Analysis
-
max time kernel
31s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 15:29
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 852 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1248 conhost.exe 1248 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1248 wrote to memory of 852 1248 conhost.exe 28 PID 1248 wrote to memory of 852 1248 conhost.exe 28 PID 1248 wrote to memory of 852 1248 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:852
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
410.5MB
MD54785939384b5758d5bd9c05269538717
SHA149891126fe89f16aca110f424cc495f97c8d2832
SHA25676d59dc1a5af6a49ee65f70dcd8f810f86f42a249716c781a270e91640a769cd
SHA512bb106c54fb0fc75fb517f0c9af37eb388815ca00874ed0542d6da652375a545a1446caf132c16f890a27c2d700aa12369f2a07bf00c5121e3ae6bd60a893c97d
-
Filesize
423.6MB
MD562ac8addab15034e7dc16a953fc17a71
SHA1fa9e02b4be9833fe29f9e474c5be7b2b7b171d34
SHA2565d79894c802689de9c94ce4148139262d67467415c72acc53cd808611ec4fde4
SHA51260d4c33695569ac0d9bccb2c8468e85309eea2dbb27630b8dc655f6c0b19b525458b716405e350275e3f8df5affab5326e6ba174e3f076806887e1f0b900366b
-
Filesize
440.6MB
MD58427517c0e8c8adab5941a496254318e
SHA113fefb1eb32dd345010ff4e2dabe096e1c81fb58
SHA256380dc2742b085c50afebf34f557adefb61b2148fe0ddbbcb3a1209fd1410a77a
SHA5128f302da5fae1d562010432eb842443e336e2f7fc22c21b5f075ada34108ecebda62136fede78daeda96af84762e8525633246e82e2c6479048447599cb372600