Analysis
-
max time kernel
30s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 17:31
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 832 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 904 conhost.exe 904 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 904 wrote to memory of 832 904 conhost.exe 27 PID 904 wrote to memory of 832 904 conhost.exe 27 PID 904 wrote to memory of 832 904 conhost.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:832
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
793.0MB
MD5ebdf99168dd0e2f758581c233cf08c1b
SHA1cbd81056f0ecf8cc5ed44ebdfc55d6928ba391d9
SHA256dbf3300a34f547b167b18585e3c8b45f4065029f4f9e890f2899176ddf27938f
SHA51210d295e2890b3a427f231c228cfec0bcc1bd92fbdcc685742dab513682289b8339ecf0f4a93ed60868148062bfc5b86a13c4dae8bbb9ecffad5efcb394acde98
-
Filesize
667.1MB
MD55ab6eb75be14750eac4f8d937a12b149
SHA1825e8ae078887414cfef130a4b06aecf89bf90ea
SHA25681ab64f6bf154181e2f3192025cad05cabbe653fa3ad5a130999638a9a6be6c3
SHA512cc6c23a41c7514b07587cdcb529417051df0f7c42348055c3846d8fb9bf14487a9f347b0033ed2caeac58b1d0196f511f9c025e2886d41baef49a28c1f6bb67e
-
Filesize
658.6MB
MD5c31018af0a417f4f1a598362837880f4
SHA10aec8344c5d05326bbb5280e228193fd7edbb39e
SHA256e9b6dd1726af0644d36f4cad11877aabf1e57dceb36b1634f58c2b4e74fb3ebc
SHA5126d256f4ddd06768631b4c44bffa0bd3248d51cbe700022e8c576f3b0334e13b3c43643e030ba9e892faca22b6bcf1b95edc9a9ebe8eaf359e481a2bd50bc6b73