Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2023 02:13
Static task
static1
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
svchost.exe
Resource
win10v2004-20230220-en
General
-
Target
svchost.exe
-
Size
1.8MB
-
MD5
0a935300ad790ad8d03666b1f14e73a4
-
SHA1
57bf66e15b0cbf325ce66d4c9d5592088a1a8e00
-
SHA256
9b96d15a412a80fb77e790070084ce815945398f9c9b103ece0ed420850ace12
-
SHA512
64e7c5e9b0c301a2b4a87dc0189fa55bc7c8690d9148382fd237851348a977376a9772c232f6a898417e92e739add1410d3f143f93547eb99c57fa064ce78096
-
SSDEEP
49152:HRS3ddTQVvnRdoXwG1a/MrkK9daCBCimRL6E84TB:xSk4XwG1lr0PR8iB
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3880 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" svchost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 19 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1616 wrote to memory of 3880 1616 svchost.exe 82 PID 1616 wrote to memory of 3880 1616 svchost.exe 82 PID 1616 wrote to memory of 3880 1616 svchost.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:3880
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784.8MB
MD5db88024fd3956ee46f8f9d3e40f23155
SHA17ce8e2194f3a14f75fd270363a476cfe83d8ea52
SHA256d1c6ac6e8e14c0170ac54812d4aed6905e8d7044b9278b637c50ae2d24d0745e
SHA512100da2ae196aac5e147921e1208c179cf1bcdf51f4293bdd29a67b011e401af283fedeb1c46376c9f351955a72a5e0b5347fb49c10383504e3d32ed31c62c4cd
-
Filesize
784.8MB
MD5db88024fd3956ee46f8f9d3e40f23155
SHA17ce8e2194f3a14f75fd270363a476cfe83d8ea52
SHA256d1c6ac6e8e14c0170ac54812d4aed6905e8d7044b9278b637c50ae2d24d0745e
SHA512100da2ae196aac5e147921e1208c179cf1bcdf51f4293bdd29a67b011e401af283fedeb1c46376c9f351955a72a5e0b5347fb49c10383504e3d32ed31c62c4cd