Analysis
-
max time kernel
29s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 17:32
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1984 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2016 conhost.exe 2016 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1984 2016 conhost.exe 27 PID 2016 wrote to memory of 1984 2016 conhost.exe 27 PID 2016 wrote to memory of 1984 2016 conhost.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
507.6MB
MD5a25f210a48e533762fdd9bc20540fde1
SHA14e770b6449a50ae8e996daba4b98831d2a308ae4
SHA2567f56cb989a17ea35f04d096ba921445d65898b179d535f8a9062592f2519aa10
SHA512e684e3b9933e0d8e1946707b5b704089a520d8458e93702b03de98a5a7d8249599b3a9cd0d96c7cc17c77f787cdf7c6b3868a3e8261dffe2a0fb7e95f975c6a6
-
Filesize
421.4MB
MD59a8abeaad8c2b4921cccda65296debbd
SHA17004b9b976b1b0e0762a4731b26c7c2d16a4878e
SHA256d0796dd6ef34ca6061d2a2e71b5c12076da7835199525497c7d26bf143edf477
SHA512c448675485193bcc93b672504b2e68a68587f8745d0725a4b0db3892e2e4d1f1037d58719807bf915959fbaa2e6f52db43d50b90c66e605602017210340daee2
-
Filesize
477.8MB
MD55e54ab105b7141725d031599418d3b09
SHA16781a186ead7e6c911919b3904bba0c1b5166b1b
SHA256bc4a2686bc09760dabcaac34243b4ec38d7c76007ea2bf0d6bb3d821e4e2a83a
SHA512435b0ccee042000fd802610888f0359d6b9b4ef24af54524742c357a274ce9fbd6f8b876b5c68f574a48f20f90893384b2bd67a9e4b3d51dddf148fb5f711900