Analysis
-
max time kernel
28s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 15:29
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1412 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 608 conhost.exe 608 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 608 wrote to memory of 1412 608 conhost.exe 28 PID 608 wrote to memory of 1412 608 conhost.exe 28 PID 608 wrote to memory of 1412 608 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1412
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
732.0MB
MD5b7b48dda62fe7a9e6a01888252525863
SHA129d4507ea913a382d818754118dd887e64be921f
SHA256401a7616ad2ed53c026b321a94ce31f494bb9b9babe372369804648ca952b9e1
SHA512f8e8867e78977bf0dae08444cb8e4ccc11f72a78a64deb0e8d47bc0ad66b8c6f735388615dbf3e4d61840855413568b8807cea2723cddec2e30d8370246f4402
-
Filesize
605.8MB
MD59495df667471a9737b27d0b288196197
SHA12de16739fe42ec051dced2c2b04d07a7987d3fb2
SHA2560c6b7008903c7a3b860044ae401cbb3cd9dcaa6f94cfd6de1cf9c26e4695f2b8
SHA51249c54829d8cf9083c74da7e98e2be247764e3d34219f27ab75d0e3bfa238b435ca40a5bb619bd7205f66bfe0db131c6c72bfc2fe9e036c6fb28a9dfb0a5724e0
-
Filesize
635.8MB
MD5168fd8be0ecdad97c4e54ecf7fc45e31
SHA18ff8f93e903b07da476c8017877318f7c7bcc6e6
SHA25660681c616312a72720adfbbdab53301826f0f53bbd519fd940bf7fb8b315494b
SHA51288fd7b581350c4be2a6da5f5e39432336294b8a932803639a763c90426de6900b4f95f99e5c61348ef801866cf138059be5c5db370169fc865c6970e5ac2cb70