Analysis
-
max time kernel
139s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-04-2023 02:13
Static task
static1
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
svchost.exe
Resource
win10v2004-20230220-en
General
-
Target
svchost.exe
-
Size
1.8MB
-
MD5
0a935300ad790ad8d03666b1f14e73a4
-
SHA1
57bf66e15b0cbf325ce66d4c9d5592088a1a8e00
-
SHA256
9b96d15a412a80fb77e790070084ce815945398f9c9b103ece0ed420850ace12
-
SHA512
64e7c5e9b0c301a2b4a87dc0189fa55bc7c8690d9148382fd237851348a977376a9772c232f6a898417e92e739add1410d3f143f93547eb99c57fa064ce78096
-
SSDEEP
49152:HRS3ddTQVvnRdoXwG1a/MrkK9daCBCimRL6E84TB:xSk4XwG1lr0PR8iB
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 964 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 928 svchost.exe 928 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" svchost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 2 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 928 wrote to memory of 964 928 svchost.exe 27 PID 928 wrote to memory of 964 928 svchost.exe 27 PID 928 wrote to memory of 964 928 svchost.exe 27 PID 928 wrote to memory of 964 928 svchost.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:964
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
550.7MB
MD56a241465fe59770f819aeaaf2caa0725
SHA19f2efdd2a615bd2bb116f01b5deffe51003298fe
SHA256727d060ce5a0d5c89aed870862c0f57d417a63f1e1a0c75c08f4b409470a6376
SHA5125762ab110c696fbaf679a201281fa11f988c0704eec1fe90a47f384e4c0f0038a34a55076f087046e7f2b71bf8ed1effd85b98bcb400e2a3c2ca3eb1ccc9e417
-
Filesize
463.6MB
MD59d32abb3bf07af649e9e6e5bb73083c9
SHA14065618cba444fc7e35179baef0f18e9176e972e
SHA256cee033e1f4da2be3c3f7c75934e2d87e030c21f629aa2e37ed4e1a037d16cf0f
SHA5123a935408befe63e82e1422d409807d8732975d69498e23768879278bd8b34a72f605286da1810f4f63540e47be407c6f50fee516b26242cd69cf22a114d2fd9d
-
Filesize
312.6MB
MD5080816f69f1162a5079611936ceca849
SHA11f15e188ffeb6da60c1814f1ce2f8fa0b24869c4
SHA2564fa17ddf389b00b2112d72b6599c7ef50eefac6949ac0231b56b5da19bd284ad
SHA51239ff7276a088cafe5b18577a78f435ef16227d58aed57657cee01ec861fb2fddf6cb46fcffdb41e448cc426354776c531635195f2c1596711773bc6316246c6c
-
Filesize
525.4MB
MD5328ece31a66d9ff66373731a05e5f621
SHA178a52b19efe119a3c4c423cf51bb579d66451d2b
SHA256afd05a7d89186a94ea478652028d3af99df398dcc3964fe09451472adc15f309
SHA512e1b03f116ce5685a990a092a9710cd12300ea49f0f7c918691a1fd5d04da54049ecfee2b9eb755651639704dac94990d43b4218aac795923805741fae19f4104