Analysis
-
max time kernel
28s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18-05-2023 17:55
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1232 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 904 conhost.exe 904 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 904 wrote to memory of 1232 904 conhost.exe 28 PID 904 wrote to memory of 1232 904 conhost.exe 28 PID 904 wrote to memory of 1232 904 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1232
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
675.1MB
MD51b557c905ce054f72c58b8e1dded30f8
SHA12348ff1567562a5cbcb67bdb493014691c3eba7f
SHA2565bffcbdbd0d1fcd992985469d4decf7f74a635b235dbea584eae3b779b129307
SHA512345f44f316e907e343039c3bc08b7257c801d66c2f86ae88a6223235521f6cf6a543e4e0e98fbcf0a2e35803d943bd72536bfe000d367ca728528f73c28461eb
-
Filesize
662.2MB
MD5c547533f87d7037f3b5b01cc5f25fdbe
SHA191da61634e3daee2848dd221b756660139a936de
SHA2567c2e2cbfd0b88fd582bbcb1853178072a540fca25d1eccff000661c819b89f92
SHA51268d0179ea99de4fcb5996fe514cca101f0e25409fd385b76f0a398d27a29487ff15a16b141b886515362311a3db7b239260326ff0197f9d446f37d140713bc6d
-
Filesize
637.6MB
MD54aced58358dce0649f5c3fa158e6d57c
SHA1869c66c4c29bfda328abf5e58c45fa083e3b3046
SHA256f4c90c83c5ea872c122267b40f79d8a12d5215c4d08e2d3b5073767c8901bc21
SHA512760c59e03e01e2243961721de3f225d8ade2fff9650311996680e3e07a1f35e84763105f29f72c663db96b270c30907f2d93b4d888df73795e8717d15711615a