Analysis
-
max time kernel
67s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 17:27
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2020 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2040 conhost.exe 2040 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 3 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2020 2040 conhost.exe 28 PID 2040 wrote to memory of 2020 2040 conhost.exe 28 PID 2040 wrote to memory of 2020 2040 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:2020
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
655.5MB
MD5a8b3ce713de15be006f57211f1ff6252
SHA1fca418845a78c38548122c584eda13f9aebe03cd
SHA256d7fede50553caf112530deee7a881a062983263dcb209bfb50f726343c4e6395
SHA5123bdf7d3085e1b8be68a36128a6f270a484a33bc4d0abe765bfd7af36cf165bd4f446899370b70c96d667d60ddb1a4c8e227678201a5aebd4a95c5bc293c968ed
-
Filesize
699.8MB
MD5a9ece31a1e23818fec9826bbd1013742
SHA1f2dd033a1a869a57b01e288793549f97fc2ee2c8
SHA2565406c0af76425821b63407beefbec04635b451e424f0e2bc14bee27e16c8d1b4
SHA5122559f82e4a71254bc8c0c47b26665d9ff58dd1534f5a2dbb9a384c6039b2e95b4449aeb3a0a2e2fe63e6b32330dea1d0f1eb014f3ac81366e4c733e9c9834486
-
Filesize
677.6MB
MD59210901ff543c4e1531f450845ce7db0
SHA1a036b5925695f6fbf7d177fefe8d3e3f7214dea3
SHA256d0dd0dc60967a5068eedf114221d4ee7a89cba6ad6c6194626474ce647ae8683
SHA5123c46e1034d163b2cc9f9d3b7e6e5ddd1dbd86da57f7d483263498802b0c39e04a27ee0f75198c2bcd3989b62672d36134bb397acd82e7c403360dbd55c1ee8b9