Analysis
-
max time kernel
26s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 11:25
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2020 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1616 conhost.exe 1616 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2020 1616 conhost.exe 27 PID 1616 wrote to memory of 2020 1616 conhost.exe 27 PID 1616 wrote to memory of 2020 1616 conhost.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:2020
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
361.8MB
MD59dd75594ca6ad28e0d950a5cd903e2e1
SHA16c16697ac5b99e239da26e337092f633cd21b905
SHA256106fbeea65177ffbda7f62e8a276c5cfc6ba933128bbd7c91df73bbe20a858f6
SHA512fb90014990a2a52a81275a9c0dc952c6e6e40c83996cc86dc31d79705e99c319f2c842bb6379badde018a330e6738798722b48904f62bbbd22cc9a2114829113
-
Filesize
343.1MB
MD50c9c00d1d7bcb43cb45081e8bf3521de
SHA18d8497c8bdefbd023257b0e65b88d2b94d52f19d
SHA2565a2d270da84ed9a23c550a27c6d186ba1174b3966a39378f997e00eadadf55ef
SHA512dfc54077b0b0b6e9d4a0cdb1feea510bb886cce62c56e0758a95a67c694b346dbe2f6193b07708a6bf8a248f9bb77b07e5d9c930c258a21cedec45bc62604efa
-
Filesize
338.9MB
MD5c57a2459b1ef0587c0b9092f0adc551a
SHA18d99679a27f51abab4ac9557b52f2c451af0647b
SHA25676f8e17587e1928c33da99fa80cf012761d341ffbb48e9729b2cd4028a7bf792
SHA5127974c663f0ec024d8e2837ba6f12af0f997b5e9d08abe0f3f2b286b8c17ed66a20144cc3ce7bdd5c6af264a57f08cfb159cefa47c1e48f240d96db20fa11779b