Analysis
-
max time kernel
31s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 11:25
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2024 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1920 conhost.exe 1920 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2024 1920 conhost.exe 28 PID 1920 wrote to memory of 2024 1920 conhost.exe 28 PID 1920 wrote to memory of 2024 1920 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:2024
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717.0MB
MD5e09a73bfe961d7c6323ea7b0a655cc36
SHA1b0953d31eec4e6a648981069f28bb9400ab20842
SHA2568780f656cdc7cca8b843eda11d73c396e0dfe883e783697d65ab001e1bdfb396
SHA512a42358384a9ea6a2a58e7b71622225dfc7908a786c97352d342b701645d18a95363ffe96f1aee4538915eff5da779a5d494e35a9005ef46baf7dd1d027d00547
-
Filesize
630.3MB
MD5d4b6539c9a8c7c6cf249e5b7a15dc32d
SHA10d5aacdfeb2493f9c0c1161b6738b7523a97c2d5
SHA25657511cda836089f3247a4c579deade96d56afccd6a4e998b4ebe604f2c7509cf
SHA5123a11c2132ca59348b87800d1a06cff15cd274b3e79086ddc922261c1874f5fce667c86567d22d6cdbe799114564ab68424d785ff5941bbdc722de568232d67aa
-
Filesize
652.1MB
MD5ea62d8539c76643b06fdbdeb706123b3
SHA1860dba2092b30378cdff2ee6b120bff52e6f168e
SHA256b91949688518dabe3ab6c42bdf7e1c36c2487723a71091d30ba14512df0931d1
SHA512bf536d9b0cc2d56ad7b417ebee0a9c2b204d72726ed40ffe967c2ea8a0e0a315412d30dafbb6b727a66a4d3a48666a66c859b0c0fc9fadb0ec953621d5842d05