Analysis
-
max time kernel
26s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 15:40
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1316 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1660 conhost.exe 1660 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1316 1660 conhost.exe 27 PID 1660 wrote to memory of 1316 1660 conhost.exe 27 PID 1660 wrote to memory of 1316 1660 conhost.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1316
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541.9MB
MD55c154fe96122b179f320be95280c6ec6
SHA1ba31b167253d94710869754b4700f94de52cbd7b
SHA256c66fb4958fbcefe974507a94fd4fff02622eb9f56ae771bb9b17d1d17381f279
SHA512a7827d1b8bc33708c18a7d9c9359c527b1f3b449ca7544309c4ccac324798a087534931c0b0823b274256a8196136fa3761e82e740bf294f06194b85916018a4
-
Filesize
523.1MB
MD5bf18361dfc3f41884d91299ccdf5cc58
SHA1213e521a4468e16496bfb963895724dd4a9949b1
SHA256dbbe6610e3757a27fe16bb9698da3333c36eae0e1470e065c9f672925a72e835
SHA5128cdc4e7d9379c53c9f5754ad9d2ac0153304dea09369d7044147a87d9319dcbccd5266c324762a75b2690a158254d5ffdd5c7f7a40781550845d11e236ff9c6b
-
Filesize
534.3MB
MD5db5826ad3c8903817ac5b2b834571cc5
SHA139fa7c44125b954ddd1d330071b5ad468b686d25
SHA256c149a08735893b4bd7300a07b53a3cdeaaee8f796d037f1a75cdbd6d8e6176c1
SHA512b0548f0153e3f76c96546e83ebf3349d3e3f48a363517ac5112528e458209615e32f5a4db3e45b5f5ea44196cdcab09a7b2ad552e13dbb21b24cb45699ff897d