Analysis
-
max time kernel
146s -
max time network
133s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
11-04-2023 10:10
Static task
static1
Behavioral task
behavioral1
Sample
3a4712fe53943012eabe3d9b70436588be5f7d3b5d2c6abeaf3070e26cb4eafb.exe
Resource
win10-20230220-en
General
-
Target
3a4712fe53943012eabe3d9b70436588be5f7d3b5d2c6abeaf3070e26cb4eafb.exe
-
Size
1.8MB
-
MD5
484f306b6b2cddfa346936023aa886a5
-
SHA1
8b6a851469319d5b1df0449775aa95b0138d8a8c
-
SHA256
3a4712fe53943012eabe3d9b70436588be5f7d3b5d2c6abeaf3070e26cb4eafb
-
SHA512
542eb0acd401d52fcea808e248a32f6f4c929f7a31eb9a5c6c6d04555ad9f1b30fdd15f1e71c9701c25efbd2cf562da0f39f3b423db854a324a711f2f0a7ceb5
-
SSDEEP
49152:BMZrwVqn+0E3OcR+SpxJfwYRZlO2Hcke4fwv9OaOzrWc1ifUzvL+a:KMVqn+OcR1pxRZlO2Hcv9OrWc1iO
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4556 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 3a4712fe53943012eabe3d9b70436588be5f7d3b5d2c6abeaf3070e26cb4eafb.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4124 wrote to memory of 4556 4124 3a4712fe53943012eabe3d9b70436588be5f7d3b5d2c6abeaf3070e26cb4eafb.exe 66 PID 4124 wrote to memory of 4556 4124 3a4712fe53943012eabe3d9b70436588be5f7d3b5d2c6abeaf3070e26cb4eafb.exe 66 PID 4124 wrote to memory of 4556 4124 3a4712fe53943012eabe3d9b70436588be5f7d3b5d2c6abeaf3070e26cb4eafb.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a4712fe53943012eabe3d9b70436588be5f7d3b5d2c6abeaf3070e26cb4eafb.exe"C:\Users\Admin\AppData\Local\Temp\3a4712fe53943012eabe3d9b70436588be5f7d3b5d2c6abeaf3070e26cb4eafb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:4556
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
847.8MB
MD5455a4b50d30f2578c50488b6ab467e3a
SHA15f1374e5b86d94410e15cfc163f1eb35e295ab55
SHA2566906eb7ee647ef661308f7ddfdf37a19d3feb506b2b54e9e503d2e36a4895c7e
SHA512baeef15828b2ba0a69f56acfac3eae46de9234e68245d53d2f6d51c5700509d2d73a1725de4c6fa5f684fe2469cb6c830cceb5fc03ac7646a9eefd61fa3b30a2
-
Filesize
847.8MB
MD5455a4b50d30f2578c50488b6ab467e3a
SHA15f1374e5b86d94410e15cfc163f1eb35e295ab55
SHA2566906eb7ee647ef661308f7ddfdf37a19d3feb506b2b54e9e503d2e36a4895c7e
SHA512baeef15828b2ba0a69f56acfac3eae46de9234e68245d53d2f6d51c5700509d2d73a1725de4c6fa5f684fe2469cb6c830cceb5fc03ac7646a9eefd61fa3b30a2