Analysis
-
max time kernel
44s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 19:44
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 864 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1528 conhost.exe 1528 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 2 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1528 wrote to memory of 864 1528 conhost.exe 28 PID 1528 wrote to memory of 864 1528 conhost.exe 28 PID 1528 wrote to memory of 864 1528 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:864
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428.9MB
MD52deac0cddda1b08ea4ba782e00ff5b69
SHA1ac2950717c2bd6dab6af107c1c08f3a8a11e2b4d
SHA256b060f687674ce932037d2edae14b26be646e0dfe42d3f86d8450f1b3cd54db25
SHA5125a331cda4539f5bccb4109d5b880dc930a700dc51b331d90315c90b02d238329c06f8217b9b0e8e926ef19e22bf19152be23640207f3a831791dd078037cd9b5
-
Filesize
459.7MB
MD5abd0795f8eb372221a5a413e56085c0a
SHA11649a7c6e8695361aef8197a194999b581d1cec2
SHA25649ab6a2944a0c50f5b7434d92cd6d370fa5384ea3207bd4ff8e2017ffd2fb830
SHA51277bc2b48afca7cd31a30fe13bfc110912e5f059ee9b2ec3db1cb21a8d54909bfa91b74b09442b4753c427855bdf40a9fbd4da758016349a99fee30057bf19a0a
-
Filesize
440.8MB
MD5d155fb5253e82ee97e288dcdef6c1399
SHA10661ab155c0cdfb94d631988a2b397e200cfab2f
SHA2560c44e96482af6192414a5eb9d038f6a4add7ff0771f61d278caefcfe560997a5
SHA5121f6be3299c539f191236f3aa1847614bdb258df88f6ad5db07043a4664b274e0a7095e4512b1fef820377eac72261790bf15d5c0c09449f0f0633bb349ca1815