Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24-03-2023 01:25
Static task
static1
Behavioral task
behavioral1
Sample
5502d7c1c81714b998f594e523274a828d919f69dc08bffde5fe118918a8f43b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5502d7c1c81714b998f594e523274a828d919f69dc08bffde5fe118918a8f43b.exe
Resource
win10v2004-20230220-en
General
-
Target
5502d7c1c81714b998f594e523274a828d919f69dc08bffde5fe118918a8f43b.exe
-
Size
1.8MB
-
MD5
406a0e14b6569ebc5f1086801e043fe1
-
SHA1
b15c199f31dcddcd37f10f143b62f2ff998324c6
-
SHA256
5502d7c1c81714b998f594e523274a828d919f69dc08bffde5fe118918a8f43b
-
SHA512
f367e8c6a84192925cad8d7de697435220835de2068bf66fa6e29f59680ea4f74dc42b92a6ba16e27bd71194a4104c0a3e06ecd5a2e484473e8ec9669b1ae65a
-
SSDEEP
49152:VJGty7g6F2SKtEjjbgitUonmkXhDbl0nXj5:VJzpF2SKtEjfBUChTm5
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1616 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1568 5502d7c1c81714b998f594e523274a828d919f69dc08bffde5fe118918a8f43b.exe 1568 5502d7c1c81714b998f594e523274a828d919f69dc08bffde5fe118918a8f43b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 5502d7c1c81714b998f594e523274a828d919f69dc08bffde5fe118918a8f43b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1568 wrote to memory of 1616 1568 5502d7c1c81714b998f594e523274a828d919f69dc08bffde5fe118918a8f43b.exe 28 PID 1568 wrote to memory of 1616 1568 5502d7c1c81714b998f594e523274a828d919f69dc08bffde5fe118918a8f43b.exe 28 PID 1568 wrote to memory of 1616 1568 5502d7c1c81714b998f594e523274a828d919f69dc08bffde5fe118918a8f43b.exe 28 PID 1568 wrote to memory of 1616 1568 5502d7c1c81714b998f594e523274a828d919f69dc08bffde5fe118918a8f43b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5502d7c1c81714b998f594e523274a828d919f69dc08bffde5fe118918a8f43b.exe"C:\Users\Admin\AppData\Local\Temp\5502d7c1c81714b998f594e523274a828d919f69dc08bffde5fe118918a8f43b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1616
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
581.4MB
MD51809d3e2e974418ddf667708a5c41260
SHA196f4aeec5ee40efca31aa087036d7e9314ec6b28
SHA256f4ef03221a496b301d0de34e61784cae1bd11f8b1e79389131cfb9feea7e5212
SHA512308b6e33ff3b449d935a5cd2963c5af052dc96670d344ea85f1cf759a3b036a9ef6d3a7535ce60539a4b3fa1adc954b36867a8f6b09fab999b1ed1ad402a76d5
-
Filesize
649.7MB
MD566ec1ebe866e0ae63857c39379017e66
SHA178bd38ffd9374861f24dea35cc10dbe85c500262
SHA2561b64d8f05c0b026d596fbb891cc8913f84ffd72113dcb6cc5d8fcc66a5cd4053
SHA512a7414aba1ae2520617fad589b63b5b6f759045270019e430b814fc61b8675204f93a95d2cfd7d2ac2f90a27dc704e3e6bd2bc3a5a8864cc9a3be6895528035b7
-
Filesize
393.2MB
MD5b51368645fe48fa6bc4ded9550a57f58
SHA1074abc997e6015c34d447894b71cda3b8f053870
SHA25641a9cbca48ee110fec94e86a8e799742c174629a18a425dbba8cbdba057b7996
SHA512ba7d46e5f622f13dbfc32080bff7c2101fe332824c2861e9b23b9f3e5ea7ae40848c53a950698c2ff0d0cd081a145acc296205175906a2e327519a14ee5e99e2
-
Filesize
586.8MB
MD52ac9e91e60bddc8325c34377951957f9
SHA1a2369a1cec2826de0a75875b28e856372e788540
SHA256db797cef0bf5c5b6d27c2928fe872a1bb6852b3a754bddec068b372a1319f90b
SHA51200f4513ffe4a4bdafc1649d374d2ba38cde7ae2018d3dc4d0be9d13b9c1bf39a159eec2795ebd6f025216e5de88af9150cc9ab4d9d960ebb2c39d46877adbbb5