Analysis
-
max time kernel
31s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20-04-2023 12:45
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2012 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 832 conhost.exe 832 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 832 wrote to memory of 2012 832 conhost.exe 28 PID 832 wrote to memory of 2012 832 conhost.exe 28 PID 832 wrote to memory of 2012 832 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:2012
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
705.7MB
MD50b6b09cd1126cc96be8a4f8d2b5fb099
SHA1b66001be681cbeedea2a6265a194e0af799f52f8
SHA25615fbd3b22cd944c690e206bfc79624dec6f5092a658b18033803acb0de8fdf03
SHA512c5e101be8bc1256be57b7a393d1ccf564a6f0f2bb569e966f9b442d3d23ae7fd17af1d33eee4c5eb85526688ff57be2b4576dbb33c854a29d1cbdad89d6d80ab
-
Filesize
695.4MB
MD57a9528b6aeb9b381359499317d30a109
SHA104ecd51198ec1d1c09fb442e5ad1418bd41654e4
SHA256e6c5605942a829da3bced34d6eb6ef46ba00bd5ee77e75e9fa18832e3a80770d
SHA512b000dfa50e988bb03a5dcd6f88830dfc7e771eab6f5832c6f716a374fa5e446e6232b0655f832e9f9283910dbc61bde40f6048d46d8d4b23491ed7c4bb6134b9
-
Filesize
735.4MB
MD5cd83dd29b81d6fd5e3ea715acaf83134
SHA116492ee2bba579cb91a8bb3a955c1c0b22941097
SHA256ccec2a568fb701616673fc95924d8c75ec0e1993e2e87d5c9884c6282cea85c4
SHA5120c63fbaf6c3962e3adc245c0efeb0e415085a9e067f107b3e50bea5af37b9761df919716972af5450382151f4bd03574594c1897da35447fee0ebdb1efeb0d2e