Analysis
-
max time kernel
129s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 17:31
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1676 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1168 conhost.exe 1168 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 4 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1168 wrote to memory of 1676 1168 conhost.exe 28 PID 1168 wrote to memory of 1676 1168 conhost.exe 28 PID 1168 wrote to memory of 1676 1168 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1676
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
705.4MB
MD5c802cd2baebd07ac1b28ad5bd317a32c
SHA1eba5d2fab1746cfa5eeb49720887336f0a8dc6a8
SHA2566eb6d03dd9170ab1bf0ea21ed7d5382dba982e967ff7873bd8cb71a5e43167b3
SHA512100264573e68ec2580f4426683b85f9307564f527cec3d4ac0b90831db2ff700c2cd918118d78602aef9d4ce5b696fb567c7294e8fe20defef6c0c21a36f7fe3
-
Filesize
694.8MB
MD5c557b6ae700143441648b713c3c770e1
SHA1ccbcb0f7a15c94fdf104ef3eaf09453010e8efbc
SHA256024f1ddd9913f0c30a7196d3ee98d2844da3816655fe75c7b0a9f5022097f363
SHA5129e8ffd2049c302fedcce8b88598c529ec1611cc803d292e011fed4fe4363239492dd60fb8c1a7d6a3222b6bc0425c65e780bf8eb3cc5274e706cd37fa27a79a4
-
Filesize
683.7MB
MD5d1ea92a4fd901cbaf8ed5f20d75ffe49
SHA1fe544c16f67b7515e6cd38a5893bf7275e71e2e2
SHA25656666ca4704c550e6f764bf97e146539a816028f719fa3d4a8e04f794e2b3843
SHA51226e28f66d41979d6dc6e266e62a7ca0bad4e882df0f1d311caa57ce4935c8dfd89733861f8267088b4f56ac38fbea3be605adfa7890ffecd67b6f3f14198980b