Analysis
-
max time kernel
28s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 17:31
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230221-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 752 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1596 conhost.exe 1596 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1596 wrote to memory of 752 1596 conhost.exe 28 PID 1596 wrote to memory of 752 1596 conhost.exe 28 PID 1596 wrote to memory of 752 1596 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:752
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
805.0MB
MD551a067b6cbe1d9d8f78bb60f8d37a468
SHA109e1e33d9eb627246ee21e793d0e0c1d1d24e076
SHA2568b67da4465154813ecc2821aee5f04dbe8d8807dce1571d93b117e85a5cba4af
SHA51255447999894672f42b40bad5fbeda569af4daf6836561af49d9173db987d2019480cd948b85478d6706d1c4d159b8f422a3943e95737867b2c8b65250b8faca4
-
Filesize
717.6MB
MD588a4be7fca3c67e34f4c9f7ea444d23e
SHA1188d6306a9a874bc993fcf587cec23a7284cf3aa
SHA25623879e2a8f37f1a545f6211db6ab9da8959c9a9c5ec4ab351d01927e3ea0d251
SHA512e7453b482326f2db47fdd4b754fb8f53da06e0cb281a9cf5a8d6194453d270bab972aeadf8514bc1056b7d99a63ac071185d6f5cf125dad797837354cd2dd698
-
Filesize
698.8MB
MD5084d0bb3263a3d44637975a9bb7a4260
SHA1a0e94230c6ea46d81ed64890dd5681b7449ba798
SHA256fe64ea6c7e8f5219975bf7969671f244de5a6591a3b5b890600d3e359b3d5629
SHA512191f4c67dfde8181a4bf3522cd4cdbefbc7e4c7d44ab6c22d51175ff0ce0335802e3f1090d8bd8f1f1ad8a6bf969a76e1f28c6572f8e15fa67a5d00036916804