Analysis
-
max time kernel
68s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 17:07
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1732 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1740 conhost.exe 1740 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 3 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1732 1740 conhost.exe 28 PID 1740 wrote to memory of 1732 1740 conhost.exe 28 PID 1740 wrote to memory of 1732 1740 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1732
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
579.8MB
MD523b62f20a956812727c829694365ab97
SHA1c9c6a30dbbc535740df25480a8f0cd0b1bd47e0a
SHA2563cf24af2ba1569261a3d30217a2cad839db8c043edd41f2dffe30ab154e87f75
SHA51201c03ddfa5a73d535487f009365b67643123050d55d3eb49dedc35f25451d9f1cc92c5581bea13f2d15aca1a15012de1832e8a6d04f6fa6cff936749fa8fe6ad
-
Filesize
598.6MB
MD588c2d1c3b0b13aca7ce80ffd4b687af1
SHA144c7ec14f26d92b8d74d994e994b31451688afb8
SHA2563761d015d36daab0c13bb8b986e7d5f50e1731b67f9ba5a54032283b9e978005
SHA5127ff27f90c4d053a0e64a205771721146066223b63d87eebec42e469fa61d44724c475503d149c49af376dc73296d441ec80394ad16a0c01cbad8142866f172f8
-
Filesize
555.9MB
MD5b4d0045243b10964ff58be0fc58b6f46
SHA10ab02228c9a87e8464fe30543f3fa801907781ce
SHA256e44432c1c46f99203d8eae2c7e47a95aabcd6e700ff0afc91b92817e38a9afb2
SHA512be9da4749309224ca2ff66ab3989e62ef10ba063dda2f326ef4f8987e550e77b361178c8deace7d4258f42ff93e9ed7dfb2ca0e7176d976a43eea8b64f51ba10