Analysis
-
max time kernel
28s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 17:31
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1244 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1320 conhost.exe 1320 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1320 wrote to memory of 1244 1320 conhost.exe 28 PID 1320 wrote to memory of 1244 1320 conhost.exe 28 PID 1320 wrote to memory of 1244 1320 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1244
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
435.3MB
MD5f9b59eb26e1e45c4f95e69b31ca1de89
SHA13203821e8d2210317256f69d65f094f284b927b0
SHA256776053280413c0dd1335b03d95c9b628177dfc76c721bfc2f4a54ac3b31e0a00
SHA512d30e36f614b72aa24b138ba4a5b50b5c83d063be20a197eaf67f14f18c34298acd4a80e5aa7e56603e33178d5a1330f42143ea6fa466f81f900c9c0f73f0c71e
-
Filesize
422.0MB
MD58f4b09ae07a38fd7e7bcb287f26e1d7a
SHA10a66109e48fff1c83c1851c382f2437a23097426
SHA256d079ba6a4d596d847d27c04ad1a6a79987733bb8f07d537627f437dc9fca310b
SHA512cb4617435f8dfb93cc4ffb14c60f5f37160d97824b9250ae1ad7fbc476e4df3223541d1f740cbe154f3e94ac14e64e24e756577d96fa9dd3fc8bbb8a24585bcd
-
Filesize
433.6MB
MD50b07c3738f764f1c577cb8d2cf542e7c
SHA10d28b33ceed52b9f211d3a26f3c1ae0e4081afb3
SHA256df4a67f082364802a689d912442a7174457d6837ebcae92d8aefbed18746933b
SHA5123eb21e068190ae24398318c84e091991d5f048d6a01aaafff058807cd611a82c29fb12b23dc35ae858277b8cde64997faf0863671984cbe2b2f5981c727f8c27