Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 01:54
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
1.9MB
-
MD5
c744e2d74b828c767877c52e125087af
-
SHA1
444809a0b355b365fadc03e50ac577b1b1fa50eb
-
SHA256
dccb7a134aae7970fc13ab3db3737b62b733ba33627945a1d5cdf61870ff4842
-
SHA512
084e0f42ecb98a1915db1128a704a1650b07e7acffc4852cadc9684dfd643619e1668ab7ef83321483a2eaeadcd83e58379cd4db3e11a4085d74ee42bb095fff
-
SSDEEP
49152:xKcn0Cjj3zONh6qrCf2TXEUPsNq3WVAThDWZaXQZh8:ocdDZqCIbPzWVyhDWZaXQZh
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 640 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4268 wrote to memory of 640 4268 setup.exe 90 PID 4268 wrote to memory of 640 4268 setup.exe 90 PID 4268 wrote to memory of 640 4268 setup.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:640
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
754.9MB
MD52352fdf907c638005765a96c6fe0de92
SHA1e58f2f857a4d43869c30298f4175b51ff467ad15
SHA256006c88b266fa669d3ff9ac050ca3f7820ac6b807ed82770473b63a73ab53c702
SHA5126647fa8616950b1a1464365d7d57d529e856406a43c3c8a8a27e14f2b83f825ed496e4a1d74fa908ca71937b9aa3f58b4cb75236c1aef745c54d9dce820d12b2
-
Filesize
754.9MB
MD52352fdf907c638005765a96c6fe0de92
SHA1e58f2f857a4d43869c30298f4175b51ff467ad15
SHA256006c88b266fa669d3ff9ac050ca3f7820ac6b807ed82770473b63a73ab53c702
SHA5126647fa8616950b1a1464365d7d57d529e856406a43c3c8a8a27e14f2b83f825ed496e4a1d74fa908ca71937b9aa3f58b4cb75236c1aef745c54d9dce820d12b2