup.exe 28 PID 1604 wrote to memory of 1540 1604 setup.exe 28 PID 1604 wrote to memory of 1540 1604 setup.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1540
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268.8MB
MD51c7032aefb356aec024a09aeedfae336
SHA1091d6da027fdbdd4b9a0acd80c22ea18754d12ce
SHA2560d85e748dc7848e825b409b98655c332f147db4f0984530f70c8faad437609a3
SHA5128744e2d11969fdad31bcd00a6777f844dfb0d1515ab6e238b2e3862d73974186ff90853f19348bae3a517962a76af332e9cdeaba3323fffab8ea984336277531
-
Filesize
265.9MB
MD52cb88c764fb56a0bed5590e49c0169e0
SHA1a35929d0c150b6de73499f865af8237ce8904787
SHA256b823c9fa2487c80f2e13a26f9366a560cf8aafeaf5237aacd55794712c8cf794
SHA512c96d44dd38babff7c023822f28a059d8d4f57b78fe99ea88fd23f331c8bbe19484b485d6e84b9a44d5c5fa8384bd9c500beba66414e1037922fc366f76159c90
-
Filesize
332.2MB
MD5af09fc80c9652165921a5cec4b360eb2
SHA12787f315efe91259189f845283cd9f31ed190b57
SHA2560c771a0ed19a343b8fa3a269789a1a703a8bcda059bd5f0c217afae2b28a646e
SHA512bc4a662ed88f0489c2bb839fcf477b88828c53d9f006c3b2d73290fbe63669dc8fe766d2647e1841f2182b2803c3bf2db3b3b89a7ad2b4c7313ce0881aecfab6
-
Filesize
180.1MB
MD5484c58b5a65258787a9f01f94af520f7
SHA11fc7a235508c9c2417d11c289f4832de74fdc317
SHA2564dfb04ab14643d869fea8da6f111aaca419322e013c0df615eaec54169f4f30a
SHA5123646e19f5a328015670890191a6ace8eaf18fb17d624b025248f33f75a7132b6bd396e47debd1b8c9831dec3619b10b2a92296766844054e72a5f2cc5001c1ab
-
Filesize
311.1MB
MD50597bede71746fb588a09ee1bd94421d
SHA1f18723ae847f2134428566eaf27a4a209e0c7f9b
SHA25688b4213cfa22bd30820ed127b706c54367d8f1d0c152e7327ddfaa7d56d18bbe
SHA512fb77a32d6753d3ded03b292029d85a58c29b9a9fe8f1f7c509ec05b73315d6c5f3fd8a021457c222021188faf67fdff2a5f70ae21806493027c83f2567b4a79f
-
Filesize
305.3MB
MD59b0380f9d9d5698ef4a1d302245f73f2
SHA1e6aa20c0e18f64773bdc4dbce4d7cf91fe353b4d
SHA256a2118d98cbf6fe89f6334bcfb1186f07887186d8e0b7bec931f1e3f0fe090cc8
SHA5123155f5597dbab97f05a64aca5228b65e457875d1d615bea28df9b8cee665fb9c857c615faaf7d73e55f138a2dde5789d22c8d19ca846caaffdc206ed1f676536
-
Filesize
307.1MB
MD5e97ed76dea6f89c3ddd930092badf01f
SHA18cde00525360183640163c63562fe3934d4337e0
SHA256e4e4a7090c244e9812637128a9455fffe2e6458b7fe92d2b5dbb107517c04195
SHA512c3bdbb63b58b304c061c4f66c543b120294e51b69e9f765c23ba067c261e0b69b8f06981371da9b540484102718b02b3e4a7d8aac99fe676c40a46fc59fdaee3
-
Filesize
320.9MB
MD57ed128d57be358857f2ba009417e4667
SHA1bb9d1686175fb1150416e1a4b7eb33d0c0a6af74
SHA256276f28e4257bbb9789b18b5dc5403ad2d7537a393d165132072b1ab2d89abb69
SHA512136bf48c18238a89f77614e7aa550a7a987c3092b5f84ee370728dbef6a78caca32f8eb720cc39e356c077743948f0f35ba1611cc6c6af05263dce8d5a73e8d9