Analysis
-
max time kernel
69s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 11:25
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1956 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1960 conhost.exe 1960 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 3 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1956 1960 conhost.exe 27 PID 1960 wrote to memory of 1956 1960 conhost.exe 27 PID 1960 wrote to memory of 1956 1960 conhost.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1956
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
582.7MB
MD5292da86d7300996d4ec995c9ba2ccb0c
SHA1e18cdb3b5df4fd9053a9640b5e3ac9f03eea365e
SHA256ccdf4348f6e98b763b9181862c986a932b3fc2de9ea8f788e03f14f8691915b8
SHA512498954a94620181a98d523d3f6541872d5f8d420f425766e80328a5bebc9380dd5cb67019755522d64bba1096d547a0138b0cd610fd69bae254271558697b5b9
-
Filesize
575.1MB
MD51987c2985b63dee0ca2ff8056dc5f2c0
SHA10cc132dc85976df1bd69684b95807279ccce4046
SHA2565803266c05d87123d6a3aebd23e8bf5d440eaccde01bb62fd7876e0cc1457eda
SHA5124452f0b26499c3bc0ef9f39b73844af799670fcfc4e9ad580b75305bcc18194185b224826c8775b006d27b4f83a70b069444edcc9e5bc37b94396634f2401163
-
Filesize
424.0MB
MD545c6715a10e7e957229f5fa50585bd47
SHA11e9370e41873df46c787647c8f44e75f21330297
SHA256bf99e4a1b7c7628cb48e911e69e30ff2734f8f609e215e3e946d350f2d89bb8d
SHA5127d6934d2e96050047209c1e6f6c04e900077d0a44b986d01b30ca8f16d2a4745299c2bee0669480a4ca0aaa1f58ff8b0cad820ceae79f82b1732c54933cf76c7