Analysis
-
max time kernel
30s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 17:07
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230221-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 908 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1980 conhost.exe 1980 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1980 wrote to memory of 908 1980 conhost.exe 27 PID 1980 wrote to memory of 908 1980 conhost.exe 27 PID 1980 wrote to memory of 908 1980 conhost.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:908
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121.0MB
MD5d214345efefd06b46774d825b4cc7840
SHA1f85a76cdbdf1a7f74200e835c6e5f25c96f56dba
SHA256ac708189712eff954c8670c279b956e8702033163ddbbb7d8a03b1428f786ce1
SHA512a78b145d6510d98509a754901e75733c7b86b91318f765008713cca05476296a3e4a02e76d1b4c43656fd1c2f9c6a62644935ab29d6668469cfe43f1b114b5f9
-
Filesize
127.3MB
MD58220db73e3e360b1d0aed6f43880f2d0
SHA19ab2ae472054f613ac35d87bd5f77386642ed396
SHA2565e2c0bd3cca6ff9a055851bcaf3c9686ca399d4cfa18e17aeb892009fc12a979
SHA51242db3813be0ad0826bc270171fa187af2b05b2d93a32d46c8b1aefcc569299533fa99867fe7b220384be6fb9591ae43fbd5b08fd0fb55af7965faa971289ce5a
-
Filesize
125.2MB
MD52cef0b42e228d58f8094ffef4f3ff75c
SHA12827985c36e4f6182f8e234a2d3ba266fbf6b444
SHA2565ec20c36c4f5bf6858eb6e569f91712b1301ca347bab78054300c4d278220ca6
SHA5129c839e5fdf6acb5a1eddb423dbfbd03228093ba3bc31a8a74e6c2690590d29422e81d4b5380b490d6bc13bcf393ad623b4b95605acacbe9e0672566b1ca38d1d