Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 20:03
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
1.9MB
-
MD5
c744e2d74b828c767877c52e125087af
-
SHA1
444809a0b355b365fadc03e50ac577b1b1fa50eb
-
SHA256
dccb7a134aae7970fc13ab3db3737b62b733ba33627945a1d5cdf61870ff4842
-
SHA512
084e0f42ecb98a1915db1128a704a1650b07e7acffc4852cadc9684dfd643619e1668ab7ef83321483a2eaeadcd83e58379cd4db3e11a4085d74ee42bb095fff
-
SSDEEP
49152:xKcn0Cjj3zONh6qrCf2TXEUPsNq3WVAThDWZaXQZh8:ocdDZqCIbPzWVyhDWZaXQZh
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5116 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4696 wrote to memory of 5116 4696 setup.exe 89 PID 4696 wrote to memory of 5116 4696 setup.exe 89 PID 4696 wrote to memory of 5116 4696 setup.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:5116
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
740.9MB
MD5071eb91db464687d83b7cf73d322b135
SHA13765d8e65b52296313a44dc771cc90dcdeb776d0
SHA256da795ba108400403ed15e061596a03f747ee2e1474723ee5724a76c0955d5a53
SHA512615b7298658788420105bff0b6c11b8a80ab6c34627813ff7d054ff27fa4684e184eb301e8826576e439316d535800f0c3d7c21ef35d9430fa76eef584b023a6
-
Filesize
740.9MB
MD5071eb91db464687d83b7cf73d322b135
SHA13765d8e65b52296313a44dc771cc90dcdeb776d0
SHA256da795ba108400403ed15e061596a03f747ee2e1474723ee5724a76c0955d5a53
SHA512615b7298658788420105bff0b6c11b8a80ab6c34627813ff7d054ff27fa4684e184eb301e8826576e439316d535800f0c3d7c21ef35d9430fa76eef584b023a6