Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 19:02
Static task
static1
Behavioral task
behavioral1
Sample
auto.exe
Resource
win7-20230220-en
General
-
Target
auto.exe
-
Size
4.3MB
-
MD5
ddac8c4023deb11c8640fca3c9313113
-
SHA1
396f984beea94dd6f1e59218cacfff3836ee8521
-
SHA256
fd1b90ab20f012a6132f7f059f73032b279739f29217e331b947c984a4172b05
-
SHA512
2fb5f51ce4ac4494d4811207c6ba29fd1a1d8b1a2e52771f5567fbb37bc71d8e5b2b8f349bfccd87e91f4d28b9cff10f6b3e134dc98de62faab92b1eab2f1280
-
SSDEEP
98304:lAyd60OW0mP1Q6Ul5ZTeDWsAL3Kc3SLcxIVbYzR0nP6QdB8:Cf051lUXUDMKcCL0Eb4R
Malware Config
Extracted
laplas
http://185.209.161.89
-
api_key
6a2714906f1325d666e4cf9f6269c2352ccfb7e7f1a23c114287dc69ddf27cb0
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ auto.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion auto.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion auto.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe -
Executes dropped EXE 1 IoCs
pid Process 1496 ntlhost.exe -
Loads dropped DLL 1 IoCs
pid Process 1232 auto.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" auto.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA auto.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1232 auto.exe 1496 ntlhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 2 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1232 wrote to memory of 1496 1232 auto.exe 28 PID 1232 wrote to memory of 1496 1232 auto.exe 28 PID 1232 wrote to memory of 1496 1232 auto.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\auto.exe"C:\Users\Admin\AppData\Local\Temp\auto.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1496
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102.4MB
MD5bf94b70b2561ebf795fae3cf4c0d90ec
SHA1f3140df60126e24d76413a6a73be467985539bef
SHA256e5c8b75b704e8159b45741542085945f9ac6779588b116c0311c74c8b9f0601a
SHA512f10b40933959faf13ee99c984b04530fff2e7c21ad788f4a570b07af7b42f34f09d00a2ac6a17a123e09ad2c7879315288eb1c9c34ced0a704eb2badbf46cdae
-
Filesize
103.4MB
MD52af9660de7888afbf763c9800ebad645
SHA1615ad162319f35684431e65713da415c01aa9a4a
SHA25648a0ec7e0b97285dfac38807da3008f632c2101be61588ae6ed98dcec5096c84
SHA5126c9fbdc2e9d6aa5263a552e7305ccb9a3931f137ba83dbc4d1e7745a6a7ee1da5d36c5b4a726c4457bc3363fd0f63c8c7189d77aa444e41dfe12bebc3112eaf2