Analysis
-
max time kernel
30s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-05-2023 06:52
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1236 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 908 conhost.exe 908 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 908 wrote to memory of 1236 908 conhost.exe 28 PID 908 wrote to memory of 1236 908 conhost.exe 28 PID 908 wrote to memory of 1236 908 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1236
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
822.4MB
MD514acef40144b42c2537853f026f54d6b
SHA134d6d5d9570520a3b464a805c4dcff7a75b15951
SHA25620f3ba21660135c08eae7b3e512512a191640cb3d86846820222a4629cb63d21
SHA512e7aeda0a5e2bd54a9b90b80b423921575c86d10a4af7ee1c8f82ac8500d5690ab11fa2d02adb50313e28c17e6556e38730c36a0ee3a49c763382ae090b108f40
-
Filesize
572.8MB
MD567c685747efce1f8d0bdd4663c333cc8
SHA1e189f120a4436cc95e02a4befb4a0888f7cc69db
SHA25671d33179d446bb92236d024ca6e92b40272a15faf53b6d4959e67a495f8c81f6
SHA512b10558c77186606dfa82a294cd247d4862075a563dbd5941e6f21bf1b3ff6dd019f7910d45e317938c858ccb4e576aff0bdba4e0f312e911016a1c44c6d9e014
-
Filesize
588.1MB
MD51ae472b573f8e630ed2c7c5ce91e612c
SHA14dd90c8e3648180fdadc5f92ddaf40158fb76942
SHA256e6b5e8a0249c988ba53d81a2aeb015c0714ab92186d2156c89e02985c6f89435
SHA512321aa804ce6489d101a240f46f0868e58e0d8c5a3a87abc562ddcec35f2c98a70a2058ec47d45add773947aa1ba3051428ac14d80ca2b2b2e3cb99bcb24c4893