Analysis
-
max time kernel
31s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 17:07
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 932 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1928 conhost.exe 1928 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1928 wrote to memory of 932 1928 conhost.exe 27 PID 1928 wrote to memory of 932 1928 conhost.exe 27 PID 1928 wrote to memory of 932 1928 conhost.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:932
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
582.0MB
MD535102c2be545d4353472edd2821e15bb
SHA13b0b257af8730e434fc189918f83ea738136433f
SHA256094dd9ba7a670063455355bff1d2c6fe346ebff6b0ce4de7b7ec36ef7bd21adc
SHA5122c92e610aaeb644f82de75d2ee24df405ac326b054e6765e0d42a141e8146705dbe062edb68df9e9fa284a0359db1428bdc95fc8ecfa03f7144c6283eb7255af
-
Filesize
556.5MB
MD57e029d3d52c3155c839329474fcfa40c
SHA1348ad204eb194270abb8f95b056d25ea1d8df43b
SHA256c6662dd77267f6b31f2dbe59d765a40ba55bbb5d1d325446211b675449c5fc5d
SHA512513f990dae0639bf8ea6326a176261c93db02d3f19bf613808e817b2bd1b0ac399af7cf339ce71f6ea4d63e9e0c081b3e50af38943144797a6006a6915266f16
-
Filesize
588.7MB
MD5091703df4d41d239ad31529dd086d320
SHA19f0757e1e5483785bcdd203970068ddee1f258c8
SHA256e930d86858ee1522dfd0954f64c5ac1d9658238f43c9104d3b2d6e1433c6968e
SHA51206f07358a5c0613bca9ac7914de4417e807fb1f86596a26afc23a4dd8288e76ff39fc6c5018fd7a1879956f2dc90c21f9bcaee9c5d546946e49e86063bb75654