Analysis
-
max time kernel
28s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 17:27
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2004 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2024 conhost.exe 2024 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2004 2024 conhost.exe 28 PID 2024 wrote to memory of 2004 2024 conhost.exe 28 PID 2024 wrote to memory of 2004 2024 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:2004
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
778.5MB
MD5cb5c57ac35499b741b1bb887eb94a31f
SHA14f11d2d59b386218a860cce7d66a4a8a41de93f7
SHA2563bb3c4b4332ed1ac6cbc44306bbe4a0778c70e6bc5a9649585779091993afb2a
SHA512cc1e17c3089bf522b385228326aab2ecbad39d60b2f7db29e16091a468e18182abeeb8abf0aac1730fb78e8ef5328a60528a566c34b94706e3da293a4026d446
-
Filesize
808.9MB
MD595d7993097546713989d1ea71f43dd21
SHA16d5c61dc78d1c7ac3dbb890164a73fe00dc8a5d4
SHA256ff6eaa528ab671131095ff4851517fa27596261adb8640b94d8779dbef990234
SHA51239d39cea5ce3f18b380860b1a3a50924318103110e71f6897de8defbab221a72180c9b32d40f34bc214de63461ac89a2f79f59cc8f96a4306e2e9a1939dd6da7
-
Filesize
823.0MB
MD5a92c6d505a8424a8afa6832e3f47f58d
SHA18bbbd6170dc6eb42df50f579a730e4e7ee7ab802
SHA2563de219af48ddab65b43c606941168737939ad5a59f4e1f3a29f3dc292985cffc
SHA5124c0f9ff471e289909f0e4bd41e82b305bf9ab7f788597628f44a36e3e1ae2ae6960421fdfb4376c4a199e8983599b8fc22b21890b5f422e5171a5e0174d48108