Analysis
-
max time kernel
31s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 17:27
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 888 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 628 conhost.exe 628 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 628 wrote to memory of 888 628 conhost.exe 28 PID 628 wrote to memory of 888 628 conhost.exe 28 PID 628 wrote to memory of 888 628 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:888
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264.6MB
MD5a3fb5d6c1a6070ca220b1b481a38642d
SHA1177e830b9a48fa78cbd9cdf43db67dea73aedf87
SHA256288d6b1ec78cb571d84a804c934521d309d72888b41e7f7e94d536ad4af67188
SHA5121e520bcddee0dc9840fc7997b0bc19cf161e6fa94fbb3136ec111f91c411cd091dc4bdf553d7c0e8b84a3bba60f3d3a2abac95219e5dc80f7e1cd8a9030cb3c0
-
Filesize
277.9MB
MD51ec88bd37b3e88e64865c59aede3f185
SHA17d051f69237fc7d89bc31400a27b3ec4b252892c
SHA25631f53b91927081bc58df6bc4555bd61ec512ea611405056053077653f7e4a1cc
SHA51206a6918d94382d04e58d524102d9917f078a4738f518025c1a6a76ea04c558bcd5b9bc36048c323a696a9c7b7aa290a25ab6bf18df7b7ffe448059e76b131fb4
-
Filesize
278.8MB
MD59b667ab35107a21e7d580f97e368e70f
SHA1c95c81c2de6226c26164674104197464bb934bf3
SHA2561976dbec8f99e7b5394f99a2bfe00ab70a23013127331b4d0ccd6849b43cbe9c
SHA5125414ff4b80366e8ffd693dda465be47833bc48e892305c2f8dba8357c4fcd337fe7f3687a14b8d79e72251295321c5496fe7bc15e8fce5d771eb948613dd5ff1