Analysis
-
max time kernel
142s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-05-2023 05:48
Static task
static1
Behavioral task
behavioral1
Sample
auto.exe
Resource
win7-20230220-en
General
-
Target
auto.exe
-
Size
4.3MB
-
MD5
ddac8c4023deb11c8640fca3c9313113
-
SHA1
396f984beea94dd6f1e59218cacfff3836ee8521
-
SHA256
fd1b90ab20f012a6132f7f059f73032b279739f29217e331b947c984a4172b05
-
SHA512
2fb5f51ce4ac4494d4811207c6ba29fd1a1d8b1a2e52771f5567fbb37bc71d8e5b2b8f349bfccd87e91f4d28b9cff10f6b3e134dc98de62faab92b1eab2f1280
-
SSDEEP
98304:lAyd60OW0mP1Q6Ul5ZTeDWsAL3Kc3SLcxIVbYzR0nP6QdB8:Cf051lUXUDMKcCL0Eb4R
Malware Config
Extracted
laplas
http://185.209.161.89
-
api_key
6a2714906f1325d666e4cf9f6269c2352ccfb7e7f1a23c114287dc69ddf27cb0
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ auto.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion auto.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion auto.exe -
Executes dropped EXE 1 IoCs
pid Process 268 ntlhost.exe -
Loads dropped DLL 1 IoCs
pid Process 828 auto.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" auto.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA auto.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 828 auto.exe 268 ntlhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 2 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 828 wrote to memory of 268 828 auto.exe 28 PID 828 wrote to memory of 268 828 auto.exe 28 PID 828 wrote to memory of 268 828 auto.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\auto.exe"C:\Users\Admin\AppData\Local\Temp\auto.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:268
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
643.2MB
MD598140315f0868e90071630d3b1b763b1
SHA1e38308ac7025c1ee439fcc1ac3ac19837fe6aa04
SHA25690bf909dd0500434b99ea76d85ab8aa86891c17c94802d063bf1a6cba5770b8c
SHA512f8c4179ea9ad13a697166f1b36a61f1d08ea114ea4f3328322d1ea15c5bd07c435184b5ddcfc86b25afb4ffc7102a49104fd71334aa01d7577e91286f21422a5
-
Filesize
656.6MB
MD509ee18e5d8acb7cc76b183a61aeed209
SHA12e32e359c2c69eaf65dff7ba19272e1605ee7011
SHA25648e1d1aca6fb71248b931458aab944e07d747abcd0adf03cd06bcb9e202f175d
SHA5129c08d5d93f2c313c21937b984f6b340cab3f5d994334f1c42aba562206f4b1b13ffa96e69aa65ca0847bfe9c2998f3b15f271bf9a756d3aeb9c304e9dc8125a6