Analysis
-
max time kernel
70s -
max time network
190s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-05-2023 18:33
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 884 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2000 conhost.exe 2000 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 2 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2000 wrote to memory of 884 2000 conhost.exe 28 PID 2000 wrote to memory of 884 2000 conhost.exe 28 PID 2000 wrote to memory of 884 2000 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:884
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524.8MB
MD56ec55f2037376e56e8d1d5cb26f829e5
SHA13e806455260724ebe2fa4ea51f3a6a6453310174
SHA25663000721a922bda987aa6ce2abc554bb8cb7791337696a86053fb6aca2dce3fd
SHA512098af9421d418edc904a98fc8f793102e24922fcb8d600a7bfed4f43cebfd32e08dcad416dcb9a2f060a18798f42c39b562713272a3a29aa808ee32df2dac6f8
-
Filesize
515.4MB
MD53d0ed796e1e95103c707feff350b8603
SHA1be44379cb39bfbafedc7f370a022758540a21c43
SHA256cb966831f43efa734d84e5d4484f9a36d9f075afbcfa0b4aa6f3d230c63becfd
SHA51222d7d5104c441f73f11fd8b3fbf63927f2fdc65451abea0b829f71e752caaf7487ea02350e1f371ef1a6b4b44d5c22502f5e30cad6bc963084b2fb4fb6875319
-
Filesize
489.9MB
MD584a9b6711acd911ee164ef2923570e3b
SHA16893eadf2217f41220fa4c8c02b959c415c88192
SHA256c0dcb46ee429a0c9ef5588c95162f01e5827497d1826087653d013bf48a71683
SHA5123a16d03074b8e2e7d42c3a5e6f955668125b5a0ef13bc23465f12618c8a7565f53b042775e1fa496b9179269211d6e9c0165ed3e1a2d36a1bf31ba478f65cf69