Analysis
-
max time kernel
26s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 15:40
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230221-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1236 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1740 conhost.exe 1740 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1236 1740 conhost.exe 28 PID 1740 wrote to memory of 1236 1740 conhost.exe 28 PID 1740 wrote to memory of 1236 1740 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1236
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
680.3MB
MD5fd0f01874290cb8885acfde62d2d6903
SHA1c01eab27539083fd8ed9ba0fa2fe9b77466933d2
SHA2565e56c97952685a571b67bf5a4befeb97e41227763f9e4166870381a1af73124d
SHA512d06ff0b0560e47c8742e45c66695c9722380ec6fad1d8290015c4f3f87fbacfcd6d3c95d32728381a282d3f7235e732e5d49f44ff72d239ae88066e359b766dd
-
Filesize
689.2MB
MD5e0f371e18827deffcba7360dda34575e
SHA10718548db4f2d2e340c3ba7b4f695e7604dde0da
SHA25692412ddbbb6b1db964b8dbaf6ade44800834925d7b7b0a998189c08fd2bea405
SHA5128552ca3961928b0a8ee4cbf3536a2e6336a1a297899e4bd3c213a255b80d373221ea64efbc700683c4ca88698d78cf434475d7aed719a475967048d5f77c4c8f
-
Filesize
658.7MB
MD54a2e326619070d670c6791edacd7effb
SHA1fc32a4bb2f132e3be91a7e0ee988bd54bfd2be6f
SHA2562bca3a834c4ee0bea37b1acd1707cb26d520f4ecf5f39d968b8032f244c9cb57
SHA51206abe5e124bea24212cc31ad63fc68be0d011fcadcf0760b4386d9ed8f1a4e0ae5a73ac61a6ce2ad6a596d68b4a029abfc0d3b5d9bf51d1e1b78e592833bcf6a