Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03-05-2023 09:41
Static task
static1
Behavioral task
behavioral1
Sample
auto.exe
Resource
win7-20230220-en
General
-
Target
auto.exe
-
Size
4.3MB
-
MD5
ddac8c4023deb11c8640fca3c9313113
-
SHA1
396f984beea94dd6f1e59218cacfff3836ee8521
-
SHA256
fd1b90ab20f012a6132f7f059f73032b279739f29217e331b947c984a4172b05
-
SHA512
2fb5f51ce4ac4494d4811207c6ba29fd1a1d8b1a2e52771f5567fbb37bc71d8e5b2b8f349bfccd87e91f4d28b9cff10f6b3e134dc98de62faab92b1eab2f1280
-
SSDEEP
98304:lAyd60OW0mP1Q6Ul5ZTeDWsAL3Kc3SLcxIVbYzR0nP6QdB8:Cf051lUXUDMKcCL0Eb4R
Malware Config
Extracted
laplas
http://185.209.161.89
-
api_key
6a2714906f1325d666e4cf9f6269c2352ccfb7e7f1a23c114287dc69ddf27cb0
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ auto.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion auto.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion auto.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe -
Executes dropped EXE 1 IoCs
pid Process 864 ntlhost.exe -
Loads dropped DLL 1 IoCs
pid Process 1148 auto.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" auto.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA auto.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1148 auto.exe 864 ntlhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 2 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1148 wrote to memory of 864 1148 auto.exe 28 PID 1148 wrote to memory of 864 1148 auto.exe 28 PID 1148 wrote to memory of 864 1148 auto.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\auto.exe"C:\Users\Admin\AppData\Local\Temp\auto.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:864
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
710.3MB
MD539d3a35df39d5e94640acafebc496e7d
SHA1ca6ee1a42f2059032136028bfc292bf5dc0c42c9
SHA2565e60aeb0846e7951d1b72215a22369b750248dd7c4f9d99326d35b5efd922cf5
SHA512d5cc4623fa1d1dba942968f8027287677342d26cfbf820efeb56d9f61deda56758d4f60eb358d9e4898d6916e5ea7a318b965b22bafc63ce7cd065f474659c37
-
Filesize
710.3MB
MD539d3a35df39d5e94640acafebc496e7d
SHA1ca6ee1a42f2059032136028bfc292bf5dc0c42c9
SHA2565e60aeb0846e7951d1b72215a22369b750248dd7c4f9d99326d35b5efd922cf5
SHA512d5cc4623fa1d1dba942968f8027287677342d26cfbf820efeb56d9f61deda56758d4f60eb358d9e4898d6916e5ea7a318b965b22bafc63ce7cd065f474659c37