Analysis
-
max time kernel
19s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10-05-2023 08:47
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1240 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1772 tmp.exe 1772 tmp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" tmp.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1772 wrote to memory of 1240 1772 tmp.exe 28 PID 1772 wrote to memory of 1240 1772 tmp.exe 28 PID 1772 wrote to memory of 1240 1772 tmp.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1240
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
763.0MB
MD5d9cdcddbbc84ba4ba086a145025e0fd5
SHA1bf8546a1ea813c18a0cb9697c2b5ea1da9d5f7b0
SHA2565dde8f79c9272217e951320ad4843cc0cef34c243d27b7a205b9d0eecc67a342
SHA51283be8fab3d57e7fc4c3cf3a7b0a56806aabad2ea2df0d38a7c8d4d3d9bda0ed3bd5dc4919b4d2222d2389e398242974dc4961a2f7486ba516ff3728d3b6c89a6
-
Filesize
581.4MB
MD5cda05636bd2c286b470df879904041fd
SHA1c3d0359526962c7189a2d649b897601d12d68683
SHA256fd7a5f68fc8b5f386afeda28655fa23107a22cdb3b8953df53e980f4c6f2b372
SHA5121c039e85fd36996a488c3c9497adaf4d12d1612429a52f8d1ce3d5a84cd0d38e1afb4e04204fb6e8fd875e9823c03c5b0f63581be4f68db261e4823847b7af37
-
Filesize
570.4MB
MD54b34a9cc4a8be278e7c6fd7f55db0d1e
SHA1d7882dc2ccf6eeb8ac53794c0972cf6abce38257
SHA256e4bd85bc6438e3796fe2c57b45f18b7b4b105733f75535c7ba7f004c93268820
SHA51200ceee4f2d3230690f7a66a80837c022a03845808a77bb3ea7f426e5510add47f074aa2e7f560824df37d2de955e2b92891e8466e3eca6febde79705413f9445